The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

José A. Montenegro: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christian Schläger, Thomas Nowey, José A. Montenegro
    A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:709-716 [Conf]
  2. Isaac Agudo, Javier Lopez, José A. Montenegro
    Graphical Representation of Authorization Policies for Weighted Credentials. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:383-394 [Conf]
  3. Isaac Agudo, Javier Lopez, José A. Montenegro
    Attribute Delegation Based on Ontologies and Context Information. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:54-66 [Conf]
  4. Florina Almenárez Mendoza, Mildrey Carbonell, Jordi Forné, Francisca Hinarejos, Marc Lacoste, Andrés Marín López, José A. Montenegro
    Design of an Enhanced PKI for Ubiquitous Networks. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:262-266 [Conf]
  5. Antonio Mana, José A. Montenegro, Carsten Rudolph, José Luis Vivas
    A business process-driven approach to security engineering. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:477-481 [Conf]
  6. Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya
    Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. [Citation Graph (0, 0)][DBLP]
    EGOV, 2002, pp:211-214 [Conf]
  7. José A. Montenegro, Fernando Moya
    A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:160-172 [Conf]
  8. Javier Lopez, José A. Montenegro, Rodrigo Roman, Jorge Davila
    Design of a VPN Software Solution Integrating TCP and UDP Services. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:325-338 [Conf]
  9. Ed Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto
    A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:136-149 [Conf]
  10. José Luis Vivas, José A. Montenegro, Javier Lopez
    Towards a Business Process-Driven Framework for Security Engineering with the UML. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:381-395 [Conf]
  11. Isaac Agudo, Javier Lopez, José A. Montenegro
    A Representation Model of Trust Relationships with Delegation Extensions. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:116-130 [Conf]
  12. Vicente Benjumea, Javier Lopez, José A. Montenegro, José M. Troya
    A First Approach to Provide Anonymity in Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:402-415 [Conf]
  13. Javier Lopez, José A. Montenegro, Rodrigo Roman
    Service-Oriented Security Architecture for CII based on Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SecPerU, 2006, pp:1-6 [Conf]
  14. Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega
    PKI design based on the use of on-line certification authorities. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:2, pp:91-102 [Journal]

  15. Attribute delegation in ubiquitous environments. [Citation Graph (, )][DBLP]


  16. Implementation aspects of a delegation system. [Citation Graph (, )][DBLP]


  17. Pervasive authentication and authorization infrastructures for mobile users. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002