Antonio Muñoz

Orcid: 0000-0002-6751-0625

Affiliations:
  • University of Málaga, Computer Science Department, Spain (PhD 2010)


According to our database1, Antonio Muñoz authored at least 48 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EventGeoScout: Fostering Citizen Empowerment and Augmenting Data Quality through Collaborative Geographic Information Governance and Optimization.
ISPRS Int. J. Geo Inf., February, 2024

2023
Strengthening Privacy and Data Security in Biomedical Microelectromechanical Systems by IoT Communication Security and Protection in Smart Healthcare.
Sensors, November, 2023

A survey on the (in)security of trusted execution environments.
Comput. Secur., June, 2023

2022
SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform.
Sensors, 2022

Secure Mobile Agents on Embedded Boards: a TPM based solution.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements.
Inf., 2021

A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
TPM, a pattern for an architecture for trusted computing.
Proceedings of the EuroPLoP '20: European Conference on Pattern Languages of Programs 2020, 2020

ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM).
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
Use of an ANN to Value MTF and Melatonin Effect on ADHD Affected Children.
IEEE Access, 2019

2018
Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2015
An immersive view approach by secure interactive multimedia proof-of-concept implementation.
Multim. Tools Appl., 2015

2014
Software and Hardware Certification Techniques in a Combined Certification Model.
Proceedings of the SECRYPT 2014, 2014

2013
Bridging the GAP between Software Certification and Trusted Computing for Securing Cloud Computing.
Proceedings of the IEEE Ninth World Congress on Services, 2013

2012
Security-enhanced ambient assisted living supporting school activities during hospitalisation.
J. Ambient Intell. Humaniz. Comput., 2012

A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications.
Comput. J., 2012

Authentication and Authorization in Ambient Assisting Living Applications: An Approach for UniversAAL.
Proceedings of the Ambient Assisted Living and Home Care - 4th International Workshop, 2012

2011
TPM-based protection for mobile agents.
Secur. Commun. Networks, 2011

Multiagent Systems Protection.
Adv. Softw. Eng., 2011

Policy Based Management for Security in Cloud Computing.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

Dynamic Security Monitoring and Accounting for Virtualized Environments.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

Live Interactive Frame Technology Alleviating Children Stress and Isolation during Hospitalization.
Proceedings of the Ambient Assisted Living - Third International Workshop, 2011

Multi-layer Monitoring for Cloud Computing.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Static Mutual Approach for Protecting Mobile Agent.
Proceedings of the International Symposium on Distributed Computing and Artificial Intelligence, 2011

Facilitating the Use of TPM Technologies Using the Serenity Framework.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011

2010
A Solution Based on Cryptographic Hardware to Protect Agents.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware.
Proceedings of the Computer Network Security, 2010

2009
Representation of Security and Dependability Solutions.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Verification of S&D Solutions for Network Communications and Devices.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Realising the Potential of Serenity in Emerging AmI Ecosystems: Implications and Challenges.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Protecting agents from malicious hosts using TPM.
Int. J. Comput. Sci. Appl., 2009

Security Patterns, Towards a Further Level.
Proceedings of the SECRYPT 2009, 2009

The Role of Trusted Computing in the Secure Migration Library for Agents.
Proceedings of the Third IEEE International Conference on Research Challenges in Information Science, 2009

Trusted Computing: The Cornerstone in the Secure Migration Library for Agents.
Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, 2009

Protected Computing Approach: Towards the Mutual Protection of Agent Computing.
Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, 2009

Hardware Protection of Agents in Ubiquitous and Ambient Intelligence Environments.
Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, 2009

Security and Dependability in Ambient Intelligence Scenarios - The Communication Prototype.
Proceedings of the ICEIS 2009, 2009

Agent Protection Based on the Use of Cryptographic Hardware.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

AVISPA in the Validation of Ambient Intelligence Scenarios.
Proceedings of the The Forth International Conference on Availability, 2009

SecMiLiA: An Approach in the Agent Protection.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Model Cheking Ambient Intelligence with AVISPA.
Proceedings of the Ambient Intelligence Perspectives, 2008

2007
Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Trusted Code Execution in JavaCard.
Proceedings of the Trust, 2007

Facilitating the Use of TPM Technologies through S&D Patterns.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2006
A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Towards Secure Ambient Intelligence Scenarios.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Protected computing vs. trusted computing.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
On Secure Profiling.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005


  Loading...