Publications

[1] V. Torra, G. Navarro-Arribas, and K. Stokes. Data privacy. In A. Said and V. Torra, editors, Data Science in Practice, volume 46 of Studies in Big Data. Springer, 2019. [ DOI | http ]
[2] Cristina Perez-Sola, Sergi Delgado-Segura, Jordi Herrera-Joancomarti, and Guillermo Navarro-Arribas. Analysis of the SegWit adoption in Bitcoin. In XV Reunión Española sobre Criptología y Seguridad de la Información, oct 2018.
[3] S. Delgado-Segura, C. Perez-Sola, J. Herrera-Joancomarti, and G. Navarro-Arribas. Analysis of the bitcoin UTXO set. In The 5th Workshop on Bitcoin and Blockchain Research, Financial Crypto 2018, 2018.
[4] S. Delgado-Segura, C. Perez-Sola, G. Navarro-Arribas, and J. Herrera-Joancomarti. A review of a fair protocol for data trading based on bitcoin transactions. In Urko Zurutuza, Mikel Iturbe, Enaitz Ezpeleta, and Inaki Garitan, editors, Actas de las Cuartas Jornadas Nacionales de Investigación en Ciberseguridad, pages 105–106. Servicio Editorial de Mondragon Unibertsitatea, 2018.
[5] V. Torra and G. Navarro-Arribas. Probabilistic metric spaces for privacy by design machine learning algorithms: Modeling database changes. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. DPM 2018, CBT 2018, volume 11025 of Lecture Notes in Computer Science. Springer, 2018. [ DOI | http | .pdf ]
[6] S. Delgado-Segura, C. Pérez-Solà, J. Herrera-Joancomartí, G. Navarro-Arribas, and J. Borrell. Cryptocurrency networks: a new p2p paradigm. Mobile Information Systems, 2018:16 pages, 2018. [ DOI | http | .pdf ]
[7] S. Delgado-Segura, C. Pérez-Solà, J. Herrera-Joancomartí, and G. Navarro-Arribas. Bitcoin private key locked transactions. Information Processing Letters, 140:37–41, 2018. [ DOI | http ]
[8] V. Torra, A. Jonsson, G. Navarro-Arribas, and J. Salas. Synthetic generation of spatial graphs. International Journal of Intelligent Systems, 2018. [ DOI | .pdf ]
[9] C. Perez-Sola, S. Delgado-Segura, G. Navarro-Arribas, and J. Herrera-Joancomarti. Double-spending prevention for bitcoin zero-confirmation transactions. International Journal of Information Security, 2018. [ DOI ]
[10] Vicenç Torra and Guillermo Navarro-Arribas. Big data privacy and anonymization. In A. Lehmann, D. Whitehouse, S. Fischer-Hübner, L. Fritsch, and C. Raab, editors, Privacy and Identity Management. Facing up to Next Steps, volume 498 of IFIP AICT Tutorials, pages 15–26. Springer, 2017. [ DOI | http ]
[11] V. Torra, D. Abril, and G. Navarro-Arribas. Fuzzy meets privacy. In The 14th International Conference on Modeling Decisions for Artificial Intelligence. USB Proceedings., pages 108–117, Kitakyushu, Japan (October 18 - 20, 2017), 2017.
[12] D. Chen, G. Navarro-Arribas, and J. Borrell. On the applicability of onion routing on predictable delay-tolerant networks. In 2017 IEEE 42nd Conference on Local Computer Networks (LCN), pages 575–578, Oct 2017. [ DOI ]
[13] Vicenç Torra, Guillermo Navarro-Arribas, David Sanchez-Charles, and Victor Muntés-Mulero. Provenance and privacy. In Vicenç Torra, Yasuo Narukawa, Aoi Honda, and Sozo Inoue, editors, Modeling Decisions for Artificial Intelligence: 14th International Conference, MDAI 2017, Kitakyushu, Japan, October 18-20, 2017, Proceedings, pages 3–11. Springer International Publishing, 2017. [ DOI | http ]
[14] S. Delgado-Segura, C. Pérez-Solà, G. Navarro-Arribas, and J. Herrera-Juancomartí. A fair protocol for data trading based on bitcoin transactions. Future Generation Computer Systems, 2017. [ DOI | http ]
[15] J. Garcia-Alfaro, G. Navarro-Arribas, H. Hartenstein, and J Herrera-Joancomartí, editors. Data Privacy Management, Cryptocurrencies and Blockchain Technology, volume 10436 of Lecture Notes in Computer Science. Springer, 2017. [ DOI | http ]
[16] Vicenç Torra, Guillermo Navarro-Arribas, and Klara Stokes. An overview of the use of clustering for data privacy. In M. Emre Celebi and Kemal Aydin, editors, Unsupervised Learning Algorithms, pages 237–251. Springer, April 2016. [ DOI | http | .pdf ]
[17] A. Antunez-Veas and G. Navarro-Arribas. Onion routing in deterministic delay tolerant networks. In Joaquin Garcia-Alfaro, Evangelos Kranakis, and Guillaume Bonfante, editors, Foundations and Practice of Security, number 9482 in Lecture Notes in Computer Science, pages 303–310. Springer International Publishing, 2016. [ DOI | http ]
[18] V. Torra and G. Navarro-Arribas. Integral privacy. In S. Foresti and G. Persiano, editors, Cryptology and Network Security, CANS 2016, volume 20052 of Lecture Notes in Computer Science, pages 661–669. Springer, 2016. [ DOI | http | .pdf ]
[19] J. Garcia-Alfaro, G. Navarro-Arribas, A. Aldini, F. Martinelli, and N. Suri, editors. Data Privacy Management, and Security Assurance, volume 9481 of Lecture Notes in Computer Science. Springer International Publishing, 2016. [ DOI | http ]
[20] Vicenç Torra, Yasuo Narukawa, Guillermo Navarro-Arribas, and Cristina Yañez, editors. Modeling Decisions for Artificial Intelligence, volume 9880 of Lecture Notes in Computer Science. Springer International Publishing, 2016. [ DOI | http ]
[21] D. Abril, G. Navarro-Arribas, and V. Torra. Data privacy with R. In Guillermo Navarro-Arribas and Vicenç Torra, editors, Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, pages 63–82. Springer International Publishing, 2015. [ DOI | http ]
[22] V. Torra and G. Navarro-Arribas. Data privacy: A survey of results. In Guillermo Navarro-Arribas and Vicenç Torra, editors, Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, pages 27–37. Springer International Publishing, 2015. [ DOI | http ]
[23] G. Navarro-Arribas and V. Torra. Advanced research on data privacy in the ARES project. In Guillermo Navarro-Arribas and Vicenç Torra, editors, Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, pages 3–14. Springer International Publishing, 2015. [ DOI | http ]
[24] D. Abril, V. Torra, and G. Navarro-Arribas. Supervised learning using a symmetric bilinear form for record linkage. Information Fusion, 26:144–153, 2015. [ DOI | http ]
[25] D. Abril, G. Navarro-Arribas, and V. Torra. Spherical microaggregation: Anonymizing sparse vector spaces. Computers & Security, 49(0):28–44, 2015. [ DOI | http ]
[26] G. Navarro-Arribas and V. Torra, editors. Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence. Springer International Publishing, 2015. [ DOI ]
[27] D. Abril, G. Navarro-Arribas, and V. Torra. Aprendizaje supervisado para el enlace de registros a traves de la media ponderada. In Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información, pages 281–284. Publicaciones Universidad de Alicante, 2014.
[28] J. Cucurull, S. Guasch, A. Escala, G. Navarro-Arribas, and V. Acin. Qr steganography - a threat to new generation electronic voting systems. In SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014, pages 484–491. SciTePress, 2014. [ DOI ]
[29] J. Jiménez, G. Navarro-Arribas, and V. Torra. Jpeg-based microdata protection. In Josep Domingo-Ferrer, editor, Privacy in Statistical Databases, volume 8744 of Lecture Notes in Computer Science, pages 117–129. Springer International Publishing, 2014. [ DOI | http ]
[30] G. Navarro-Arribas and V. Torra. Rank swapping for stream data. In Vicenç Torra, Yasuo Narukawa, and Yasunori Endo, editors, Modeling Decisions for Artificial Intelligence, volume 8825 of Lecture Notes in Artificial Intelligence, pages 217–226. Springer International Publishing, 2014. [ DOI | http ]
[31] V. Torra and G. Navarro-Arribas. Data privacy. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 4(4):269–280, 2014. [ DOI | http ]
[32] D. Abril, G. Navarro-Arribas, and V. Torra. Towards a private vector space model for confidential documents. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, page 944–945, New York, NY, USA, 2013. ACM. [ DOI | http ]
[33] D. Abril, G. Navarro-Arribas, and V. Torra. Vector space model anonymization. In Artificial Intelligence Research and Development (Proceedings of the 16th International Conference of the Catalan Association for Artificial Intelligence), volume 256 of Frontiers in Artificial Intelligence and Applications, pages 141–150, 2013. [ DOI ]
[34] G. Navarro-Arribas, D. Abril, and V. Torra. Dynamic anonymous index for confidential data. In Data Privacy Management, volume 8247 of Lecture Notes in Computer Science, pages 362–368, 2013. [ DOI | http | .pdf ]
[35] S. N. Foley and G. Navarro-Arribas. A bloom filter based model for decentralized authorization. International Journal of Intelligent Systems, 28(6):565–582, 2013. [ DOI | http | .pdf ]
[36] V. Torra, Y. Narukawa, G. Navarro-Arribas, and D. Megias, editors. Modelling Decisions for Artificial Intelligence (10th International Conference, MDAI 2013), volume 8234 of Lecture Notes in Artificial Intelligence. Springer, 2013. [ DOI | http ]
[37] E. Mercadal, A. Freijó, G. Navarro-Arribas, and J. Borrell. Gestión eficiente de permisos en redes de sensores inalámbricos. In Actas XII Reunión Española sobre Criptología y Seguridad de la Información, pages 321–326. Servicio Editorial de Mondragon Unibertsitatea, July 2012.
[38] C. Garrigues, H. Rifà-Pous, and G. Navarro-Arribas. Fully distributed cooperative spectrum sensing for cognitive radio networks. In Actas XII Reunión Española sobre Criptología y Seguridad de la Información, pages 327–332. Servicio Editorial de Mondragon Unibertsitatea, July 2012.
[39] J. Garcia-Alfaro, G. Navarro-Arribas, N Cuppens-Boulahia, and S. de Capitani di Vimercati, editors. Data Privacy Management and Autonomous Spontaneous Security, volume 7122 of Lecture Notes in Computer Science. Springer, March 2012. [ DOI | http ]
[40] E. Mercadal, G. Navarro-Arribas, S.N. Foley, and J. Borrell. Towards efficient access control in a mobile agent based wireless sensor network. In 2012 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), pages 1–4, 2012. [ DOI ]
[41] C. Martínez-García, G. Navarro-Arribas, and J. Borrell. Intra-role progression in rbac: An rpg-like access control scheme. In Data Privacy Management and Autonomous Spontaneus Security, volume 7122 of Lecture Notes in Computer Science, pages 221–234. Springer Berlin / Heidelberg, 2012. [ DOI | http ]
[42] G. Navarro-Arribas, V. Torra, A. Erola, and J. Castellà-Roca. User k-anonymity for privacy preserving data mining of query logs. Information Processing and Management, 48(3):476–487, 2012. [ DOI | www: ]
[43] D. Abril, G. Navarro-Arribas, and V. Torra. Choquet integral for record linkage. Annals of Operations Research, 195(1):97–110, 2012. [ DOI | http ]
[44] D. Abril, G. Navarro-Arribas, and V. Torra. Improving record linkage with supervised learning for disclosure risk assessment. Information Fusion, 13(4):274–284, 2012. [ DOI ]
[45] G. Navarro-Arribas and V. Torra. Information fusion in data privacy: A survey. Information Fusion, 13(4):235–244, 2012. [ DOI | http ]
[46] V. Torra and G. Navarro-Arribas, editors. Information fusion in the context of data privacy. Special Issue of Information Fusion, volume 13, 2012.
[47] G. Navarro-Arribas. Sistemes tallafoc. In Seguretat en Xarxes. Universitat Oberta de Catalunya, 2012.
[48] G. Navarro-Arribas. Sistemas de cortafuegos. In Seguridad en redes. Universitat Oberta de Catalunya, 2012.
[49] V. Torra, D. Abril, and G. Navarro-Arribas. Supervised learning approach for distance based record linkage as disclosure risk evaluation. In Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality, Tarragona, Spain, October 2011. [ .pdf ]
[50] C. Martínez-García, G. Navarro-Arribas, S.N. Foley, V. Torra, and J. Borrell. Flexible security inter-domain interoperability through attribute conversion. Information Sciences, 181(16):3491–3507, August 2011. [ DOI | http ]
[51] D. Abril, V. Torra, and G. Navarro-Arribas. Supervised learning using mahalanobis distance for record linkage. In Proceedings of 6th International Summer School on Aggregation Operators (AGOP 2011), pages 223–228, July 2011. [ .pdf ]
[52] C. Martínez-García, G. Navarro-Arribas, and J. Borrell. Fuzzy role-based access control. Information Processing Letters, 111(10):483–487, April 2011. [ DOI | .pdf ]
[53] J. Garcia-Alfaro, G. Navarro-Arribas, A. Cavalli, and J. Leneutre, editors. Data Privacy Management and Autonomous Spontaneous Security. 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers, volume 6514 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, February 2011. [ DOI ]
[54] V. Torra, D. Abril, and G. Navarro-Arribas. Fuzzy methods for database protection. In 7th conference of the European Society for Fuzzy Logic and Technology (EUSFLAT-2011), pages 439–443, 2011. [ DOI | .pdf ]
[55] A. Erola, J. Castellà-Roca, G. Navarro-Arribas, and V. Torra. Semantic microaggregation for the anonymization of query logs. In Privacy in Statistical Databases, volume 6344 of Lecture Notes in Computer Science, pages 127–137. Springer Berlin / Heidelberg, 2011. [ DOI | http ]
[56] D. Abril, G. Navarro-Arribas, and V. Torra. On the declassification of confidential documents. In Modeling Decisions for Artificial Intelligence, MDAI 2011, volume 6820 of Lecture Notes in Artificial Intelligence, pages 235–246. Springer Berlin / Heidelberg, 2011. [ DOI | http ]
[57] A. Erola, J. Castellà-Roca, G. Navarro-Arribas, and V. Torra. Semantic microaggregation for the anonymization of query logs using the open directory project. SORT - Statistics and Operations Research Transactions, pages 41–58, 2011.
[58] J. Herrera-Joancomartí and G. Navarro-Arribas. Vulnerabilitats en xarxes. In Vulnerabilitats de seguretat. Universitat Oberta de Catalunya, 2011.
[59] J. Herrera-Joancomartí and G. Navarro-Arribas. Vulnerabilidades en redes. In Vulnerabilidades de seguridad. Universitat Oberta de Catalunya, 2011.
[60] G. Navarro-Arribas. Introducció a les vulnerabilitats. In Vulnerabilitats de seguretat. Universitat Oberta de Catalunya, 2011.
[61] G. Navarro-Arribas. Introducción a las vulnerabilidades. In Vulnerabilidades de seguridad. Universitat Oberta de Catalunya, 2011.
[62] J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, J. Borrell, and G. Suades. Fragment transfer protocol: an IEEE-FIPA based efficient transfer protocol for mobile agents. Computer Communications, 33(18):2203–2214, December 2010. [ DOI ]
[63] C. Garrigues, S. Robles, J. Borrell, and G. Navarro-Arribas. Promoting the development of secure mobile agent applications. Journal of Systems and Software, 83(6):959–971, June 2010. [ DOI ]
[64] V. Torra, G. Navarro-Arribas, and D. Abril. On the applications of aggregation operators in data privacy. In Integrated Uncertainty Management and Applications, volume 68 of Advances in Soft Computing, pages 479–488. Springer, 2010. [ DOI ]
[65] C. Martínez-García, A. Martín-Campillo, G. Navarro-Arribas, R. Martí, and J. Borrell. Control de acceso interoperable para la mejora en la cooperación entre grupos de emergencias. In RECSI 2010. XI Reunión Española sobre Criptología y Seguridad de la Información, pages 241–246. Publicacions URV, 2010.
[66] C. Martínez-García, G. Navarro-Arribas, and J. García-Alfaro. Despliegue de políticas condicionadas para la protección de atributos en negociadores móviles. In RECSI 2010. XI Reunión Española sobre Criptología y Seguridad de la Información, pages 171–175. Publicacions URV, 2010.
[67] G. Navarro-Arribas, V. Torra, A. Erola, and J. Castellà-Roca. Microagregación para el k-anonimato en registros de buscadores web. In RECSI 2010. XI Reunión Española sobre Criptología y Seguridad de la Información, pages 135–140. Publicacions URV, 2010.
[68] I. Cano, G. Navarro-Arribas, and V. Torra. Last results on constrained microaggregation. In III Simposio Sobre Lógica Fuzzy y Soft Computing, CEDI 2010, 2010.
[69] D. Abril, G. Navarro-Arribas, and V. Torra. Towards privacy preserving information retrieval through semantic microaggregation. In Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on, pages 296–299, 2010. [ DOI ]
[70] D. Abril, G. Navarro-Arribas, and V. Torra. Towards semantic microaggregation of categorical data for confidential documents. In Modeling Decisions for Artificial Intelligence, MDAI 2010, volume 6408 of Lecture Notes in Artificial Intelligence, pages 266–276, 2010. [ DOI | http ]
[71] J. Cucurull, G. Navarro-Arribas, R. Martí, S. Robles, and J. Borrell. An efficient and secure agent code distribution service. Software: Practice and Experience, 40(4):363–386, 2010. [ DOI ]
[72] G. Navarro-Arribas and V. Torra. Privacy-preserving data-mining through micro-aggregation for web-based e-commerce. Internet Research, 20(3):366–384, 2010. [ DOI ]
[73] V. Torra, G. Navarro-Arribas, and D. Abril. Supervised learning for database integration through weighted means and OWA operators. Control and Cybernetics, 39(4):1011–1026, 2010.
[74] J. Garcia-Alfaro, G. Navarro-Arribas, N Cuppens-Boulahia, and Y. Roudier, editors. Data Privacy Management and Autonomous Spontaneous Security, volume 5939 of Lecture Notes in Computer Science. Springer, January 2010. [ DOI ]
[75] V. Torra, I. Cano, and G. Navarro-Arribas. Dealing with edit constraints in microdata protection: microaggregation. In Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality, Bilbao, Spain (2-4 December, 2009), December 2009.
[76] J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, and J. Borrell. Full mobile agent interoperability in an ieee-fipa context. Journal of Systems and Software, 82(12):1927–1940, December 2009. [ DOI ]
[77] I. Cano, G. Navarro-Arribas, and V. Torra. A new framework to automate constrained microaggregation. In Proceeding of the ACM first international workshop on Privacy and anonymity for very large databases (Conference on Information and Knowledge Management), pages 1–8, Hong Kong, China, November 2009. ACM. [ DOI ]
[78] G. Navarro-Arribas and V. Torra. Tree-based microaggregation for the anonymization of search logs. In IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, volume 3, pages 155–158, Milano, Italy, September 2009. IEEE Computer Society. [ DOI ]
[79] G. Navarro-Arribas and V. Torra. Towards microaggregation of log files for web usage mining in B2C e-commerce. In The 28th North American Fuzzy Information Processing Society Annual Conference (NAFIPS2009), pages 1–6, Cincinnati, OH, USA (14-17 June 2009), June 2009. IEEE Press. [ DOI ]
[80] G. Navarro-Arribas and J. Garcia-Alfaro. A policy-based approach for the management of web browser resources to prevent anonymity attacks in Tor. In Emerging Challenges for Security, Privacy, and Trust. International Information Security Conference (SEC-2009), volume 297 of IFIP AICT, pages 164–175, Cyprus, Greece (18-20 May, 2009), May 2009. Springer Verlag. [ DOI ]
[81] J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, B. Overeinder, and J. Borrell. Agent mobility architecture based on IEEE-FIPA standards. Computer Communications, 32(4):712–729, March 2009. [ DOI ]
[82] C. Martínez-García, G. Navarro-Arribas, J. Borrell, and A. Martín-Campillo. An access control scheme for multi-agent systems over multi-domain environments. In 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, volume 55 of Advances in Intelligent and Soft Computing, pages 401–410, Salamanca, Spain, 2009. Springer Verlag. [ DOI ]
[83] C. Martinez-Garcia, G. Navarro-Arribas, J. Borrell, and A. Martin-Campillo. Sistema impreciso de control de acceso basado en la conversión cuantificada de atributos para escenarios de interoperabilidad. In Luis Hernández-Encinas and Angel Martín-del-Rey, editors, Actas de la X Reunión Española sobre Criptología y Seguridad de la Información, pages 357–367, Salamanca, Spain, September 2008.
[84] G. Navarro-Arribas, J. Garcia-Alfaro, O. Mula-Valls, and J. Herrera-Joancomartí. Gestión de recursos de un navegador web para prevenir ataques contra la privacidad en tor. In Luis Hernández-Encinas and Angel Martín-del-Rey, editors, Actas de la X Reunión Española sobre Criptología y Seguridad de la Información, pages 629–637, Salamanca, Spain, September 2008.
[85] J. Garcia-Alfaro and G. Navarro-Arribas. Prevención de ataques de Cross-Site Scripting en aplicaciones web. In Luis Hernández-Encinas and Angel Martín-del-Rey, editors, Actas de la X Reunión Española sobre Criptología y Seguridad de la Información, pages 369–377, Salamanca, Spain, September 2008.
[86] J. Pons, S. Robles, G. Navarro-Arribas, R. Martí, and J. Borrell. Improvement of the adaptation of the wiki platform to the university teaching: The concrete case of the subjects of computer networks. In Actas del 5o Congreso Internacional en Docencia Universitaria e Innovación. Universitat de Lleida, 2008.
[87] J. Garcia-Alfaro and G. Navarro-Arribas. Prevention of cross-site scripting attacks on current web applications. In On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, volume 4804 of Lecture Notes in Computer Science, pages 1770–1784. Springer Berlin / Heidelberg, nov 2007. [ DOI | .pdf ]
[88] M.C. de Toro, S. Robles, R. Martí, G. Navarro-Arribas, and J. Borrell. Hacia una solución global para servicios médicos en situaciones de emergencia. In Actas del II Simposio sobre Seguridad Informática del Congreso Español de Informática, pages 217–224, Zaragoza, Spain (11-14 September, 2007), September 2007. Thomson.
[89] J. Cucurull, R. Marti, S. Robles, J. Borrell, and G. Navarro-Arribas. Fipa-based interoperable agent mobility. In Multi-Agent Systems and Applications V (CEEMAS 2007), volume 4696 of Lecture Notes in Artificial Intelligence, pages 319–321, Leipzig, Germany (September 25-27, 2007), September 2007. Springer Berlin / Heidelberg. [ DOI | http ]
[90] J. Garcia-Alfaro and G. Navarro-Arribas. A survey on detection techniques to prevent cross-site scripting attacks on current web applications. In Critical Information Infrastructures Security, volume 5141 of Lecture Notes in Computer Science, pages 287–298, Malaga, Spain (3-5 October, 2007), 2007. [ DOI ]
[91] P. Vieira-Marques, S. Robles, J. Cucurull, R. Cruz-Correia, G. Navarro-Arribas, and R. Martí. Secure integration of distributed medical data using mobile agents. IEEE Intelligent Systems, 21(6):47–54, November-December 2006. [ DOI ]
[92] J. García-Alfaro, S. Castillo, J. Castella-Roca, G. Navarro-Arribas, and J. Borrell. Smartcop a smart card based access control for the protection of network security components. In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, volume 4277 of Lecture Notes in Computer Science, pages 415–424, Montpellier, France (October 29 - November 3, 2006), October 2006. OTM 2006, Springer Verlag. [ DOI | .pdf ]
[93] G. Navarro-Arribas and J. Borrell. An XML standards based authorization framework for mobile agents. In Mike Burmester and Alec Yasinsac, editors, Secure Mobile Ad-hoc Networks and Sensors, volume 4075 of Lecture Notes in Computer Science, pages 54–66, Singapore, September 2006. Springer Verlag. [ DOI | .pdf ]
[94] J. Ametller, J. Cucurull, R. Martí, G. Navarro-Arribas, and S. Robles. Enabling mobile agents interoperability through fipa standards. In M. Klusch, M. Rovatsos, and T. R. Payne, editors, Cooperative Information Agents X, volume 4149 of Lecture Notes in Artificial Intelligence, pages 388–401, Edinburgh, UK (September 11-13, 2006), September 2006. CIA 2006, Springer Verlag. [ DOI ]
[95] J. García-Alfaro, S. Castillo, J. Castella-Roca, G. Navarro-Arribas, and J. Borrell. Protection of components based on a smart-card enhanced security module. In Javier Lopez, editor, Critical Information Infrastructures Security, volume 4347 of Lecture Notes in Computer Science, pages 128–139, Samos, Greece (August 31 - September 1, 2006), September 2006. CRITIS 2006, Springer Verlag. [ DOI | .pdf ]
[96] J. Borrell, R. Martí, G. Navarro-Arribas, J. Pons, and S. Robles. Wikis i avaluació per companys en assignatures de xarxes d'ordinadors. In Jornades d'Innovació Docent. Universitat Autònoma de Barcelona, September 2006.
[97] J. García-Alfaro, S. Castillo, J. Castella-Roca, and G. Navarro-Arribas. Protección de componentes y dispositivos de seguridad mediante un control de acceso basado en kernel. In J. Borrell and J. Herrera, editors, Actas de la IX Reunión Española de Criptología y Seguridad de la Información, pages 773–787, Barcelona, Spain, July 2006. RECSI 2006.
[98] G. Navarro-Arribas and S. N. Foley. Aproximando saml con medidas de similitud. In J. Borrell and J. Herrera, editors, Actas de la IX Reunión Española de Criptología y Seguridad de la Información, pages 238–263, Barcelona, Spain, July 2006. RECSI 2006.
[99] J. Borrell, R. Martí, G. Navarro-Arribas, J. Pons, and S. Robles. Noves experiències d'avaluació amb wikis: Grups nombrosos i avaluació per companys. In Actas del 4o Congreso Internacional en Docencia Universitaria e Innovación, page 431, July 2006.
[100] J. García-Alfaro, S. Castillo, G. Navarro-Arribas, and J. Borrell. Acaps: An access control mechanism to protect the components of an attack prevention system. Journal of Computer Science and Network Security, 5(11):87–94, November 2005.
[101] G. Navarro-Arribas and J. A. Ortega-Ruiz. Secure agent-based management for pervasive computing. In Proceedings of the 39th Annual IEEE International Carnahan Conference on Security Technology, pages 133–136, Las Palmas de G.C., Spain, October 2005. IEEE Press. [ DOI ]
[102] J. García-Alfaro, S. Castillo, G. Navarro-Arribas, and J. Borrell. Mechanisms for attack protection on a prevention framework. In Proceedings of the 39th Annual IEEE International Carnahan Conference on Security Technology, pages 137–140, Las Palmas de G.C., Spain, October 2005. IEEE Press. [ DOI ]
[103] G. Navarro-Arribas, J Peñalver, J. Ametller, J. A. Ortega-Ruiz, J. García-Alfaro, and J. Borrell. Amapola: A simple infrastructure for ubiquitous computing. In Intelligence in Communication Systems (IFIP International Conference on Intelligence in Communication Systems, INTELLCOMM 2005), volume 190 of IFIP International Federation for Information Processing Series, pages 77–86, Montréal, Canada, October 2005. Springer. [ DOI | http | .pdf ]
[104] G. Navarro-Arribas and S. N. Foley. Approximating saml using similarity based imprecision. In Intelligence in Communication Systems (IFIP International Conference on Intelligence in Communication Systems, INTELLCOMM 2005), volume 190 of IFIP International Federation for Information Processing Series, pages 77–86, Montréal, Canada, October 2005. Springer. [ DOI | http | .pdf ]
[105] G. Navarro-Arribas, J.A. Ortega-Ruiz, J Ametller, and S Robles. Distributed authorization framework for mobile agents. In T. Magendanz, K. Ahmed, and I. Venieris, editors, Mobility Aware Technologies and Applications, volume 3744 of Lecture Notes in Computer Science, pages 127–136, Montreal, Canada, October 2005. Springer. [ DOI | .pdf ]
[106] S. Castillo, J. García-Alfaro, G. Navarro-Arribas, and J. Borrell. Protección de componentes en una plataforma para la prevención de ataques coordinados. In In Proceedings of the first Spanish Conference on Informatics (CEDI 2005), Information Security Symposium, pages 265–272, Granada, Spain, September 2005.
[107] G. Navarro-Arribas, J. Borrell, J.A. Ortega-Ruiz, and S. Robles. Access control with safe role assignment for mobile agents. In F. Dignum, V. Dignum, S. Koenig, S. Kraus, M.P. Singh, and M. Wooldridge, editors, Proceedings of the Fourth International Joint Conference on Autonomous agents and Multi Agent Systems (AAMAS), volume 3, pages 1235–1236, Utrecht, The Netherlands, July 2005. ACM Press. [ DOI ]
[108] J. Castellà-Roca, G. Navarro-Arribas, J.A. Ortega-Ruiz, and J. García. Digital chips for an on-line casino. In International Conference on Information Technology, volume I, pages 494–499, Nevada, USA, April 2005. IEEE Computer Society Press. [ DOI | .pdf ]
[109] J. García, F. Cuppens, F. Autrel, J. Castellà-Roca, J. Borrell, G. Navarro-Arribas, and J.A. Ortega-Ruiz. Protecting on-line casinos against fraudulent player drop-out. In International Conference on Information Technology, volume I, pages 500–506, Nevada, USA, April 2005. IEEE Computer Society Press. [ DOI ]
[110] G. Navarro-Arribas, J. García, and J. A. Ortega-Ruiz. Chained and delegable authorization tokens. In Teemupekka Virtanen Sanna Liimatainen, editor, 9th Nordic Workshop on Secure IT Systems, pages 8–14. Departement of Computer Science at Helsinki university of Technology, Publications in Telecommunications Software and multimedia, November 2004. [ .pdf ]
[111] J. García-Alfaro, F. Autrel, J. Borrell, Y. Bouzida, S. Castillo, F. Cuppens, and G. Navarro-Arribas. Preventing coordinated attacks via alert correlation. In Teemupekka Virtanen Sanna Liimatainen, editor, 9th Nordic Workshop on Secure IT Systems, pages 110–117. Departement of Computer Science at Helsinki University of Technology, Publications in Telecommunications Software and Multimedia, November 2004.
[112] J. García-Alfaro, F. Autrel, J. Borrell, S. Castillo, F. Cuppens, and G. Navarro-Arribas. Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation. In J. López, S. Qing, and E. Okamoto, editors, 6th International Conference on Information and communications Security, volume 3269 of Lecture Notes in Computer Science, pages 223–235. Springer Verlag, October 2004. [ DOI | http ]
[113] J. García-Alfaro, S. Castillo, G. Navarro-Arribas, and J. Borrell. Diseño y desarrollo de un sistema colaborativo para la prevención de ataques coordinados. In In Avances en Criptología y Seguridad de la Información, pages 475–493, Leganés, Spain, September 2004. VIII RECSI, Ediciones Díaz de Santos.
[114] G. Navarro-Arribas and J. García. Cadat: Control de acceso basado en tokens y cadenas hash delegables. In Avances en Criptología y Seguridad de la información, pages 425–435, Leganés, Spain, September 2004. VIII RECSI, Ediciones Díaz de Santos.
[115] S. Robles, J. Borrell, C. Fernández, J.A. Ortega, G. Navarro-Arribas, J. García, F. García, and J. Pons. El wiki com estratègia didàctica en assignatures de xarxes d'ordinadors. In Actas del 3r Congreso Internacional en Docencia Universitaria e Innovación, page 340, Girona, Spain, July 2004.
[116] G. Navarro-Arribas, B. Sadighi Firozabadi, E. Rissanen, and J. Borrell. Constrained delegation in xml-based access control and digital rights management standards. In M. H. Hamza, editor, CNIS03, Special Session on Architectures and Languages for Digital Rights Management and Access Control, pages 271–276, New York, USA, December 2003. Acta Press. [ .pdf ]
[117] J. Ametller, J. Borrell, J. García, G. Navarro-Arribas, and S. Robles. Framework for developing mobile agent applications. In Antonio Moreno, editor, Actas X Conferencia de la Asociación Española para la Inteligencia Artificial (CAEPIA 2003), pages 66–67, San Sebastian, Spain, November 2003.
[118] G. Navarro-Arribas, S. Robles, and J. Borrell. Assigning roles for access control in mobile agent applications. In The 3rd IFIP Conference on e-Commerce, e-Business, and e-Government, IFIP Conference Proceedings, pages 30–41, Sao Paulo, Brazil, September 2003. Kluwer Academic.
[119] G. Navarro-Arribas. Access control and mobile agents. DEA thesis, Universitat Autonoma de Barcelona, 2003.
[120] G. Navarro-Arribas, S. Robles, and J. Borrell. An access control method for mobile agents in sea-of-data applications. Upgrade: The European Journal for the Informatics Professional, III:47–51, December 2002.
[121] S. Robles, G. Navarro-Arribas, J. Pons, J. Rifà, and J. Borrell. Mobile agents supporting secure grid environments. In M. Wilson B. Matthews, B. Hopgood, editor, Euroweb 2002 Conference, pages 195–197, Oxford, UK, December 2002. World Wide Web Consortium, British Computer Society.
[122] G. Navarro-Arribas, S. Robles, and J. Borrell. Un método de control de acceso para agentes móviles en aplicaciones mar-de-datos. Novatica, (160):18–22, November-December 2002.
[123] G. Navarro-Arribas, S. Robles, and J. Borrell. Spki para el control de acceso a recursos en entornos de agentes móviles. In C. Martínez S. Gónzalez, editor, VII Reunión Española sobre Criptología y Seguridad de la Información, volume II, pages 671–684, Oviedo, Spain, September 2002. Servicio de Publicaciones de la Universidad de Oviedo.
[124] S. Robles, I. Luque, G. Navarro-Arribas, J. Pons, and J. Borrell. Plataforma segura para la ejecución de agentes móviles con itinerario, código y datos protegibles. In C. Martínez S. González, editor, VII Reunión Española sobre Criptología y Seguridad de la Información, volume II, pages 765–778, Oviedo, Spain, September 2002. Servicio de Publicaciones de la Universidad de Oviedo.
[125] G. Navarro-Arribas, S. Robles, and J. Borrell. Role-based access control for e-commerce sea-of-data applications. In Agnes Hui and Virgil Gligor, editors, Information Security. 5th International Conference, ISC 2002, volume 2433 of Lecture Notes in Computer Science, pages 102–116, Sao Paulo, September/October 2002. Springer Verlag. [ .pdf ]
[126] G. Navarro-Arribas, S. Robles, and J. Borrell. Adapted role-based access control for marism-a using spki certificates. In 2nd. IW on Security of Mobile Multiagent Systems, pages 35–42, Bologna, Italy, July 2002.