Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Juan M. Marín Pérez"'
Autor:
Gregorio Martínez Pérez, Jose M. Alcaraz Calero, Jorge Bernal Bernabe, Juan M. Marín Pérez, Antonio F. Skarmeta, Félix J. García Clemente
Publikováno v:
Future Generation Computer Systems. 32:154-167
Cloud computing is an emerging paradigm to offer on-demand IT services to customers. The access control to resources located in the cloud is one of the critical aspects to enable business to shift into the cloud. Some recent works provide access cont
Autor:
Juan M. Marín Pérez, Félix J. García Clemente, Antonio F. Skarmeta, Jorge Bernal Bernabe, Jose M. Alcaraz Calero, Gregorio Martínez Pérez
Publikováno v:
The Journal of Supercomputing. 70:1075-1099
Cloud computing is revealing a new scenario where different cloud customers need to collaborate to meet client demands. The cloud stack must be able to support this situation by enabling collaborative agreements between cloud customers. However, thes
Autor:
Khaled Salah, Jose M. Alcaraz Calero, Jorge Bernal Bernabe, Sherali Zeadally, Juan M. Marín Pérez
Publikováno v:
Computers & Security. 34:113-122
We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two o
Publikováno v:
IEEE Transactions on Services Computing
Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of control over th
Autor:
Félix J. García Clemente, Gregorio Martínez Pérez, Juan M. Marín Pérez, Antonio F. Skarmeta, Jose M. Alcaraz Calero, Jorge Bernal Bernabe
Publikováno v:
Future Generation Computer Systems. 27:40-55
There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization policies in Grid scenarios. However, these solutions u
Autor:
Gregorio Martínez Pérez, Félix J. García Clemente, Jose M. Alcaraz Calero, Juan M. Marín Pérez, Antonio F. Skarmeta, Jorge Bernal Bernabe
Publikováno v:
Data & Knowledge Engineering. 69:1117-1137
Nowadays, managers of information systems use ontologies and rules as a powerful tool to express the desired behaviour for the system. However, the use of rules may lead to conflicting situations where the antecedent of two or more rules is fulfilled
Autor:
Félix J. García Clemente, Antonio F. Skarmeta, Gregorio Martínez Pérez, Jorge Bernal Bernabe, Juan M. Marín Pérez, Jose M. Alcaraz Calero
Publikováno v:
Journal of Network and Systems Management. 19:209-229
Today, network operators typically reason about network behaviour by observing the effects of a particular configuration in operation. This configuration process typically involves logging configuration changes and rolling back to a previous version
Autor:
Jaime Arrazola Pérez, Antonio Moragón Juan, Antonio F. Skarmeta Gómez, Javier Monge Rabadán, Juan M. Marín Pérez
Publikováno v:
Cyber Security and Privacy ISBN: 9783319253596
CSP Forum
CSP Forum
Security systems in Intelligent Transport Systems (ITS) are woefully underprepared for the security threats in the modern landscape. However, the real potential for loss of life in the event of a successful attack makes these systems the more importa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b8d93f4c73e796130e8d77579d6a168a
https://doi.org/10.1007/978-3-319-25360-2_5
https://doi.org/10.1007/978-3-319-25360-2_5
Autor:
Jorge Bernal Bernabe, Félix J. García Clemente, Juan M. Marín Pérez, Jesús D. Jiménez Re, Antonio F. Skarmeta, Jose M. Alcaraz Calero, Gregorio Martínez Pérez
Policy-based management of information systems enables the specification of high-level policies which need to be refined into lower level configurations suitable to be directly applied to services and final devices in order to achieve the high-level
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e160797b30f31e56c7172136d07e960c
https://doi.org/10.4018/978-1-4666-1888-6.ch004
https://doi.org/10.4018/978-1-4666-1888-6.ch004
Autor:
Antonio F. Skarmeta, Manuel Gil Pérez, Daniel J. Martínez Manzano, Juan M. Marín Pérez, Jorge Bernal Bernabe
Publikováno v:
2009 Second International Conference on Dependability.
Many critical activities rely on the correct and uninterrupted operation of networked Computer Information Systems (CIS). Such systems are however exposed to many different kinds of risk, and thus many researches have been taking place for enabling t