Antonio Maña

Antonio Maña
  • PhD
  • Professor at University of Malaga

About

161
Publications
35,427
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,055
Citations
Current institution
University of Malaga
Current position
  • Professor
Additional affiliations
May 2005 - August 2005
University of Trento
Description
  • Research visit
September 1995 - present
University of Malaga

Publications

Publications (161)
Conference Paper
This paper presents a novel Security Engineering Process for the creation of security-enhanced system models. The process offers a language for the definition of a domain-specific security knowledge language, the creation of security artefacts using the previous architecture and the use of these artefacts in a system model for fulfilling its sec...
Article
A coalition consists of independent organizations that share resources and skills to achieve significant mission objectives. Dynamic Coalition (DC) formations occur in response to some market demands, business requests, or disaster responses, to name a few. Partners forming a coalition are automatically selected given some business criteria and bec...
Article
Mobile agent is a promising paradigm for emerging ubiquitous computing and ambient intelligent scenarios. We believe that security is the most important issue for the widespread deployment of applications based on mobile agent technology. Indeed, community agrees that without the proper security mechanisms, use of mobile agent-based applications wi...
Article
Full-text available
In software engineering, pattern papers serve the purpose of providing a description of a generalized, reusable solution to recurring design problems, based on practical experience and established best practices. This paper presents an architectural pattern for a Secure Auditable Registry service based on Message-Oriented Middleware to be used in l...
Article
Full-text available
The goal of this paper is to draw the lessons learned from a project that involved security systems engineers, computer scientists, lawyers and social scientists. Since one of the goals of the project was to propose actual solutions following the privacy by design approach, its aim was to go beyond multidisciplinarity and build on the variety of ex...
Article
Despite its immense benefits in terms of flexibility, resource consumption, and simplified management, cloud computing raises several concerns due to lack of trust and transparency. Like all computing paradigms based on outsourcing, the use of cloud computing is largely a matter of trust. There is an increasing pressure by cloud customers for solut...
Article
The creation of secure applications is more than ever a complex task because it requires from system engineers increasing levels of knowledge in security requirements, design and implementation. In fact, the fast increasing size and volatility of this knowledge has reached a point in which it is unrealistic to expect that system engineers can keep...
Article
The modelling, engineering and development of systems with security requirements (which today means all systems) have been the target of different research works that are intended to deal with the increasing complexity of systems and characteristics such as distribution, real-time constraints and heterogeneity and with the need to provide increasin...
Article
This paper presents a sample surveillance use-case based on a video archive search scenario. Privacy and accountability concerns related to video surveillance systems are identified and described here, thus assessing the impact on privacy of this type of systems. Then, after a description of the scenario, we produce the design for this particular c...
Chapter
This chapter presents a certification-based assurance solution for the cloud, which has been developed as part of the FP7 EU Project CUMULUS. It provides an overview of the CUMULUS certification models, which are at the basis of the certification processes implemented and managed by the CUMULUS certification framework. Certification models drive th...
Article
The modelling, engineering and development of systems with security requirements (which today means all systems) have been the target of different research works that are intended to deal with the increasing complexity of systems and characteristics such as distribution, real-time constraints and heterogeneity and with the need to provide increasin...
Article
Development of secure cloud applications requires a supportive approach that should also enable software assessment and certification by different mechanisms. These can assure by independent means that the required security is present. In this paper we present a Core Security Metamodel (CSM) that is the director of a security engineering process th...
Conference Paper
Full-text available
Privacy impacts of video surveillance systems are a major concern. This paper presents our ongoing multidisciplinary approach to integrate privacy concerns in the design of video surveillance systems. The project aims at establishing a reference framework for the collection of privacy concepts and principles, the description of surveillance context...
Article
Given the highly variable physical layer characteristics in cognitive radio sensor networks (CRSN), it is indispensable to provide the performance analysis for cognitive radio users for smooth operations of the higher layer protocols. Taking into account ...
Conference Paper
The creation of secure systems of systems is a complex process. A large variety of security expertise and knowledge specific for application domains is required. This is even more important if systems of systems span different application domains. Then, security threats specific to different application-domains need to be considered. One example is...
Conference Paper
Cloud and Web Services technologies offer a powerful cost-effective and fast growing approach to the provision of infrastructure, platform and software as services. However, these technologies still raise significant concerns regarding security assurance and compliance of data and software services offered. A new trend of a service security certifi...
Conference Paper
This paper presents a security engineering process for the modelling of security-sensitive systems using a real use case of metering devices. The process provides a security framework that can be used with other existing processes (such as the agile ones). It helps to develop and model systems bearing in mind their heterogeneity, real-time and dyna...
Conference Paper
The engineering and development of complex security-sensitive systems is becoming increasingly difficult due to the need to address aspects like heterogeneity (of application domains, requirements, regulations, solutions, etc.), dynamism and runtime adaptation necessities, and the high demands for security and privacy of the users and agencies invol...
Article
Application-level access control is an important requirement in many distributed environments. For instance, in new scenarios such as e-commerce, access to resources by previously unknown users is an essential problem to be solved. The integration of Privilege Management Infrastructure (PMI) services in the access control system represents a scalab...
Conference Paper
Full-text available
Despite the fact that software security certification has important advantages; among these we highlighted that it allows to increase users' trust by means of attesting security properties. However, in most of cases the system that is subject of certification is considered to be monolithic. This fact implies that existing certification schemes do n...
Conference Paper
Software certification has been successfully used with traditional "static" software. With the introduction of new computing paradigms such as service-oriented computing and cloud computing, the existing way to represent software certifications based in verbose human-oriented documents, exhibits many limitations, to the point of making the approach...
Conference Paper
Service Oriented Computing (SOC) has facilitated a paradigm shift in software provisioning models: software gets consumed as a "service" providing enormous benefits, however lack of security assurance of third-party services is hampering their wider adoption in business- and security-critical domains. Security certification typically provides the r...
Conference Paper
The concept of Dynamic Coalitions (DCs) provides a scalable approach for service-based business integration suitable to Small and Medium-size Enterprises (SMEs). An outcome of a DC model is a composite service offered to a market place. The notion of security-by-design certified coalition enables coalition designers/owners to request a certificatio...
Article
Live media streaming is a field that recently has had a great impact in the scientific community, especially in the case of interactive media streaming. In this paper we propose a reference architecture conceptualizing an immersive view effect by considering heterogeneous tracking devices and enriched movement control over heterogeneous stream imag...
Conference Paper
In recent years the number of Ambient Intelligent systems is growing steadily, especially several fields such as domotic and remote teaching are practical applications of AmI. A relevant characteristic of these systems is sharing a double goal, comfort and simplicity of final users. However, the adoption of these scenarios lacks of a security basis...
Conference Paper
This paper presents a security engineering process for the development of secure systems focusing on the specification and development of the Set-top Boxes. The paper describes the Set-top Box characteristics and functionalities and, using the process and its secure artefacts, models what we call a Domain Security Metamodel that defines all the sec...
Conference Paper
The use of clouds raises significant security concerns for the services they provide. Addressing these concerns requires novel models of cloud service certification based on multiple forms of evidence including testing and monitoring data, and trusted computing proofs. CUMULUS is a novel infrastructure for realising such certification models.
Article
Security is considered one of the crucial issues for the widespread adoption of cloud computing. Despite all research done in preventive security for cloud computing, the high complexity and the interdependence of many software layers and infrastructures mean that in practice there are always chances for something going wrong. For this reason, ther...
Article
The OKKAM project aims at enabling the Web of Entities, a global digital space for publishing and managing information about entities. The project provides a scalable and sustainable infrastructure, called the Entity Name System (ENS), for the systematic reuse of global and unique entity identifiers. The ENS provides a collection of core services s...
Conference Paper
The development of systems based on embedded components is a challenging task because of their distributed, reactive and real-time nature. From a security point of view, embedded devices are basically systems owned by a certain entity, used frequently as part of systems owned by other entities and operated in a potentially hostile environment. The...
Conference Paper
Nowadays, tourists have access to a lot of different web sites in order to find information about destinations. This has a direct impact on tourism destination management organizations and tourism providers. These stakeholders have a lot of problems in order to find reliable and up-todate information about their destinations. This paper presents an...
Article
In this chapter, the authors provide an overview of the importance of the monitoring of security properties in cloud computing scenarios. They then present an approach based on monitoring security properties in cloud systems based on a diagnosis framework that supports the specification and monitoring of properties expressed in Event Calculus (EC)...
Conference Paper
Full-text available
An architecture for dynamic security monitoring and enforcement for client software running in virtualized environments is presented. Virtualization is heavily used in cloud computing in order to allow a proper trade-off between isolation and resource usage. In this new architecture, monitoring mechanisms check a set of policy-defined conditions at...
Conference Paper
The development of systems based on embedded components is a challenging task because of the distributed, reactive and real-time nature of such systems. From a security point of view, embedded devices are basically systems owned by a certain entity and operated in a potentially hostile environment. Currently, a security engineering process for syst...
Article
Resource constrained embedded systems (RCES) refers to systems which have memory and/or computational processing power constraints. They can be found literally everywhere, in many application sectors such as automotive, aerospace, and home control. They are in many types of devices, like sensors, automotive electronic control units, intelligent swi...
Conference Paper
Full-text available
Trusted platform modules (TPMs) specification is highly complex and therefore the deployment of TPM –based security solutions is equally complicated and difficult; although they can provide a wide range of security functionalities. In order to make TPM technology available to system engineers without their needing to have in-depth knowledge of trus...
Conference Paper
Currently, SOAs are the major trend for large -- scale infrastructures and applications that are built from loosely -- coupled well -- separated services and that are subject to dynamic configuration, operation and evolution. Concretely, in open SOAs, trust becomes an essential element and certification of security properties offered by the service...
Conference Paper
Development of systems based on embedded components is a challenging task because of the distributed, reactive and real-time nature of such systems. From a security point of view, it is essential to take into account that frequently embedded devices are basically system components owned by a certain entity, used as part of systems owned by other en...
Article
Full-text available
An architecture for dynamic security monitoring and enforcement for client software running in Virtualized Environments for Cloud computing is presented. Monitoring mechanisms check a set of policy-defined conditions at runtime in order to detect threats or anomalous behaviour. Enforcement is achievable by using secure software execution methods th...
Conference Paper
Full-text available
Cloud computing is one of the biggest trends in information technology, with individuals, companies and even governments moving towards their use to save costs and increase flexibility. Cloud infrastructures are typically based on virtualised environments, to allow physical infrastructure to be shared by multiple end users. These infrastructures ca...
Conference Paper
Full-text available
In this paper we present the design of an architecture for dynamic security monitoring and enforcement, based on software protection scheme, for client software running in Virtualized Environments. Monitoring mechanisms check a set of policy-defined conditions at runtime to detect threats or anomalous behaviour. Enforcement will be achieved using s...
Conference Paper
Full-text available
Children that spend long periods in hospitals suffer different negative effects that affect their emotional and psychological development including sleep disorders, stress, and degradation of school performance. A common reason behind these effects is related to breaking of normal relationships and lack of contacts with the daily environments (fami...
Article
Full-text available
Agent-systems can bring important benefits especially in applications scenarios where highly distributed, autonomous, intelligence, self-organizing, and robust systems are required. Furthermore, the high levels of autonomy and self-organizations of agent systems provide excellent support for developments of systems in which dependability is essenti...
Conference Paper
Full-text available
In terms of the mobile agent paradigm, multi-agent systems represent a promising technology for emerging Ambient Intelligent scenarios in which a huge number of devices interact. Unfortunately, the lack of appropriate security mechanisms, both their enforcement and usability, is hindering the application of this paradigm in real world applications....
Article
Service-oriented architectures (SOA) constitute a major architectural style for large-scale infrastructures and applications built from loosely-coupled services and subject to dynamic configuration, operation and evolution. They are the structuring principle of a multitude of applications and the enabling technology for recent software paradigms li...
Data
Cloud computing is one of the biggest trends in information technology , with individuals, companies and even governments moving towards their use to save costs and increase flexibility. Cloud infrastructures are typically based on virtualised environments, to allow physical infrastructure to be shared by multiple end users. These infrastructures c...
Conference Paper
ASSERT4SOA project proposes machine readable certificates to be used to allow Web service requesters to automatically assess the security properties of Web services (and their providers) as certified by a trusted third party. This vision promises to open up an entire new market for certification services.
Article
Full-text available
Security is usually not in the main focus in the development of embedded systems. However, strongly interconnected em-bedded systems play vital roles in many everyday processes and also in industry and critical infrastructures. Therefore, security engineering for embedded systems is a discipline that currently attracts more interest. This paper pre...
Conference Paper
Full-text available
Agent-systems can bring important benefits especially in applications scenarios where highly distributed, autonomous, intelligence, self-organizing and robust systems are required. Furthermore, high levels of autonomy and self-organization of agent systems provide excellent support for development of systems with high dependability requirements. Tw...
Article
Full-text available
Children that spend long periods in hospitals suffer different negative effects that affect their emotional and psychological development and their family life. Among these effects, sleep disorders, stress, and degradation of school performance are the most frequent. A common reason behind these effects seems to be related with the disruption of th...
Conference Paper
Full-text available
We present the Entity Name System (ENS), an enabling infrastructure, which can host descriptions of named entities and provide unique identifiers, on large-scale. In this way, it opens new perspectives to realize entity-oriented, rather than keyword-oriented, Web information systems. We describe the architecture and the functionality of the ENS, al...
Conference Paper
Full-text available
The agent-based computing represents a promising paradigm for emerging ubiquitous computing and ambient intelligence scenarios due to the nature of the mobile agents that fit perfectly in these environments. However, the lack of the appropriate security mechanisms is hindering the application of this paradigm in real world applications. The protect...
Article
In this chapter the authors present a policy-based security engineering process for service oriented applications, developed in the SERENITY and MISTICO projects. Security and dependability (S&D) are considered as first-class citizens in the proposed engineering process, which is based on the precise description of reusable security and dependabili...
Article
Full-text available
Software agents represent a promising computing paradigm. They are an elegant technology to solve problems that can not be easily solved in other way. The Scientific Community has proved that the use of the software agents approach simplifies the solution of difierent type of traditional computing problems. A proof of this is that several important...
Conference Paper
Certifying the security and dependability properties of individual web services or of entire business processes hosted on a Service Oriented Architecture (SOA) is a major challenge of SOA research. It is widely recognized that the unique features of WS/SOA require new security assessment approaches, including novel service testing and process monit...
Article
Current approaches for software development fail in the integration of security aspects. Usually, this is because of the software complexity and the specific expertise needed for the integration of modern security solutions. In this paper we present the SERENITY Project which proposes a framework addressing this issue. SERENITY is based on the separ...
Conference Paper
This paper describes the SERENITY infrastructure for the maintenance and evolution of dynamically provided security and dependability (S&D) solutions. The main characteristics of the infrastructure are presented, along with the different mechanisms that conform this infrastructure. A scenario is described to illustrate the application of the presen...
Conference Paper
Full-text available
Software agents are a promising computing paradigm. Scientific community has devoted important efforts to this field [1]. Indeed, several important applications exist based on this technology. Despite of their benefits, the lack of the appropriate security mechanisms for agent based systems represents a barrier for the widespread use of this techno...
Chapter
Research results from industry-academic collaborative projects in service-oriented computing describe practical, achievable solutions. Service-Oriented Applications and Architectures (SOAs) have captured the interest of industry as a way to support business-to-business interaction, and the SOA market grew by $4.9 billion in 2005. SOAs and in partic...
Chapter
Full-text available
In this chapter we present an overview of the SERENITY approach. We describe the SERENITY model of secure and dependable applications and show how it addresses the challenge of developing, integrating and dynamically maintaining security and dependability mechanisms in open, dynamic, distributed and heterogeneous computing systems and in particular...
Chapter
In order to satisfy the requests of SERENITY-aware applications, the SERENITY Runtime Framework’s main task is to perform pattern selection, to provide the application with the most suitable S&D Solution that satisfies the request. The result of this selection process depends on two main factors: the content of the S&D Library and the information s...
Chapter
In this chapter we describe the potential of SERENITY in Ambient Intelligence (AmI) Ecosystems. As a proof of concept, we describe the implementation of a prototype based on the application of the SERENITY model (including processes, artefacts and tools) to an industrial AmI scenario. A complete description of this prototype, along with all Securit...
Chapter
The SERENITY Runtime Framework (SRF) provides support for applications at runtime, by managing S&D Solutions and monitoring the systems’ context. The main functionality of the SRF, amongst others, is to provide S&D Solutions, by means of Executable Components, in response to applications security requirements. Runtime environment is defined in SRF...
Chapter
Traditionally, security patterns have successfully been used to describe security and dependability. In the SERENITY Project the notion of security and dependability (S&D) pattern has been extended to exact specifications of re-usable security mechanisms for Ambient Intelligence (AmI) systems. These S&D Patterns include information on the security...
Chapter
This chapter presents an infrastructure supporting the implementation of Executable Components (ECs). ECs represent S&D solutions at the implementation level, that is, by means of pieces of executable code. ECs are instantiated by the Serenity runtime Framework (SRF) as a result of requests coming from applications. The development of ECs requires...
Chapter
Full-text available
AmI considerations lead us to argue that it is essential for Security and Dependability (S&D) mechanisms to be able to adapt themselves to renewable context conditions in order to be applied to the ever-changing AmI scenarios. The key for this dynamic adaptation relies on the ability to capture the expertise of S&D engineers in such a way that it c...
Article
In this chapter we present the prospects of the SERENITY approach towards secure and dependable AmI ecosystems and identify issues for further research. We also describe the foreseen impact that the SERENITY model, processes, tools, and technologies can produce.
Conference Paper
Full-text available
The agent paradigm can play an important role and can suit the needs of many applications in new emerging Ambient Intelligence scenarios. Unfortunately the lack of security is hindering the application of this technology in real world applications. The problem known as malicious hosts is considered the most difficult to solve in mobile agent. Ther...
Conference Paper
Full-text available
Agent-based computing represents a promising paradigm for distributed computing. Unfortunately the lack of security is hindering the application of this paradigm in real world applications. We focus on a new agent migration protocol that takes advantage of TPM technology. The protocol has been validated using AVISPA model checking toolsuite. In ord...
Conference Paper
Full-text available
After a first phase of great activity in the field of multi-agent systems, researchers seemed to loose interest in the paradigm, mainly due to the lack of scenarios where the highly distributed nature of these systems could be appropriate. However, recent computing models such as ubiquitous computing and ambient intelligence have introduced the nee...
Conference Paper
Full-text available
Mobile agents are processes that can migrate autonomously from new hosts. Despite of the huge number of fields of application of this technology, a lack in the security exists. The main approach of this work is based on the provision of a secure execution environment for mobile agents. Our approach is based on the idea of the trusted migration. Thi...
Conference Paper
Full-text available
Traditionally, security patterns have successfully been used to describe security and dependability (S&D) solutions, making them available to system engineers not being security experts. Recently, in the SERENITY research project, the notion of S&D pattern was extended to exact specifications of re-usable S&D mechanisms for Ambient Intelligence (Am...
Conference Paper
Full-text available
Ambient intelligence (AmI) refers to an environment that is sensitive, responsive, interconnected, contextualized, transparent, intelligent, and acting on behalf of humans. AmI environments impose some constraints in the connectivity framework, power computing as well as energy budget. This makes of AmI a significantly different case within distrib...
Conference Paper
Full-text available
Agent-based computing represents a promising paradigm for distributed computing. Unfortunately the lack of security is hindering the application of this paradigm in real world applications. The protection of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In this paper we provide a mechanism that...
Article
Current practices for developing secure systems are still closer to art than to an engineering discipline. Security is still treated too frequently as an add-on and is therefore not integrated into IT systems development practices and tools. Experienced security artisans continue to be the key for achieving acceptable levels of security in IT syste...
Conference Paper
This paper describes the SERENITY infrastructure for the maintenance and evolution of dynamically provided security and dependability (S&D) solutions. The main characteristics of the infrastructure are presented, along with the different mechanisms that conform this infrastructure. A scenario is described to illustrate the application of the presen...
Article
In this chapter we present IMPRESS, a tool-supported integrated framework for security-aware software engineering, supported by automated transformations and validations. IMPRESS is based on semantic description mechanisms and formal methods resulted from the research in the SERENITY Project, and it centres on the precise description of reusable se...
Chapter
The vision of Ambient Intelligence (AmI) depict scenarios where people are surrounded by intelligent and intuitive interfaces embedded in everyday objects, integrated in an environment recognising and responding transparently to the presence of individuals. The realisation of this vision involves challenges for both software and hardware elements....
Conference Paper
Full-text available
Recognizing that information from different sources refers to the same (real world) entity is a crucial challenge in instance-level information integration, as it is a pre-requisite for combining the information about one entity from different sources. The required entity matching is time consuming and thus imposes a crucial limit for large-scale,...
Chapter
Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in m...
Chapter
Full-text available
Ambient Intelligence (AmI) refers to an environment that is sensitive, responsive, interconnected, contextualized, transparent, intelligent, and acting on behalf of humans. This environment is coupled with ubiquity of computing devices that enables it to transparently sense context changes, to react accordingly, and even to take the initiative towa...
Conference Paper
In this paper, we examine the special requirements of lifecycle management for entities in the context of an entity management system for the semantic web. We study the requirements with respect to creating and modifying these entities, as well as to managing their evolution over time. Furthermore, we present the issues arising from the access cont...
Conference Paper
Full-text available
Current number of Ambient Intelligent systems is growning steadlily in last years. Moreover, several fields Such as domotic and remote teaching are practical applications of AmI. These are some systems that interact with different ones, that is the reason of "AmI Ecosystem" term is used. An AmI Ecosystem is defined as the environment in which users...
Conference Paper
Full-text available
OKKAM project aims at enabling a web of entities by pro- viding an infrastructure of decentralized online repositories, each owned by either a public or a private organization. A repository is designed to handle a large number of entries (as the Web identities are) where creators of entries are end-users. In this paper we present a semantic approac...
Chapter
Full-text available
One of the most interesting paradigms of Ambient Intelligence is that networks of pervasive intelligent interfaces recognize our presence and mould our environment to our immediate needs. In this paper, we present an example of how an access control model such as XACML adapts its functionality at runtime to new and unforeseen requirements. In previ...
Chapter
With the increasing number of mobile terminals, the development of applications that will provide new dedicated services by taking advantage of the technology is an effective challenge. The combination of such terminals communicating with each other in a peertopeer and dynamically self organized manner is referred to as a Mobile Ad Hoc NETwork, MAN...
Chapter
Due to the nature of ubiquitous environments there is a strong relation between them and auto-configurable systems. In ubiquitous computing environments, devices interact with the context performing an auto-configuration of system settings. The main idea presented in this paper is the use of profiles as an important key to provide auto configurabil...
Chapter
The EuroTRUSTAmI workshop was organised by the Serenity, a European integrated project dedicated to “system engineering for Security and dependability” with the help of an Advisory Committee1, and with the active participation and involvement of 27 other IST European research projects and platforms2 funded by the European Union in the context of th...

Network

Cited By