This page has only limited features, please log in for full access.
Dr. Antonio Muñoz started his professional development in 2004, when he finished his studies as a computer engineer at University of M\'alaga. That year he became part of the Languages and Computer Science department at University of M\'alaga, mainly focused over security. Here he developed his activity for fifteen years as a researcher. During this period he combined his PhD activities together with some other interesting works regarding security engineering, trusted computing and protection on mobile agents. Finally, he received his PhD degree in 2010. Henceforth he was a visiting researcher at Fraunhofer SIT, Darmstadt and Neurosoft, Athens. He is currently part of the NICS lab headed by professor Javier L\'opez and he is assistant professor at Languages and Computer Department in University of M\'alaga. He cooperates as security expert for Ericsson. He has more than 15 years or experience as Software Architect. He holds his PhD an MSc degree in Computer Science and a Postgraduate Master degree in Software Engineer and Artificial Intelligence, both of them from the University of Malaga. He has been researcher in the GISUM group at the University of Malaga since 2003. His principal research interests are in the area of Agent technology, Digital Content Protection, Cryptographic Hardware based Systems, Security Patterns and Security Engineering.
Over the past decade, software development has evolved from a rigid, linear process to a highly automated and flexible one, thanks to the emergence of continuous integration and delivery environments. Nowadays, more and more development teams rely on such environments to build their complex projects, as the advantages they offer are numerous. On the security side, however, most environments seem to focus on authentication, neglecting other critical aspects, such as the integrity of the source code and the compiled binaries. To ensure the soundness of a software project, its source code must be secured from malicious modifications. Yet, no method can accurately verify that the integrity of a project’s source code has not been breached. This paper presents P2ISE, a novel integrity-preserving tool that provides strong security assertions for developers against attackers. At the heart of P2ISE lies the TPM trusted computing technology, which is leveraged to ensure integrity preservation. We have implemented the P2ISE and quantitatively assessed its performance and efficiency.
Antonio Muñoz; Aristeidis Farao; Jordy Ryan Casas Correia; Christos Xenakis. P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements. Information 2021, 12, 357 .
AMA StyleAntonio Muñoz, Aristeidis Farao, Jordy Ryan Casas Correia, Christos Xenakis. P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements. Information. 2021; 12 (9):357.
Chicago/Turabian StyleAntonio Muñoz; Aristeidis Farao; Jordy Ryan Casas Correia; Christos Xenakis. 2021. "P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements." Information 12, no. 9: 357.
Nowadays one of the main focuses of the Spanish University system is achieving the active learning paradigm in the context of its integration into the European Higher Education Area. This goal is being addressed by means of the application of novel teaching mechanisms. Among a wide variety of learning approaches, the present work focuses on peer review, understood as a collaborative learning technique where students assess other student’s work and provide their own feedback. In this way, peer review has the overarching goal of improving the student learning during this process. Peer review has been successfully applied and analyzed in the literature. Indeed, many authors also recommend improving the design and implementation of self and peer review, which has been our main goal. This paper presents an empirical study based on the application of peer review assessment in different higher education BSc and MSc courses. In this way, six courses from different studies at the University of Malaga in Spain are subject to the application of peer review strategies to promote student learning and develop cross-wise skills such as critical thinking, autonomy and responsibility. Based on these experiences, a deep analysis of the results is performed, showing that a proper application of the peer review methodology provides reliable reviews (with close scores to the ones from the teacher) as well as an improvement in the students’ performance.
Juan Serrano-Aguilera; Alicia Tocino; Sergio Fortes; Cristian Martín; Pere Mercadé-Melé; Rafael Moreno-Sáez; Antonio Muñoz; Sara Palomo-Hierro; Antoni Torres. Using Peer Review for Student Performance Enhancement: Experiences in a Multidisciplinary Higher Education Setting. Education Sciences 2021, 11, 71 .
AMA StyleJuan Serrano-Aguilera, Alicia Tocino, Sergio Fortes, Cristian Martín, Pere Mercadé-Melé, Rafael Moreno-Sáez, Antonio Muñoz, Sara Palomo-Hierro, Antoni Torres. Using Peer Review for Student Performance Enhancement: Experiences in a Multidisciplinary Higher Education Setting. Education Sciences. 2021; 11 (2):71.
Chicago/Turabian StyleJuan Serrano-Aguilera; Alicia Tocino; Sergio Fortes; Cristian Martín; Pere Mercadé-Melé; Rafael Moreno-Sáez; Antonio Muñoz; Sara Palomo-Hierro; Antoni Torres. 2021. "Using Peer Review for Student Performance Enhancement: Experiences in a Multidisciplinary Higher Education Setting." Education Sciences 11, no. 2: 71.
Software development has passed from being rigid and not very flexible, to be automated with constant changes. This happens due to the creation of continuous integration and delivery environments. Nevertheless, developers often rely on such environments due to the large number of amenities they offer. They focus on authentication only, without taking into consideration other aspects of security such as the integrity of the source code and of the compiled binaries. The source code of a software project must not be maliciously modified. Notwithstanding, there is no safe method to verify that its integrity has not been violated. Trusted computing technology, in particular, the Trusted Platform Module (TPM) can be used to implement that secure method.
Antonio Muñoz; Aristeidis Farao; Jordy Ryan Casas Correia; Christos Xenakis. ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM). Transactions on Petri Nets and Other Models of Concurrency XV 2020, 147 -165.
AMA StyleAntonio Muñoz, Aristeidis Farao, Jordy Ryan Casas Correia, Christos Xenakis. ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM). Transactions on Petri Nets and Other Models of Concurrency XV. 2020; ():147-165.
Chicago/Turabian StyleAntonio Muñoz; Aristeidis Farao; Jordy Ryan Casas Correia; Christos Xenakis. 2020. "ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM)." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 147-165.
Sleep disorders is one of the most frequent child medical consultation, indeed the rate of children that suffer it in a transitory way is considerably high. Among the most common sleep disorders is named “children behavioral insomnia“, many different drugs has been used as treatment with poor results with relevant secondary effects. We focus on children with ADHD that present sleep disorders among most frequent comorbidities. The most relevant contribution of this work is the use of an artificial neural network (ANN) for unsupervised learning called the Growing Neural Forest (GNF), which is a variation of the Growing Neural Gas (GNG) model where a set of trees is learnt instead of a general graph so that input data can be better represented, to study actigraphic data to evaluate the use of MTF and melatonin in a group of children with sleep disorders. Thus, the GNF model is trained with actigraphic data from children ADHD affected as input data. The GNG and SOM (Self-Organizing Map) models are also trained with these data for comparative purposes. Experimental results demonstrate that sleep was not affected by administrating drugs (MFT and melatonin).
Antonio Munoz; Esteban J. Palomo; Antonio Jerez-Calero; Antonio Muqoz. Use of an ANN to Value MTF and Melatonin Effect on ADHD Affected Children. IEEE Access 2019, 7, 127254 -127264.
AMA StyleAntonio Munoz, Esteban J. Palomo, Antonio Jerez-Calero, Antonio Muqoz. Use of an ANN to Value MTF and Melatonin Effect on ADHD Affected Children. IEEE Access. 2019; 7 (99):127254-127264.
Chicago/Turabian StyleAntonio Munoz; Esteban J. Palomo; Antonio Jerez-Calero; Antonio Muqoz. 2019. "Use of an ANN to Value MTF and Melatonin Effect on ADHD Affected Children." IEEE Access 7, no. 99: 127254-127264.
This chapter reviews the notions of security and dependability properties from the perspective of software engineering, providing the reader with a technical background on dynamic verification and runtime monitoring techniques. The chapter covers the technical background on security and dependability properties with system verification through dynamic verification or monitoring. The authors initially provide a short overview of the security and dependability properties themselves. Once definitions of security and dependability properties are introduced, they present a critical analysis of current research on dynamic verification by presenting general purpose and security oriented dynamic verification approaches.
Antonio Muñoz; Jamal Toutouh; Francisco Jaime. A Review of Dynamic Verification of Security and Dependability Properties. Genetic Algorithms and Applications for Stock Trading Optimization 2019, 162 -187.
AMA StyleAntonio Muñoz, Jamal Toutouh, Francisco Jaime. A Review of Dynamic Verification of Security and Dependability Properties. Genetic Algorithms and Applications for Stock Trading Optimization. 2019; ():162-187.
Chicago/Turabian StyleAntonio Muñoz; Jamal Toutouh; Francisco Jaime. 2019. "A Review of Dynamic Verification of Security and Dependability Properties." Genetic Algorithms and Applications for Stock Trading Optimization , no. : 162-187.
This chapter reviews current technologies used to build secure agents. A wide spectrum of mechanisms to provide security to agent-based systems is provided, giving an overview with the main agent-based systems and agent-oriented tools. An evaluation of security mechanisms is done that identifies security weaknesses. This review covers from the initial approaches to the more recent mechanisms. This analysis draws attention to the fact that these systems have traditionally neglected the need of a secure underlying infrastructure.
Antonio Muñoz. A Review of Security Mechanisms for Multi-Agent Systems. Artificial Intelligence and Security Challenges in Emerging Networks 2019, 38 -62.
AMA StyleAntonio Muñoz. A Review of Security Mechanisms for Multi-Agent Systems. Artificial Intelligence and Security Challenges in Emerging Networks. 2019; ():38-62.
Chicago/Turabian StyleAntonio Muñoz. 2019. "A Review of Security Mechanisms for Multi-Agent Systems." Artificial Intelligence and Security Challenges in Emerging Networks , no. : 38-62.
Jamal Toutouh; Antonio Muñoz; Sergio Nesmachnow. Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications. Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering 2018, 32 .
AMA StyleJamal Toutouh, Antonio Muñoz, Sergio Nesmachnow. Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications. Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering. 2018; ():32.
Chicago/Turabian StyleJamal Toutouh; Antonio Muñoz; Sergio Nesmachnow. 2018. "Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications." Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering , no. : 32.
Antonio Muñoz; Antonio Maña. Software and Hardware Certification Techniques in a Combined Certification Model. Proceedings of the 10th International Conference on Security and Cryptography 2014, 405 -410.
AMA StyleAntonio Muñoz, Antonio Maña. Software and Hardware Certification Techniques in a Combined Certification Model. Proceedings of the 10th International Conference on Security and Cryptography. 2014; ():405-410.
Chicago/Turabian StyleAntonio Muñoz; Antonio Maña. 2014. "Software and Hardware Certification Techniques in a Combined Certification Model." Proceedings of the 10th International Conference on Security and Cryptography , no. : 405-410.
Live media streaming is a field that recently has had a great impact in the scientific community, especially in the case of interactive media streaming. In this paper we propose a reference architecture conceptualizing an immersive view effect by considering heterogeneous tracking devices and enriched movement control over heterogeneous stream image sources. A proof-of-concept prototype implementation of the reference architecture is presented, called Live Interactive FramE (LIFE), illustrating the potential and value of the immersive view concept. Our work is part of the DESEOS research project that aims at applying an Ambient Assisted Living paradigm to a targeted scenario of hospitalised children. The main goal of LIFE is reducing stress and isolation during hospitalisation by enabling an immersive view of school activities via live media streaming. Functional and security aspects of LIFE are presented along with details of implementation and performance evaluation. Conclusions of experiments show that LIFE enables practical secure media streaming solution with optimal video quality settings.
Pablo Antón; Antonio Maña; Antonio Muñoz; Hristo Koshutanski. An immersive view approach by secure interactive multimedia proof-of-concept implementation. Multimedia Tools and Applications 2013, 74, 8401 -8420.
AMA StylePablo Antón, Antonio Maña, Antonio Muñoz, Hristo Koshutanski. An immersive view approach by secure interactive multimedia proof-of-concept implementation. Multimedia Tools and Applications. 2013; 74 (19):8401-8420.
Chicago/Turabian StylePablo Antón; Antonio Maña; Antonio Muñoz; Hristo Koshutanski. 2013. "An immersive view approach by secure interactive multimedia proof-of-concept implementation." Multimedia Tools and Applications 74, no. 19: 8401-8420.
In this chapter, the authors provide an overview of the importance of the monitoring of security properties in cloud computing scenarios. They then present an approach based on monitoring security properties in cloud systems based on a diagnosis framework that supports the specification and monitoring of properties expressed in Event Calculus (EC) as rules as the basis. The provision of diagnosis information is based on the generation of alternative explanations for the events that are involved in the violations of rules. This approach is based on Virtualization Architectures that presents several threats identified in the instrumentation of Virtualized Environments. The monitoring model presented in this chapter focuses on runtime supervision of applications, allowing the detection of problems in the operation of individual instances of applications and supporting the automated reconfiguration of these applications. This infrastructure has been recently designed as part of the PASSIVE project. To the best of the authors’ knowledge, there is not any other infrastructure providing the same features as the one presented in this chapter. For this reason, not much directly related previous work is found in the literature.
Antonio Muñoz; Antonio Maña; Javier González. Dynamic Security Properties Monitoring Architecture for Cloud Computing. Security Engineering for Cloud Computing 2013, 1 -18.
AMA StyleAntonio Muñoz, Antonio Maña, Javier González. Dynamic Security Properties Monitoring Architecture for Cloud Computing. Security Engineering for Cloud Computing. 2013; ():1-18.
Chicago/Turabian StyleAntonio Muñoz; Antonio Maña; Javier González. 2013. "Dynamic Security Properties Monitoring Architecture for Cloud Computing." Security Engineering for Cloud Computing , no. : 1-18.
Security is considered one of the crucial issues for the widespread adoption of cloud computing. Despite all research done in preventive security for cloud computing, the high complexity and the interdependence of many software layers and infrastructures mean that in practice there are always chances for something going wrong. For this reason, there is a need to complement preventive security measures with reactive measures. Among these, monitoring is the most relevant approach. In this paper, we introduce a new and robust architecture for dynamic security monitoring and enforcement specially designed for cloud computing scenarios. Our solution is therefore a complete one including a three-layered architecture, a new language for expressing monitoring rules and a strategy based on the generation of a finite-state machine to improve the performance of the monitoring engine.
Antonio Muñoz; Javier Gonzalez; Antonio Maña. A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications. The Computer Journal 2012, 55, 979 -994.
AMA StyleAntonio Muñoz, Javier Gonzalez, Antonio Maña. A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications. The Computer Journal. 2012; 55 (8):979-994.
Chicago/Turabian StyleAntonio Muñoz; Javier Gonzalez; Antonio Maña. 2012. "A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications." The Computer Journal 55, no. 8: 979-994.
In recent years the number of Ambient Intelligent systems is growing steadily, especially several fields such as domotic and remote teaching are practical applications of AmI. A relevant characteristic of these systems is sharing a double goal, comfort and simplicity of final users. However, the adoption of these scenarios lacks of a security basis. We defend that security is an essential feature to deploy in any kind of system. Security in conventional systems is a currently unsolved challenge and new attacks and vulnerabilities of systems arise everyday, in AAL systems the problem is even more complex since whether security challenges are hard in homogeneous solutions these escalate when moving to highly dynamic and heterogeneous systems. Several technical solutions have been proposed for specific security components in AAL systems, but the problem to solve the security of the whole system is still open. We address this problem providing a security architecture for the universAAL infrastructure. Among all the different security properties (trust, authenticity, integrity, confidentiality and accountability) we focus on the authorization and authentication, this paper presents a semantic based access control model for universAAL.
Pablo Antón; Antonio Muñoz; Antonio Maña. Authentication and Authorization in Ambient Assisting Living Applications: An Approach for UniversAAL. Computer Vision 2012, 7657, 135 -142.
AMA StylePablo Antón, Antonio Muñoz, Antonio Maña. Authentication and Authorization in Ambient Assisting Living Applications: An Approach for UniversAAL. Computer Vision. 2012; 7657 ():135-142.
Chicago/Turabian StylePablo Antón; Antonio Muñoz; Antonio Maña. 2012. "Authentication and Authorization in Ambient Assisting Living Applications: An Approach for UniversAAL." Computer Vision 7657, no. : 135-142.
In this paper we present the design of an architecture for dynamic security monitoring and enforcement, based on software protection scheme, for client software running in Virtualized Environments. Monitoring mechanisms check a set of policy-defined conditions at runtime to detect threats or anomalous behaviour. Enforcement will be achieved using secure software execution methods that comply with the policies defined. The architecture presented allows for context adaptation of the policies defined using the language defined in PASSIVE. The automatic runtime enforcement of these policies is crucial to achieve real security in virtualized platforms.
Antonio Muñoz; Rajesh Harjani; Antonio Maña; Rodrigo Díaz. Dynamic Security Monitoring and Accounting for Virtualized Environments. Programmieren für Ingenieure und Naturwissenschaftler 2011, 182 -189.
AMA StyleAntonio Muñoz, Rajesh Harjani, Antonio Maña, Rodrigo Díaz. Dynamic Security Monitoring and Accounting for Virtualized Environments. Programmieren für Ingenieure und Naturwissenschaftler. 2011; ():182-189.
Chicago/Turabian StyleAntonio Muñoz; Rajesh Harjani; Antonio Maña; Rodrigo Díaz. 2011. "Dynamic Security Monitoring and Accounting for Virtualized Environments." Programmieren für Ingenieure und Naturwissenschaftler , no. : 182-189.
In terms of the mobile agent paradigm, multi-agent systems represent a promising technology for emerging Ambient Intelligent scenarios in which a huge number of devices interact. Unfortunately, the lack of appropriate security mechanisms, both their enforcement and usability, is hindering the application of this paradigm in real world applications. In this paper, we present a software based solution for the protection of multi-agent systems. Our solution is focused on the cooperative agents model and the core of this concept is the protected computing approach. Finally, one of the most appealing aspects of this approach is based on its user friendly style for agent based system developers who are not security experts.
Antonio Muñoz; Pablo Antón; Antonio Maña. Static Mutual Approach for Protecting Mobile Agent. Advances in Intelligent and Soft Computing 2011, 91, 51 -58.
AMA StyleAntonio Muñoz, Pablo Antón, Antonio Maña. Static Mutual Approach for Protecting Mobile Agent. Advances in Intelligent and Soft Computing. 2011; 91 ():51-58.
Chicago/Turabian StyleAntonio Muñoz; Pablo Antón; Antonio Maña. 2011. "Static Mutual Approach for Protecting Mobile Agent." Advances in Intelligent and Soft Computing 91, no. : 51-58.
Children that spend long periods in hospitals suffer different negative effects that affect their emotional and psychological development including sleep disorders, stress, and degradation of school performance. A common reason behind these effects is related to breaking of normal relationships and lack of contacts with the daily environments (family, friends, school, etc.). In this paper we describe a system called Live Interactive Frame (LIFE), developed in DESEOS research project, to address this situation. The LIFE system provides children with live interactive visual contact of their school activities during hospitalization with the goal of reducing the stress and feeling of isolation.
Pablo Antón; Antonio Maña; Antonio Muñoz; Hristo Koshutanski. Live Interactive Frame Technology Alleviating Children Stress and Isolation during Hospitalization. Transactions on Petri Nets and Other Models of Concurrency XV 2011, 6693, 92 -100.
AMA StylePablo Antón, Antonio Maña, Antonio Muñoz, Hristo Koshutanski. Live Interactive Frame Technology Alleviating Children Stress and Isolation during Hospitalization. Transactions on Petri Nets and Other Models of Concurrency XV. 2011; 6693 ():92-100.
Chicago/Turabian StylePablo Antón; Antonio Maña; Antonio Muñoz; Hristo Koshutanski. 2011. "Live Interactive Frame Technology Alleviating Children Stress and Isolation during Hospitalization." Transactions on Petri Nets and Other Models of Concurrency XV 6693, no. : 92-100.
Trusted platform modules (TPMs) specification is highly complex and therefore the deployment of TPM –based security solutions is equally complicated and difficult; although they can provide a wide range of security functionalities. In order to make TPM technology available to system engineers without their needing to have in-depth knowledge of trusted computing specifications we propose, in this paper, to develop an approach using security patterns to specify TPM-based security solutions. Ideally suited to producing precise specifications of TPM –based solutions for certain security goals are the refined notions of security patterns developed in the SERENITY research project.
Antonio Muñoz; Antonio Maña. Facilitating the Use of TPM Technologies Using the Serenity Framework. Transactions on Petri Nets and Other Models of Concurrency XV 2011, 6906, 164 -174.
AMA StyleAntonio Muñoz, Antonio Maña. Facilitating the Use of TPM Technologies Using the Serenity Framework. Transactions on Petri Nets and Other Models of Concurrency XV. 2011; 6906 ():164-174.
Chicago/Turabian StyleAntonio Muñoz; Antonio Maña. 2011. "Facilitating the Use of TPM Technologies Using the Serenity Framework." Transactions on Petri Nets and Other Models of Concurrency XV 6906, no. : 164-174.
Cloud computing is one of the biggest trends in information technology, with individuals, companies and even governments moving towards their use to save costs and increase flexibility. Cloud infrastructures are typically based on virtualised environments, to allow physical infrastructure to be shared by multiple end users. These infrastructures can be very large and complex, with many end users, making their configuration difficult, error-prone and time-consuming. At the same time, the fact that diverse end users share the same physical infrastructure raises security concerns, and can lead to a significant impact from misconfiguration or being slow to react to attacks. In this paper, we focus on the use of Policy Based Management techniques to manage cloud infrastructure, identifying the requirements, surveying the state-of-the-art, identifying the challenges and proposing potential solutions.
Adrian Waller; Ian Sandy; Eamonn Power; Efthimia Aivaloglou; Charalampos Skianis; Antonio Muñoz; Antonio Maña. Policy Based Management for Security in Cloud Computing. Communications in Computer and Information Science 2011, 130 -137.
AMA StyleAdrian Waller, Ian Sandy, Eamonn Power, Efthimia Aivaloglou, Charalampos Skianis, Antonio Muñoz, Antonio Maña. Policy Based Management for Security in Cloud Computing. Communications in Computer and Information Science. 2011; ():130-137.
Chicago/Turabian StyleAdrian Waller; Ian Sandy; Eamonn Power; Efthimia Aivaloglou; Charalampos Skianis; Antonio Muñoz; Antonio Maña. 2011. "Policy Based Management for Security in Cloud Computing." Communications in Computer and Information Science , no. : 130-137.
Mobile agent is a promising paradigm for emerging ubiquitous computing and ambient intelligent scenarios. We believe that security is the most important issue for the widespread deployment of applications based on mobile agent technology. Indeed, community agrees that without the proper security mechanisms, use of mobile agent‐based applications will be impossible. From our perspective, the security problem in mobile agents is the gathering of two subproblems; the problem of the agent protection and the problem of the host protection. This paper presents a hardware‐based mechanism focused on solving the protection of the agent problem, which is a well known problem named the ‘malicious host’. The solution presented in this paper bases its security in the trust and the security functionalities provided by the trusted platform module (TPM). Thus, migration process of mobile agents is protected when it actually takes place. A complete description of the secure migration can be found in the secure migration protocol section of this paper. Moreover, a validation of this protocol was performed by means of the AVISPA tool suite. Additionally, a first study about the use of an alternative protocol as the direct anonymous attestation protocol was done. Finally, the result of this work is the Secure Migration Library for agents (SecMiLiA), which is completely described in following sections. Copyright © 2010 John Wiley & Sons, Ltd.
Antonio Muñoz; Antonio Maña. TPM-based protection for mobile agents. Security and Communication Networks 2010, 4, 45 -60.
AMA StyleAntonio Muñoz, Antonio Maña. TPM-based protection for mobile agents. Security and Communication Networks. 2010; 4 (1):45-60.
Chicago/Turabian StyleAntonio Muñoz; Antonio Maña. 2010. "TPM-based protection for mobile agents." Security and Communication Networks 4, no. 1: 45-60.
Children that spend long periods in hospitals suffer different negative effects that affect their emotional and psychological development and their family life. Among these effects, sleep disorders, stress, and degradation of school performance are the most frequent. A common reason behind these effects seems to be related with the disruption of the normal relationships and the lack of contact with the different social groups that the children belong to (family, friends, school, etc.). In this paper we present results of the DESEOS research project, which applies the Ambient Assisting Living paradigm to increase the quality of life of health cared children by developing novel devices and applications to enhance the contact with their different daily environments. Security and dependability are central aspects in these scenarios, and consequently are central to the DESEOS solutions. In particular, this paper presents how DESEOS provides a secure solution for one of the project scenarios.
Pablo Antón; Antonio Muñoz; Antonio Maña; Hristo Koshutanski. Security-enhanced ambient assisted living supporting school activities during hospitalisation. Journal of Ambient Intelligence and Humanized Computing 2010, 3, 177 -192.
AMA StylePablo Antón, Antonio Muñoz, Antonio Maña, Hristo Koshutanski. Security-enhanced ambient assisted living supporting school activities during hospitalisation. Journal of Ambient Intelligence and Humanized Computing. 2010; 3 (3):177-192.
Chicago/Turabian StylePablo Antón; Antonio Muñoz; Antonio Maña; Hristo Koshutanski. 2010. "Security-enhanced ambient assisted living supporting school activities during hospitalisation." Journal of Ambient Intelligence and Humanized Computing 3, no. 3: 177-192.
After a first phase of great activity in the field of multi-agent systems, researchers seemed to loose interest in the paradigm, mainly due to the lack of scenarios where the highly distributed nature of these systems could be appropriate. However, recent computing models such as ubiquitous computing and ambient intelligence have introduced the need for this type of highly distributed, autonomous and asynchronous computing mechanisms. The agent paradigm can play an important role and can suit the needs of many applications in these scenarios. In this paper we argue that the main obstacle for the practical application of multi-agent systems is the lack of appropriate security mechanisms. Moreover, we show that as a result of recent advances in security technologies, it is now possible to solve the most important security problems of agent-based systems.
Antonio Maña; Antonio Muñoz; Daniel Serrano. Protected Computing Approach: Towards the Mutual Protection of Agent Computing. Advances in Intelligent and Soft Computing 2010, 55, 538 -547.
AMA StyleAntonio Maña, Antonio Muñoz, Daniel Serrano. Protected Computing Approach: Towards the Mutual Protection of Agent Computing. Advances in Intelligent and Soft Computing. 2010; 55 ():538-547.
Chicago/Turabian StyleAntonio Maña; Antonio Muñoz; Daniel Serrano. 2010. "Protected Computing Approach: Towards the Mutual Protection of Agent Computing." Advances in Intelligent and Soft Computing 55, no. : 538-547.