Search Results - "Suarez Touceda, Diego"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Toward self-authenticable wearable devices by Paniagua Diez, Fidel, Suarez Touceda, Diego, Sierra Camara, Jose Maria, Zeadally, Sherali

    Published in IEEE wireless communications (01-02-2015)
    “…Wearable devices communicate among themselves, but they also need to communicate with remote entities through the Internet in order to share information. Given…”
    Get full text
    Journal Article
  2. 2

    Survey of Attacks and Defenses on P2PSIP Communications by Touceda, D. S., Sierra, J. M., Izquierdo, A., Schulzrinne, H.

    Published in IEEE Communications surveys and tutorials (01-01-2012)
    “…As with any other emerging system, the analysis of the security of Peer-to-Peer Session Initiation Protocol systems is of crucial importance for its secure…”
    Get full text
    Journal Article
  3. 3

    Modeling XACML Security Policies Using Graph Databases by Paniagua Diez, Fidel, Chikkanayakanahalli Vasu, Amrutha, Suarez Touceda, Diego, Sierra Camara, Jose Maria

    Published in IT professional (01-11-2017)
    “…XACML is a precise and complete access control language that defines an architecture to deploy access control services in a fine-grained way. However, when the…”
    Get full text
    Journal Article
  4. 4

    Attribute-based authorization for structured Peer-to-Peer (P2P) networks by Touceda, Diego Suárez, Cámara, José M. Sierra, Zeadally, Sherali, Soriano, Miguel

    Published in Computer standards and interfaces (01-11-2015)
    “…We present the deficiencies of traditional identity-based authorization models in structured Peer-to-Peer (P2P) networks where users' Public Key Certificates…”
    Get full text
    Journal Article Publication
  5. 5

    Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems by Suárez Touceda, Diego, Sierra Cámara, José M., Soriano, Miguel

    Published in Peer-to-peer networking and applications (01-06-2012)
    “…Several alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to…”
    Get full text
    Journal Article Publication
  6. 6

    Lightweight Access Control System for Wearable Devices by Diez, Fidel Paniagua, Touceda, Diego Suarez, Camara, Jose Maria Sierra, Zeadally, Sherali

    Published in IT professional (01-01-2019)
    “…Wearable devices are being used in areas such as the health and military environments where, due to information sensitivity, access control is essential. In…”
    Get full text
    Journal Article