All Stories

  1. Toward the Quantum-Safe Web: Benchmarking Post-Quantum TLS
  2. A cluster of patterns for trusted computing
  3. Trusted Platform and Privacy Management in Cyber Physical Systems: The DUCA Framework
  4. Cracking the Core: Hardware Vulnerabilities in Android Devices Unveiled
  5. EventGeoScout: Fostering Citizen Empowerment and Augmenting Data Quality through Collaborative Geographic Information Governance and Optimization
  6. Strengthening Privacy and Data Security in Biomedical Microelectromechanical Systems by IoT Communication Security and Protection in Smart Healthcare
  7. Deep Learning-Based Attack Detection and Classification in Android Devices
  8. A survey on the (in)security of trusted execution environments
  9. A Test Environment for Wireless Hacking in Domestic IoT Scenarios
  10. SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform
  11. Secure Mobile Agents on Embedded Boards: a TPM based solution
  12. Protective Effect of Melatonin Administration against SARS-CoV-2 Infection: A Systematic Review
  13. P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements
  14. A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi
  15. PEER REVIEW BEFORE AND AFTER COVID-19: A COGNITIVE AND AFFECTIVE ANALYSIS
  16. Using Peer Review for Student Performance Enhancement: Experiences in a Multidisciplinary Higher Education Setting
  17. TPM, a pattern for an architecture for trusted computing
  18. ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM)
  19. Use of an ANN to Value MTF and Melatonin Effect on ADHD Affected Children
  20. A Review of Security Mechanisms for Multi-Agent Systems
  21. A Review of Dynamic Verification of Security and Dependability Properties
  22. Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications
  23. Clinical Considerations Derived From the Administration of Melatonin to Children With Sleep Disorders
  24. A Security Scheme for Protecting Agent Societies
  25. Melatonin Secretion Patterns in Children with Sleep Disorders
  26. Software and Hardware Certification Techniques in a Combined Certification Model
  27. An immersive view approach by secure interactive multimedia proof-of-concept implementation
  28. Bridging the GAP between Software Certification and Trusted Computing for Securing Cloud Computing
  29. A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications
  30. Authentication and Authorization in Ambient Assisting Living Applications: An Approach for UniversAAL
  31. Multi-layer Monitoring for Cloud Computing
  32. Dynamic security monitoring for Virtualized Environments in Cloud computing
  33. Multiagent Systems Protection
  34. Facilitating the Use of TPM Technologies Using the Serenity Framework
  35. Static Mutual Approach for Protecting Mobile Agent
  36. Dynamic Security Monitoring and Accounting for Virtualized Environments
  37. Live Interactive Frame Technology Alleviating Children Stress and Isolation during Hospitalization
  38. Policy Based Management for Security in Cloud Computing
  39. Security-enhanced ambient assisted living supporting school activities during hospitalisation
  40. A Solution Based on Cryptographic Hardware to Protect Agents
  41. TPM-based protection for mobile agents
  42. Policy-Based Security Engineering of Service Oriented Systems
  43. In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware
  44. Development of Applications Based on Security Patterns
  45. The role of Trusted Computing in secure agent migration
  46. SecMiLiA: An Approach in the Agent Protection
  47. AVISPA in the Validation of Ambient Intelligence Scenarios
  48. Representation of Security and Dependability Solutions
  49. Realising the Potential of Serenity in Emerging AmI Ecosystems:Implications and Challenges
  50. SECURITY AND DEPENDABILITY IN AMBIENT INTELLIGENCE SCENARIOS - The Communication Prototype
  51. Verification of S&D Solutions for Network Communications and Devices
  52. Agent Protection Based on the Use of Cryptographic Hardware
  53. Hardware Protection of Agents in Ubiquitous and Ambient Intelligence Environments
  54. Model Cheking Ambient Intelligence with AVISPA
  55. XACML as a Security and Dependability Pattern for Access Control in AmI environments
  56. Facilitating the Use of TPM Technologies through S&D Patterns
  57. Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence
  58. A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios
  59. Agent Oriented AmI Engineering
  60. Protected Computing vs. Trusted Computing
  61. Trusted Computing: The Cornerstone in the Secure Migration Library for Agents
  62. Protected Computing Approach: Towards the Mutual Protection of Agent Computing
  63. Dynamic Security Properties Monitoring Architecture for Cloud Computing
  64. A Hardware Based Infrastructure for Agent Protection
  65. Secure Profiles as a Cornerstone in Emerging Ambient Intelligence Scenarios
  66. Software Engineering Techniques Applied to AmI: Security Patterns
  67. Policy-Based Security Engineering of Service Oriented Systems
  68. Trusted Code Execution in JavaCard
  69. On Secure Profiling