MAIDER
HUARTE ARRAYAGO
PROFESORADO AGREGADO
EDUARDO JUAN
JACOB TAQUET
PROFESORADO CATEDRATICO/A DE UNIVERSIDAD
Publicaciones en las que colabora con EDUARDO JUAN JACOB TAQUET (13)
2021
-
Enhancing rescue operations with virtualized mobile services in scarce resource devices
JITEL 2021 Libro de Actas: XV Jornadas de Ingeniería Telemática, A Coruña 2021
2020
-
Enhancing Rescue Operations with Virtualized Mobile Multimedia Services in Scarce Resource Devices
IEEE Access, Vol. 8, pp. 216029-216042
2019
-
Impact assessment of policy expressiveness of an optimised access control model for smart sensors
IET Information Security, Vol. 13, Núm. 3, pp. 239-248
-
Survey on Access Control Models Feasible in Cyber-Physical Systems
EAI/Springer Innovations in Communication and Computing (Springer Science and Business Media Deutschland GmbH), pp. 103-152
2018
-
Expressive Policy-Based Access Control for Resource-Constrained Devices
IEEE Access, Vol. 6, pp. 15-46
-
Feasibility assessment of a fine-grained access control model on resource constrained sensors
Sensors (Switzerland), Vol. 18, Núm. 2
-
Hacia una infraestructura de fabricación flexible, conectada e integrable en redes 5G
Revista DYNA, Vol. 93, Núm. 6, pp. 656-662
2016
-
An architecture for dynamic QoS management at Layer 2 for DOCSIS access networks using OpenFlow
Computer Networks, Vol. 94, pp. 112-128
2014
-
A proposal to contribute to ITS standardization activity: A valuable network mobility management approach
Computer Standards and Interfaces, Vol. 36, Núm. 3, pp. 465-479
-
Hardware abstraction layer as an SDN-enabler for non-OpenFlow network equipment
Proceedings - 2014 3rd European Workshop on Software-Defined Networks, EWSDN 2014
-
Hardware abstraction layer for nonopenflow capable devices
TNC 2014 - Networking with the World
-
Integrating complex legacy systems under OpenFlow control: The DOCSIS use case
Proceedings - 2014 3rd European Workshop on Software-Defined Networks, EWSDN 2014
2012
-
Ladon: End-to-end authorisation support for resource-deprived environments
IET Information Security, Vol. 6, Núm. 2, pp. 93-101