Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Antonio Maña
Antonio Maña Gómez – Antonio Mana
2010 – today
- 2012
[j13]Antonio Muñoz, Javier Gonzalez, Antonio Maña: A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications. Comput. J. 55(8): 979-994 (2012)
[j12]Antonio Maña, Hristo Koshutanski, Ernesto J. Pérez: A trust negotiation based security framework for service provisioning in load-balancing clusters. Computers & Security 31(1): 4-25 (2012)
[j11]Pablo Antón, Antonio Muñoz, Antonio Maña, Hristo Koshutanski: Security-enhanced ambient assisted living supporting school activities during hospitalisation. J. Ambient Intelligence and Humanized Computing 3(3): 177-192 (2012)
[c53]George Spanoudakis, Ernesto Damiani, Antonio Maña: Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach. HASE 2012: 175-176
[c52]Pablo Antón, Antonio Muñoz, Antonio Maña: Authentication and Authorization in Ambient Assisting Living Applications: An Approach for UniversAAL. IWAAL 2012: 135-142
[c51]Jose Fran. Ruiz, Rajesh Harjani, Antonio Mana, Vasily Desnitsky, Igor Kotenko, Andrey Chechulin: A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components. PDP 2012: 261-268
[e3]Albert Levi, Mohamad Badra, Matteo Cesana, Mona Ghassemian, Özgür Gürbüz, Nafaâ Jabeur, Marek Klonowski, Antonio Maña, Susana Sargento, Sherali Zeadally (Eds.): 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. IEEE 2012, ISBN 978-1-4673-0229-6- 2011
[j10]Antonio Muñoz, Pablo Antón, Antonio Maña: Multiagent Systems Protection. Adv. Software Engineering 2011 (2011)
[j9]Ernesto Damiani, Sigrid Gürgens, Antonio Maña, George Spanoudakis, Claudio Agostino Ardagna: Editorial. Journal of Systems Architecture - Embedded Systems Design 57(3): 229-230 (2011)
[j8]Antonio Muñoz, Antonio Maña: TPM-based protection for mobile agents. Security and Communication Networks 4(1): 45-60 (2011)
[c50]Antonio Muñoz, Antonio Maña: Facilitating the Use of TPM Technologies Using the Serenity Framework. ATC 2011: 164-174
[c49]Antonio Muñoz, Pablo Antón, Antonio Maña: Static Mutual Approach for Protecting Mobile Agent. DCAI 2011: 51-58
[c48]Antonio Maña, Jose Fran. Ruiz: A Security Modelling Framework for Systems of Embedded Components. HASE 2011: 176-177
[c47]Javier González, Antonio Muñoz, Antonio Maña: Multi-layer Monitoring for Cloud Computing. HASE 2011: 291-298
[c46]Pablo Antón, Antonio Maña, Antonio Muñoz, Hristo Koshutanski: Live Interactive Frame Technology Alleviating Children Stress and Isolation during Hospitalization. IWAAL 2011: 92-100
[c45]Antonio Mana, Gimena Pujol, Claudia Pandolfo: A Distributed Secure Ontology for Certified Services Oriented Applications. ICSC 2011: 522-529- 2010
[j7]Hristo Koshutanski, Antonio Maña: Interoperable semantic access control for highly dynamic coalitions. Security and Communication Networks 3(6): 565-594 (2010)
[c44]Zoltán Miklós, Nicolas Bonvin, Paolo Bouquet, Michele Catasta, Daniele Cordioli, Peter Fankhauser, Julien Gaugaz, Ekaterini Ioannou, Hristo Koshutanski, Antonio Maña: From Web Data to Entities and Back. CAiSE 2010: 302-316
[c43]Antonio Maña, Gimena Pujol: Verification of Security Policy of Service Oriented Systems. DMS 2010: 120-125
[c42]Antonio Muñoz, Antonio Maña, Pablo Antón: In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware. MMM-ACNS 2010: 284-297
[c41]Antonio Muñoz, Antonio Maña, Pablo Antón: A Solution Based on Cryptographic Hardware to Protect Agents. NBiS 2010: 400-407
[c40]Marco Anisetti, Claudio Agostino Ardagna, Franco Guida, Sigrid Gürgens, Volkmar Lotz, Antonio Maña, Claudia Pandolfo, Jean-Christophe R. Pazzaglia, Gimena Pujol, George Spanoudakis: ASSERT4SOA: Toward Security Certification of Service-Oriented Applications. OTM Workshops 2010: 38-40
[e2]Boris E. R. de Ruyter, Reiner Wichert, David V. Keyson, Panos Markopoulos, Norbert Streitz, Monica Divitini, Nikolaos Georgantas, Antonio Maña Gómez (Eds.): Ambient Intelligence - First International Joint Conference, AmI 2010, Malaga, Spain, November 10-12, 2010. Proceedings. Lecture Notes in Computer Science 6439, Springer 2010, ISBN 978-3-642-16916-8
2000 – 2009
- 2009
[j6]Antonio Muñoz, Antonio Maña, Daniel Serrano: Protecting agents from malicious hosts using TPM. IJCSA 6(5): 30-58 (2009)
[c39]Antonio Muñoz, Antonio Maña, Daniel Serrano: SecMiLiA: An Approach in the Agent Protection. ARES 2009: 341-348
[c38]Antonio Muñoz, Antonio Maña, Daniel Serrano: AVISPA in the Validation of Ambient Intelligence Scenarios. ARES 2009: 420-426
[c37]Antonio Muñoz, Antonio Maña, Rajesh Harjani, Marioli Montenegro: Agent Protection Based on the Use of Cryptographic Hardware. COMPSAC (2) 2009: 312-317
[c36]Álvaro Armenteros, Antonio Muñoz, Antonio Maña, Daniel Serrano: Security and Dependability in Ambient Intelligence Scenarios - The Communication Prototype. ICEIS (3) 2009: 49-56
[c35]Antonio Muñoz, Antonio Maña, Daniel Serrano: Trusted Computing: The Cornerstone in the Secure Migration Library for Agents. PAAMS 2009: 256-265
[c34]Antonio Maña, Antonio Muñoz, Daniel Serrano: Hardware Protection of Agents in Ubiquitous and Ambient Intelligence Environments. PAAMS 2009: 470-479
[c33]Antonio Maña, Antonio Muñoz, Daniel Serrano: Protected Computing Approach: Towards the Mutual Protection of Agent Computing. PAAMS 2009: 538-547
[c32]Antonio Muñoz, Antonio Maña, Daniel Serrano: The Role of Trusted Computing in the Secure Migration Library for Agents. RCIS 2009: 255-264
[c31]Beatriz Gallego-Nicasio, Antonio Muñoz, Antonio Maña, Daniel Serrano: Security Patterns, Towards a Further Level. SECRYPT 2009: 349-356
[c30]
[p8]Antonio Maña, George Spanoudakis, Spyros Kokolakis: Introduction: The SERENITY vision. Security and Dependability for Ambient Intelligence 2009: 1-18
[p7]Francisco Sánchez-Cid, Antonio Maña, George Spanoudakis, Christos Kloukinas, Daniel Serrano, Antonio Muñoz: Representation of Security and Dependability Solutions. Security and Dependability for Ambient Intelligence 2009: 69-95
[p6]Daniel Serrano, Antonio Maña, Rafael Llarena, Beatriz Gallego-Nicasio Crespo, Keqin Li: SERENITY Aware Development of Security and Dependability Solutions. Security and Dependability for Ambient Intelligence 2009: 127-141
[p5]Daniel Serrano, Antonio Maña, Rafael Llarena, Beatriz Gallego-Nicasio Crespo, Keqin Li: SERENITY Aware System Development Process. Security and Dependability for Ambient Intelligence 2009: 165-179
[p4]Beatriz Gallego-Nicasio Crespo, Ana Piñuela, Pedro Soria-Rodriguez, Daniel Serrano, Antonio Maña: The SERENITY Runtime Framework. Security and Dependability for Ambient Intelligence 2009: 183-198
[p3]Beatriz Gallego-Nicasio Crespo, Ana Piñuela, Pedro Soria-Rodriguez, Daniel Serrano, Antonio Maña: Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime. Security and Dependability for Ambient Intelligence 2009: 199-212
[p2]Álvaro Armenteros, Laura García, Antonio Muñoz, Antonio Maña: Realising the Potential of Serenity in Emerging AmI Ecosystems: Implications and Challenges. Security and Dependability for Ambient Intelligence 2009: 323-342
[p1]Antonio Maña, George Spanoudakis, Spyros Kokolakis: Future Directions. Security and Dependability for Ambient Intelligence 2009: 379-383
[e1]Spyros Kokolakis, Antonio Maña Gómez, George Spanoudakis (Eds.): Security and Dependability for Ambient Intelligence. Advances in Information Security 45, Springer 2009, ISBN 978-0-387-88774-6- 2008
[c29]Antonio Maña, Gimena Pujol: Towards Formal Specification of Abstract Security Properties. ARES 2008: 80-87
[c28]Antonio Muñoz, Antonio Maña, Daniel Serrano: Model Cheking Ambient Intelligence with AVISPA. AMIF 2008: 182-193
[c27]Daniel Serrano, Antonio Maña, Athanasios-Dimitrios Sotirious: Towards Precise Security Patterns. DEXA Workshops 2008: 287-291
[c26]Francisco Sánchez-Cid, Antonio Maña: SERENITY Pattern-Based Software Development Life-Cycle. DEXA Workshops 2008: 305-309
[c25]Junaid Ahsenali Chaudhry, Themis Palpanas, Periklis Andritsos, Antonio Maña: Entity Lifecycle Management for OKKAM. IRSW 2008
[c24]Paolo Bouquet, Heiko Stoermer, Claudia Niederée, Antonio Mana: Entity Name System: The Back-Bone of an Open and Scalable Web of Data. ICSC 2008: 554-561
[c23]Hristo Koshutanski, Antonio Maña: A Semantic Approach to Access Control and Automated Credential Negotiation for Decentralized Online Repositories / An OKKAM Project Use Case. SWAP 2008- 2007
[c22]Francisco Sánchez-Cid, Antonio Mana: Patterns for Automated Management of Security and Dependability Solutions. DEXA Workshops 2007: 739-743
[c21]Sigrid Gürgens, Carsten Rudolph, Antonio Maña, Antonio Muñoz: Facilitating the Use of TPM Technologies through S&D Patterns. DEXA Workshops 2007: 765-769
[c20]
[c19]Antonio Maña, Antonio Muñoz, Daniel Serrano: Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence. UIC 2007: 1201-1212- 2006
[b1]Antonio Mana, Volkmar Lotz: Developing ambient intelligence - proceedings of the first international conference on ambient intelligence developments. Springer 2006, ISBN 978-2-287-47469-9, pp. I-X, 1-159
[c18]
[c17]Antonio Maña, Francisco Sánchez-Cid, Daniel Serrano, Antonio Muñoz: Towards Secure Ambient Intelligence Scenarios. SEKE 2006: 386-391
[c16]Javier Lopez, Antonio Maña, Antonio Muñoz: A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. UIC 2006: 977-987- 2005
[j5]Mariemma Inmaculada Yagüe del Valle, Antonio Maña, Javier Lopez: A metadata-based access control model for web services. Internet Research 15(1): 99-116 (2005)
[c15]Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana: Semantic Access Control Model: A Formal Specification. ESORICS 2005: 24-43
[c14]Carsten Rudolph, Antonio Mana: Specification and automated processing of security requirements (SAPS'05). ASE 2005: 460- 2004
[j4]Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega: PKI design based on the use of on-line certification authorities. Int. J. Inf. Sec. 2(2): 91-102 (2004)
[j3]Antonio Mana, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, José M. Troya: A framework for secure execution of software. Int. J. Inf. Sec. 3(2): 99-112 (2004)
[c13]Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Francisco Sánchez-Cid: Semantic Interoperability of Authorizations. WOSIS 2004: 269-278- 2003
[j2]Javier Lopez, Antonio Maña, Juan J. Ortega, José M. Troya, Mariemma Inmaculada Yagüe del Valle: Integrating PMI services in CORBA applications. Computer Standards & Interfaces 25(4): 391-409 (2003)
[j1]Mariemma Inmaculada Yagüe del Valle, Antonio Maña, Javier Lopez, Ernesto Pimentel, José M. Troya: A secure solution for commercial digital libraries. Online Information Review 27(3): 147-159 (2003)
[c12]Antonio Mana, José A. Montenegro, Carsten Rudolph, José Luis Vivas: A business process-driven approach to security engineering. DEXA Workshops 2003: 477-481
[c11]Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier Lopez, José M. Troya: Applying the Semantic Web Layers to Access Control. DEXA Workshops 2003: 622-626- 2002
[c10]Javier Lopez, Antonio Mana, Mariemma Inmaculada Yagüe del Valle: XML-Based Distributed Access Control System. EC-Web 2002: 203-213
[c9]
[c8]Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya: Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. EGOV 2002: 211-214
[c7]Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier Lopez, Ernesto Pimentel, José M. Troya: Secure Content Distribution for Digital Libraries. ICADL 2002: 483-494
[c6]Javier Lopez, Antonio Mana, Ernesto Pimentel, José M. Troya, Mariemma Inmaculada Yagüe del Valle: Access Control Infrastructure for Digital Objects. ICICS 2002: 399-410- 2001
[c5]- 2000
[c4]Javier Lopez, Antonio Mana, Juan J. Ortega, José M. Troya: Distributed Storage and Revocation in Digital Certificate Databases. DEXA 2000: 929-938
[c3]Jorge Davila, Javier Lopez, Antonio Mana, Juan J. Ortega, José M. Troya: Development of Secure Internet Applications for Governmental Environments. DEXA Workshop 2000: 362-368
1990 – 1999
- 1999
[c2]Javier Lopez, Antonio Mana, Juan J. Ortega: Cert'eM: Certification System Based on Electronic Mail Service Structure. CQRE 1999: 109-118- 1998
[c1]Antonio Maña Gómez, F. Villalba-Sánchez, Javier López: Secure Examinations through the Internet. Teleteaching 1998: 695-704
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:22 CEST by the dblp team



