|
Search the dblp DataBase
José A. Montenegro:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Christian Schläger, Thomas Nowey, José A. Montenegro
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:709-716 [Conf]
- Isaac Agudo, Javier Lopez, José A. Montenegro
Graphical Representation of Authorization Policies for Weighted Credentials. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:383-394 [Conf]
- Isaac Agudo, Javier Lopez, José A. Montenegro
Attribute Delegation Based on Ontologies and Context Information. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:54-66 [Conf]
- Florina Almenárez Mendoza, Mildrey Carbonell, Jordi Forné, Francisca Hinarejos, Marc Lacoste, Andrés Marín López, José A. Montenegro
Design of an Enhanced PKI for Ubiquitous Networks. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2005, pp:262-266 [Conf]
- Antonio Mana, José A. Montenegro, Carsten Rudolph, José Luis Vivas
A business process-driven approach to security engineering. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:477-481 [Conf]
- Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya
Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. [Citation Graph (0, 0)][DBLP] EGOV, 2002, pp:211-214 [Conf]
- José A. Montenegro, Fernando Moya
A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation. [Citation Graph (0, 0)][DBLP] EuroPKI, 2004, pp:160-172 [Conf]
- Javier Lopez, José A. Montenegro, Rodrigo Roman, Jorge Davila
Design of a VPN Software Solution Integrating TCP and UDP Services. [Citation Graph (0, 0)][DBLP] InfraSec, 2002, pp:325-338 [Conf]
- Ed Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:136-149 [Conf]
- José Luis Vivas, José A. Montenegro, Javier Lopez
Towards a Business Process-Driven Framework for Security Engineering with the UML. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:381-395 [Conf]
- Isaac Agudo, Javier Lopez, José A. Montenegro
A Representation Model of Trust Relationships with Delegation Extensions. [Citation Graph (0, 0)][DBLP] iTrust, 2005, pp:116-130 [Conf]
- Vicente Benjumea, Javier Lopez, José A. Montenegro, José M. Troya
A First Approach to Provide Anonymity in Attribute Certificates. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:402-415 [Conf]
- Javier Lopez, José A. Montenegro, Rodrigo Roman
Service-Oriented Security Architecture for CII based on Sensor Networks. [Citation Graph (0, 0)][DBLP] SecPerU, 2006, pp:1-6 [Conf]
- Javier Lopez, Antonio Mana, José A. Montenegro, Juan J. Ortega
PKI design based on the use of on-line certification authorities. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:2, n:2, pp:91-102 [Journal]
Attribute delegation in ubiquitous environments. [Citation Graph (, )][DBLP]
Implementation aspects of a delegation system. [Citation Graph (, )][DBLP]
Pervasive authentication and authorization infrastructures for mobile users. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|