José A. Montenegro

Orcid: 0000-0001-6967-0801

According to our database1, José A. Montenegro authored at least 26 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EventGeoScout: Fostering Citizen Empowerment and Augmenting Data Quality through Collaborative Geographic Information Governance and Optimization.
ISPRS Int. J. Geo Inf., February, 2024

2019
Energy-aware environments for the development of green applications for cyber-physical systems.
Future Gener. Comput. Syst., 2019

2018
What Do Software Developers Need to Know to Build Secure Energy-Efficient Android Applications?
IEEE Access, 2018

2017
Green Security Plugin for Pervasive Computing Using the HADAS Toolkit.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2014
A practical solution for sealed bid and multi-currency auctions.
Comput. Secur., 2014

2013
Secure sealed-bid online auctions using discreet cryptographic proofs.
Math. Comput. Model., 2013

2010
Pervasive authentication and authorization infrastructures for mobile users.
Comput. Secur., 2010

2008
Enabling Attribute Delegation in Ubiquitous Environments.
Mob. Networks Appl., 2008

2007
On the deployment of a real scalable delegation service.
Inf. Secur. Tech. Rep., 2007

Implementation aspects of a delegation system.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

Attribute delegation in ubiquitous environments.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

2006
Service-Oriented Security Architecture for CII based on Sensor Networks.
Proceedings of the Second International Workshop on Security, 2006

Attribute Delegation Based on Ontologies and Context Information.
Proceedings of the Communications and Multimedia Security, 2006

Graphical Representation of Authorization Policies for Weighted Credentials.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce.
Proceedings of the The First International Conference on Availability, 2006

2005
Specification and design of advanced authentication and authorization services.
Comput. Stand. Interfaces, 2005

A Representation Model of Trust Relationships with Delegation Extensions.
Proceedings of the Trust Management, Third International Conference, 2005

Design of an Enhanced PKI for Ubiquitous Networks.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

2004
PKI design based on the use of on-line certification authorities.
Int. J. Inf. Sec., 2004

A First Approach to Provide Anonymity in Attribute Certificates.
Proceedings of the Public Key Cryptography, 2004

A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation.
Proceedings of the Public Key Infrastructure, 2004

2003
Towards a Business Process-Driven Framework for Security Engineering with the UML.
Proceedings of the Information Security, 6th International Conference, 2003

A business process-driven approach to security engineering.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.
Proceedings of the Information Security, 5th International Conference, 2002

Design of a VPN Software Solution Integrating TCP and UDP Services.
Proceedings of the Infrastructure Security, International Conference, 2002

Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations.
Proceedings of the Electronic Government, First International Conference, 2002


  Loading...