Search Results - "Kuusijarvi, Jarkko"
-
1
Privacy-friendly Discovery of Common Friends in P2P Networks
Published in 2022 31st Conference of Open Innovations Association (FRUCT) (2022)“…In this paper we study the problem of comparing a set of data between two parties in a peer-to-peer network to determine the number of common friends. Several…”
Get full text
Conference Proceeding Journal Article -
2
Privacy-Preserving Peer Discovery for Group Management in p2p Networks
Published in 2020 27th Conference of Open Innovations Association (FRUCT) (01-09-2020)“…The necessity for peer-to-peer (p2p) communications is obvious; current centralized solutions are capturing and storing too much information from the…”
Get full text
Conference Proceeding Journal Article -
3
Piecemeal Development of Intelligent Applications for Smart Spaces
Published in IEEE access (2014)“…Software development is facing new challenges as a result of evolution toward integration and collaboration-based service engineering, which embody high…”
Get full text
Journal Article -
4
A semi-automatic end-user programming approach for smart space application development
Published in Pervasive and mobile computing (01-06-2014)“…This article describes a semi-automatic end-user programming approach that: (i) assists in the creation of easy-to-apply Semantic End-User Application…”
Get full text
Journal Article -
5
Framework for end-user programming of cross-smart space applications
Published in Sensors (Basel, Switzerland) (01-11-2012)“…Cross-smart space applications are specific types of software services that enable users to share information, monitor the physical and logical surroundings…”
Get full text
Journal Article -
6
Trust Metrics Based on a Trusted Network Element
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01-08-2015)“…In this paper we study and propose a trust model and trust metric composition models based on a trusted network element. Our proposed model, executed in a…”
Get full text
Conference Proceeding -
7
A Demo on Using Visualization to Aid Run-Time Verification of Dynamic Service Systems
Published in 2010 Third International Conference on Software Testing, Verification, and Validation Workshops (01-04-2010)“…Future software systems will be dynamic service oriented systems. Service-Oriented Architecture (SOA) provides an extensible and dynamic architecture to be…”
Get full text
Conference Proceeding -
8
HELIOS a Decentralized Online Social Network Framework
Published in 2024 IEEE International Symposium on Technology and Society (ISTAS) (18-09-2024)“…Social Networking platforms are typically designed around a centralized server architecture. Reasons for this are amongst others, data and platform ownership,…”
Get full text
Conference Proceeding -
9
Programmatic Description Language for Cyber Range Topology Creation
Published in 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01-06-2022)“…Cyber Ranges are becoming a fundamental part of cybersecurity training and preparations, since they allow testing different scenarios in a safe, isolated and…”
Get full text
Conference Proceeding -
10
The Cyber-MAR Project: First Results and Perspectives on the Use of Hybrid Cyber Ranges for Port Cyber Risk Assessment
Published in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (26-07-2021)“…With over 80% of goods transportation in volume carried by sea, ports are key infrastructures within the logistics value chain. To address the challenges of…”
Get full text
Conference Proceeding -
11
Mitigating IoT security threats with a trusted Network element
Published in 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (01-12-2016)“…Securing the growing amount of IoT devices is a challenge for both the end-users bringing IoT devices into their homes, as well as the corporates and…”
Get full text
Conference Proceeding -
12
Virtualized security at the network edge: a user-centric approach
Published in IEEE communications magazine (01-04-2015)“…The current device-centric protection model against security threats has serious limitations. On one hand, the proliferation of user terminals such as…”
Get full text
Magazine Article -
13
Visualizing structure and quality properties of Smart Spaces
Published in The IEEE symposium on Computers and Communications (01-06-2010)“…Smart Spaces embedded into our surroundings are dynamic in nature; variable types and amount of services and applications are provided by a set of…”
Get full text
Conference Proceeding -
14
Developing Reusable Knowledge Processors for Smart Environments
Published in 2011 IEEE/IPSJ International Symposium on Applications and the Internet (01-07-2011)“…Software reuse brings a lot of benefits, from which time and cost savings are the most important. As smart environments grow in number, there will be numerous…”
Get full text
Conference Proceeding -
15
Architecture for end-user programming of cross-smart space applications
Published in 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (01-03-2012)“…This paper presents an architecture and execution components that assists the end-user programming of smart space applications that integrate the…”
Get full text
Conference Proceeding