Antonio Maña

Orcid: 0000-0001-5291-6174

Affiliations:
  • University of Málaga, Spain


According to our database1, Antonio Maña authored at least 98 papers between 1998 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Special issue on "Recent advances in ambient intelligence towards a smart and human-centered internet of things".
J. Ambient Intell. Humaniz. Comput., 2019

2017
Security knowledge representation artifacts for creating secure IT systems.
Comput. Secur., 2017

Interdisciplinarity in practice: Challenges and benefits for privacy research.
Comput. Law Secur. Rev., 2017

Towards Transparent and Trustworthy Cloud.
IEEE Cloud Comput., 2017

2015
An immersive view approach by secure interactive multimedia proof-of-concept implementation.
Multim. Tools Appl., 2015

An Integrated Security and Systems Engineering Process and Modelling Framework.
Comput. J., 2015

Building a Privacy Accountable Surveillance System.
Proceedings of the MODELSWARD 2015, 2015

2014
A special issue of ad hoc networks on "Smart solutions for mobility supported distributed and embedded systems".
Ad Hoc Networks, 2014

A security engineering process for systems of systems using security patterns.
Proceedings of the IEEE International Systems Conference, 2014

Software and Hardware Certification Techniques in a Combined Certification Model.
Proceedings of the SECRYPT 2014, 2014

Validation of a Security Metamodel for the Development of Cloud Applications.
Proceedings of the 14th International Workshop on OCL and Textual Modelling co-located with 17th International Conference on Model Driven Engineering Languages and Systems (MODELS 2014), 2014

Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
Emergency Systems Modelling using a Security Engineering Process.
Proceedings of the SIMULTECH 2013, 2013

Bridging the GAP between Software Certification and Trusted Computing for Securing Cloud Computing.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Improving Interoperability of Digital Certificates for Software & Services.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Workflow Operational Assurance Platform for Security-by-Design Certified Service-Based Coalitions.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Security Assurance of Services through Digital Security Certificates.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Improving Security Assurance of Services through Certificate Profiles.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2013

Secure Engineering and Modelling of a Metering Devices System.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Security-enhanced ambient assisted living supporting school activities during hospitalisation.
J. Ambient Intell. Humaniz. Comput., 2012

A trust negotiation based security framework for service provisioning in load-balancing clusters.
Comput. Secur., 2012

A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications.
Comput. J., 2012

A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

Authentication and Authorization in Ambient Assisting Living Applications: An Approach for UniversAAL.
Proceedings of the Ambient Assisted Living and Home Care - 4th International Workshop, 2012

Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

ConTur: An Intelligent Content Management System for the Tourism Sector.
Proceedings of the Information and Communication Technologies in Tourism 2012, 2012

2011
TPM-based protection for mobile agents.
Secur. Commun. Networks, 2011

Editorial.
J. Syst. Archit., 2011

Multiagent Systems Protection.
Adv. Softw. Eng., 2011

Policy Based Management for Security in Cloud Computing.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

Dynamic Security Monitoring and Accounting for Virtualized Environments.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

A Distributed Secure Ontology for Certified Services Oriented Applications.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

Live Interactive Frame Technology Alleviating Children Stress and Isolation during Hospitalization.
Proceedings of the Ambient Assisted Living - Third International Workshop, 2011

A Security Modelling Framework for Systems of Embedded Components.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Multi-layer Monitoring for Cloud Computing.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Static Mutual Approach for Protecting Mobile Agent.
Proceedings of the International Symposium on Distributed Computing and Artificial Intelligence, 2011

Facilitating the Use of TPM Technologies Using the Serenity Framework.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011

2010
Interoperable semantic access control for highly dynamic coalitions.
Secur. Commun. Networks, 2010

ASSERT4SOA: Toward Security Certification of Service-Oriented Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010

A Solution Based on Cryptographic Hardware to Protect Agents.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware.
Proceedings of the Computer Network Security, 2010

Advanced Security Service cERTificate for SOA: Certified Services go Digital.
Proceedings of the ISSE 2010, 2010

Verification of Security Policy of Service Oriented Systems.
Proceedings of the 16th International Conference on Distributed Multimedia Systems, 2010

From Web Data to Entities and Back.
Proceedings of the Advanced Information Systems Engineering, 22nd International Conference, 2010

2009
SERENITY Aware System Development Process.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

SERENITY Aware Development of Security and Dependability Solutions.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Representation of Security and Dependability Solutions.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Future Directions.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Introduction: The SERENITY vision.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

The SERENITY Runtime Framework.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Realising the Potential of Serenity in Emerging AmI Ecosystems: Implications and Challenges.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Protecting agents from malicious hosts using TPM.
Int. J. Comput. Sci. Appl., 2009

Toward WS-certificate.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009

Security Patterns, Towards a Further Level.
Proceedings of the SECRYPT 2009, 2009

The Role of Trusted Computing in the Secure Migration Library for Agents.
Proceedings of the Third IEEE International Conference on Research Challenges in Information Science, 2009

Trusted Computing: The Cornerstone in the Secure Migration Library for Agents.
Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, 2009

Protected Computing Approach: Towards the Mutual Protection of Agent Computing.
Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, 2009

Hardware Protection of Agents in Ubiquitous and Ambient Intelligence Environments.
Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, 2009

Security and Dependability in Ambient Intelligence Scenarios - The Communication Prototype.
Proceedings of the ICEIS 2009, 2009

Agent Protection Based on the Use of Cryptographic Hardware.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

AVISPA in the Validation of Ambient Intelligence Scenarios.
Proceedings of the The Forth International Conference on Availability, 2009

SecMiLiA: An Approach in the Agent Protection.
Proceedings of the The Forth International Conference on Availability, 2009

2008
A Semantic Approach to Access Control and Automated Credential Negotiation for Decentralized Online Repositories / An OKKAM Project Use Case.
Proceedings of the 5th Workshop on Semantic Web Applications and Perspectives (SWAP2008), 2008

Entity Name System: The Back-Bone of an Open and Scalable Web of Data.
Proceedings of the 2th IEEE International Conference on Semantic Computing (ICSC 2008), 2008

Entity Lifecycle Management for OKKAM.
Proceedings of the 1st IRSW2008 International Workshop on Identity and Reference on the Semantic Web, 2008

Towards Precise Security Patterns.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

SERENITY Pattern-Based Software Development Life-Cycle.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

Model Cheking Ambient Intelligence with AVISPA.
Proceedings of the Ambient Intelligence Perspectives, 2008

Towards Formal Specification of Abstract Security Properties.
Proceedings of the The Third International Conference on Availability, 2008

2007
Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Trusted Code Execution in JavaCard.
Proceedings of the Trust, 2007

Patterns for Automated Management of Security and Dependability Solutions.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Facilitating the Use of TPM Technologies through S&D Patterns.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2006
A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Towards Secure Ambient Intelligence Scenarios.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Protected computing vs. trusted computing.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

Developing ambient intelligence - proceedings of the first international conference on ambient intelligence developments.
Springer, ISBN: 978-2-287-47469-9, 2006

2005
A metadata-based access control model for web services.
Internet Res., 2005

Specification and automated processing of security requirements (SAPS'05).
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

Semantic Access Control Model: A Formal Specification.
Proceedings of the Computer Security, 2005

2004
A framework for secure execution of software.
Int. J. Inf. Sec., 2004

PKI design based on the use of on-line certification authorities.
Int. J. Inf. Sec., 2004

Semantic Interoperability of Authorizations.
Proceedings of the Security In Information Systems, 2004

2003
A secure solution for commercial digital libraries.
Online Inf. Rev., 2003

Integrating PMI services in CORBA applications.
Comput. Stand. Interfaces, 2003

Applying the Semantic Web Layers to Access Control.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

A business process-driven approach to security engineering.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Access Control Infrastructure for Digital Objects.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Secure Content Distribution for Digital Libraries.
Proceedings of the Digital Libraries: People, 2002

Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations.
Proceedings of the Electronic Government, First International Conference, 2002

Practical Mobile Digital Signatures.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

XML-Based Distributed Access Control System.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

2001
An Efficient Software Protection Scheme.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

2000
Development of Secure Internet Applications for Governmental Environments.
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000

Distributed Storage and Revocation in Digital Certificate Databases.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

1999
Cert'eM: Certification System Based on Electronic Mail Service Structure.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1998
Secure Examinations through the Internet.
Proceedings of the Teleteaching '98 - Distance Learning, 1998


  Loading...