Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Ruben Trapero"'
Autor:
Thomas Lagkas, Panagiotis Radoglou Grammatikis, Sokratis K. Katsikas, Orestis Mavropoulos, Ignacio Labrador Pavon, Pol Paradell Sola, Thanasis Kotsiopoulos, Theodoros Rokkas, Molinuevo Martin Alberto, Benito Caracuel, Giannis Ledakis, Yannis Spyridis, Panagiotis Sarigiannidis, Sofia Anna Menesidou, Francisco Ramos, Dan-Eric Archer, Vasileios Gkioulos, Dimitris Papamartzivanos, Georgios Efstathopoulos, Achilleas Sesis, Christos Dalamagkas, Hans Christian Bolstad, José Luis Domínguez-García, Nikola Paunovic, Alba Colet Subirachs, Alicia Arce, Antonios Sarigiannidis, Anastasios Drosou, Ruben Trapero Burgos, Ramon Gallart, Achilleas Pasias, Marisa Escalante, Rodrigo Diaz
Publikováno v:
Digital
Volume 1
Issue 4
Pages 13-187
Volume 1
Issue 4
Pages 13-187
The technological leap of smart technologies and the Internet of Things has advanced the conventional model of the electrical power and energy systems into a new digital era, widely known as the Smart Grid. The advent of Smart Grids provides multiple
Autor:
Antonio F. Skarmeta, Stefano Bianchi, Ruben Trapero, Diego Rivera, Anastasios Zafeiropoulos, Panagiotis Gouvas, Jesus Villalobos, Jorge Bernal Bernabe, Alejandro Molina Zarca
Publikováno v:
IEEE Internet of Things Journal. 6:8005-8020
The Internet of Things (IoT) brings a multidisciplinary revolution in several application areas. However, security and privacy concerns are undermining a reliable and resilient broad-scale deployment of IoT-enabled critical infrastructures (IoT-CIs).
Publikováno v:
Future Generation Computer Systems
Cloud computing is increasingly playing an important role in the service provisioning domain given the economic and technological benefits it offers. The popularity of cloud services is increasing but so are their customers’ concerns about security
Autor:
Ruben Trapero, Beatriz Gallego-Nicasio Crespo, Diomidis S. Michalopoulos, Dimitrios Schinianakis
Publikováno v:
WCNC
2019 IEEE Wireless Communications and Networking Conference (WCNC)
2019 IEEE Wireless Communications and Networking Conference (WCNC)
A security study of 5G networks and the use of security trust zones in network slicing architectures are presented in this paper. In such an approach, the security trust zone concept is analyzed in terms of a profiling methodology that takes into acc
Publikováno v:
IEEE Security & Privacy. 14:73-77
Emerging solutions for assessing cloud trustworthiness must consider the interactions among security, privacy, and risk. They will require a quantitative mind-set to use, and should be an integral part of life cycles that increase transparency in the
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030120849
IOSec@RAID
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information and Operational Technology Security Systems
Information and Operational Technology Security Systems-First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
IOSec@RAID
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information and Operational Technology Security Systems
Information and Operational Technology Security Systems-First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
Critical Infrastructures (CIs) increasingly leverage Cloud computing given its benefits of on-demand scalability, high availability and cost efficiency. However, the Cloud is typically characterized by the co-location of users from varied security do
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5e9a9972808fb108d67ac13ece865255
https://doi.org/10.1007/978-3-030-12085-6_3
https://doi.org/10.1007/978-3-030-12085-6_3
Autor:
Antonio F. Skarmeta, Stefano Bianchi, Ruben Trapero, Sébastien Ziegler, Cedric Crettaz, Jorge Bernal Bernabe, Eunah Kim
Publikováno v:
Internet of Things Security and Data Protection ISBN: 9783030049836
This chapter will provide an overview of the main threats on IoT systems and deployments. It will address both security and privacy challenges. This chapter will benefit from the contributions derived from several project results, including ANASTACIA
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::32e72d0885823ed8d94db47a751d3f25
https://doi.org/10.1007/978-3-030-04984-3_2
https://doi.org/10.1007/978-3-030-04984-3_2
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030120849
IOSec@RAID
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information and Operational Technology Security Systems
Information and Operational Technology Security Systems-First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
IOSec@RAID
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information and Operational Technology Security Systems
Information and Operational Technology Security Systems-First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
Critical Infrastructures (CIs) such as e-commerce, energy, transportation, defense, monitoring etc., form the basis of the modern ICT society, and these CI’s increasingly utilize ICT services such as the Cloud to provide for scalable, robust and co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::053a564d1c4234ab33603d3de868630c
https://doi.org/10.1007/978-3-030-12085-6_6
https://doi.org/10.1007/978-3-030-12085-6_6
Publikováno v:
2019 European Conference on Networks and Communications (EuCNC)
EuCNC
EuCNC
This work capitalizes on the concept of network function virtualization at the telco cloud, and presents a joint study between fault management and security management. Specifically, the commonalities of fault and security management are put forward,
Publikováno v:
ARES
Cloud monitoring is an essential mechanism for helping secure cloud services. Thus, a plethora of monitoring schemas have been proposed in recent years. Particularly, a newly proposed indirect monitoring mechanism outperforms others with the unique m