default search action
Antonio Maña
Person information
- affiliation: University of Málaga, Spain
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j20]Antonio Maña, Hristo Koshutanski:
Special issue on "Recent advances in ambient intelligence towards a smart and human-centered internet of things". J. Ambient Intell. Humaniz. Comput. 10(2): 727-729 (2019) - 2017
- [j19]Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Antonio Mana, George Spanoudakis:
Towards Transparent and Trustworthy Cloud. IEEE Cloud Comput. 4(3): 40-48 (2017) - [j18]Daniel Le Métayer, Mathias Bossuet, Fanny Coudert, Claire Gayrel, Francisco J. Jaime, Christophe Jouvray, Antonio Kung, Zhendong Ma, Antonio Maña:
Interdisciplinarity in practice: Challenges and benefits for privacy research. Comput. Law Secur. Rev. 33(6): 864-869 (2017) - [j17]José Fran. Ruiz, Marcos Arjona, Antonio Maña, Carsten Rudolph:
Security knowledge representation artifacts for creating secure IT systems. Comput. Secur. 64: 69-91 (2017) - [e4]Andreas Braun, Reiner Wichert, Antonio Maña:
Ambient Intelligence - 13th European Conference, AmI 2017, Malaga, Spain, April 26-28, 2017, Proceedings. Lecture Notes in Computer Science 10217, 2017, ISBN 978-3-319-56996-3 [contents] - 2015
- [j16]José Fran. Ruiz, Antonio Maña, Carsten Rudolph:
An Integrated Security and Systems Engineering Process and Modelling Framework. Comput. J. 58(10): 2328-2350 (2015) - [j15]Pablo Antón, Antonio Maña, Antonio Muñoz, Hristo Koshutanski:
An immersive view approach by secure interactive multimedia proof-of-concept implementation. Multim. Tools Appl. 74(19): 8401-8420 (2015) - [c69]Francisco J. Jaime, Antonio Maña, Zhendong Ma, Christian Wagner, Daniel Hovie, Mathias Bossuet:
Building a Privacy Accountable Surveillance System. MODELSWARD 2015: 646-654 - 2014
- [j14]Albert Levi, Özgür Gürbüz, Antonio Maña, Marek Klonowski, Matteo Cesana, Mona Ghassemian, Susana Sargento:
A special issue of ad hoc networks on "Smart solutions for mobility supported distributed and embedded systems". Ad Hoc Networks 15: 1-3 (2014) - [c68]Zhendong Ma, Denis Butin, Francisco J. Jaime, Fanny Coudert, Antonio Kung, Claire Gayrel, Antonio Maña, Christophe Jouvray, Nathalie Trussart, Nathalie Grandjean, Víctor Manuel Hidalgo, Mathias Bossuet, Fernando Casado, M. Carmen Hidalgo:
Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems. APF 2014: 101-116 - [c67]Marcos Arjona, Carolina Dania, Marina Egea, Antonio Maña:
Validation of a Security Metamodel for the Development of Cloud Applications. OCL@MoDELS 2014: 33-42 - [c66]Antonio Muñoz, Antonio Maña:
Software and Hardware Certification Techniques in a Combined Certification Model. SECRYPT 2014: 405-410 - [c65]José Fran. Ruiz, Carsten Rudolph, Antonio Maña, Marcos Arjona:
A security engineering process for systems of systems using security patterns. SysCon 2014: 8-11 - 2013
- [c64]José Fran. Ruiz, Marcos Arjona, Antonio Mana, Niklas Carstens:
Secure Engineering and Modelling of a Metering Devices System. ARES 2013: 418-427 - [c63]Marioli Montenegro, Antonio Maña, Hristo Koshutanski:
Improving Security Assurance of Services through Certificate Profiles. ESOCC Workshops 2013: 288-302 - [c62]Samuel Paul Kaluvuri, Hristo Koshutanski, Francesco Di Cerbo, Antonio Mana:
Security Assurance of Services through Digital Security Certificates. ICWS 2013: 539-546 - [c61]Javier Espinar, Antonio Maña, Hristo Koshutanski:
Workflow Operational Assurance Platform for Security-by-Design Certified Service-Based Coalitions. SERVICES 2013: 84-91 - [c60]Antonio Muñoz, Antonio Mana:
Bridging the GAP between Software Certification and Trusted Computing for Securing Cloud Computing. SERVICES 2013: 103-110 - [c59]Marioli Montenegro, Antonio Mana:
Improving Interoperability of Digital Certificates for Software & Services. SERVICES 2013: 185-192 - [c58]José Fran. Ruiz, Antonio Maña, Marcos Arjona, Janne Paatero:
Emergency Systems Modelling using a Security Engineering Process. SIMULTECH 2013: 117-124 - 2012
- [j13]Antonio Muñoz, Javier Gonzalez, Antonio Maña:
A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications. Comput. J. 55(8): 979-994 (2012) - [j12]Antonio Maña, Hristo Koshutanski, Ernesto J. Pérez:
A trust negotiation based security framework for service provisioning in load-balancing clusters. Comput. Secur. 31(1): 4-25 (2012) - [j11]Pablo Antón, Antonio Muñoz, Antonio Maña, Hristo Koshutanski:
Security-enhanced ambient assisted living supporting school activities during hospitalisation. J. Ambient Intell. Humaniz. Comput. 3(3): 177-192 (2012) - [c57]Germán Herrero Cárcel, Aida Campo, Maria Gil, Ana Garcia, David Martin, Ion Zugasti, Sonia Bilbao, Amalia Perez, Hristo Koshutanski, Antonio Maña, Iñaki Perez De Albeniz:
ConTur: An Intelligent Content Management System for the Tourism Sector. ENTER 2012: 36-47 - [c56]George Spanoudakis, Ernesto Damiani, Antonio Maña:
Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach. HASE 2012: 175-176 - [c55]Pablo Antón, Antonio Muñoz, Antonio Maña:
Authentication and Authorization in Ambient Assisting Living Applications: An Approach for UniversAAL. IWAAL 2012: 135-142 - [c54]José Fran. Ruiz, Rajesh Harjani, Antonio Mana, Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin:
A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components. PDP 2012: 261-268 - [e3]Albert Levi, Mohamad Badra, Matteo Cesana, Mona Ghassemian, Özgür Gürbüz, Nafaâ Jabeur, Marek Klonowski, Antonio Maña, Susana Sargento, Sherali Zeadally:
5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. IEEE 2012, ISBN 978-1-4673-0229-6 [contents] - 2011
- [j10]Antonio Muñoz, Pablo Antón, Antonio Maña:
Multiagent Systems Protection. Adv. Softw. Eng. 2011: 281517:1-281517:9 (2011) - [j9]Ernesto Damiani, Sigrid Gürgens, Antonio Maña, George Spanoudakis, Claudio A. Ardagna:
Editorial. J. Syst. Archit. 57(3): 229-230 (2011) - [j8]Antonio Muñoz, Antonio Maña:
TPM-based protection for mobile agents. Secur. Commun. Networks 4(1): 45-60 (2011) - [c53]Antonio Muñoz, Antonio Maña:
Facilitating the Use of TPM Technologies Using the Serenity Framework. ATC 2011: 164-174 - [c52]Antonio Muñoz, Pablo Antón, Antonio Maña:
Static Mutual Approach for Protecting Mobile Agent. DCAI 2011: 51-58 - [c51]Antonio Maña, José Fran. Ruiz:
A Security Modelling Framework for Systems of Embedded Components. HASE 2011: 176-177 - [c50]Javier González, Antonio Muñoz, Antonio Maña:
Multi-layer Monitoring for Cloud Computing. HASE 2011: 291-298 - [c49]Pablo Antón, Antonio Maña, Antonio Muñoz, Hristo Koshutanski:
Live Interactive Frame Technology Alleviating Children Stress and Isolation during Hospitalization. IWAAL 2011: 92-100 - [c48]Antonio Mana, Gimena Pujol, Claudia Pandolfo:
A Distributed Secure Ontology for Certified Services Oriented Applications. ICSC 2011: 522-529 - [c47]Adrian Waller, Ian Sandy, Eamonn Power, Efthimia Aivaloglou, Charalambos Skianis, Antonio Muñoz, Antonio Maña:
Policy Based Management for Security in Cloud Computing. STA Workshops 2011: 130-137 - [c46]Antonio Muñoz, Rajesh Harjani, Antonio Maña, Rodrigo Díaz:
Dynamic Security Monitoring and Accounting for Virtualized Environments. STA Workshops 2011: 182-189 - 2010
- [j7]Hristo Koshutanski, Antonio Maña:
Interoperable semantic access control for highly dynamic coalitions. Secur. Commun. Networks 3(6): 565-594 (2010) - [c45]Zoltán Miklós, Nicolas Bonvin, Paolo Bouquet, Michele Catasta, Daniele Cordioli, Peter Fankhauser, Julien Gaugaz, Ekaterini Ioannou, Hristo Koshutanski, Antonio Maña:
From Web Data to Entities and Back. CAiSE 2010: 302-316 - [c44]Antonio Maña, Gimena Pujol:
Verification of Security Policy of Service Oriented Systems. DMS 2010: 120-125 - [c43]Jean-Christophe R. Pazzaglia, Volkmar Lotz, V. Campos Cerda, Ernesto Damiani, Claudio A. Ardagna, Sigrid Gürgens, Antonio Maña, Claudia Pandolfo, George Spanoudakis, Franco Guida, Renato Menicocci:
Advanced Security Service cERTificate for SOA: Certified Services go Digital. ISSE 2010: 151-160 - [c42]Antonio Muñoz, Antonio Maña, Pablo Antón:
In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware. MMM-ACNS 2010: 284-297 - [c41]Antonio Muñoz, Antonio Maña, Pablo Antón:
A Solution Based on Cryptographic Hardware to Protect Agents. NBiS 2010: 400-407 - [c40]Marco Anisetti, Claudio A. Ardagna, Franco Guida, Sigrid Gürgens, Volkmar Lotz, Antonio Maña, Claudia Pandolfo, Jean-Christophe R. Pazzaglia, Gimena Pujol, George Spanoudakis:
ASSERT4SOA: Toward Security Certification of Service-Oriented Applications. OTM Workshops 2010: 38-40 - [e2]Boris E. R. de Ruyter, Reiner Wichert, David V. Keyson, Panos Markopoulos, Norbert A. Streitz, Monica Divitini, Nikolaos Georgantas, Antonio Maña Gómez:
Ambient Intelligence - First International Joint Conference, AmI 2010, Malaga, Spain, November 10-12, 2010. Proceedings. Lecture Notes in Computer Science 6439, Springer 2010, ISBN 978-3-642-16916-8 [contents]
2000 – 2009
- 2009
- [j6]Antonio Muñoz, Antonio Maña, Daniel Serrano:
Protecting agents from malicious hosts using TPM. Int. J. Comput. Sci. Appl. 6(5): 30-58 (2009) - [c39]Antonio Muñoz, Antonio Maña, Daniel Serrano:
SecMiLiA: An Approach in the Agent Protection. ARES 2009: 341-348 - [c38]Antonio Muñoz, Antonio Maña, Daniel Serrano:
AVISPA in the Validation of Ambient Intelligence Scenarios. ARES 2009: 420-426 - [c37]Antonio Muñoz, Antonio Maña, Rajesh Harjani, Marioli Montenegro:
Agent Protection Based on the Use of Cryptographic Hardware. COMPSAC (2) 2009: 312-317 - [c36]Álvaro Armenteros, Antonio Muñoz, Antonio Maña, Daniel Serrano:
Security and Dependability in Ambient Intelligence Scenarios - The Communication Prototype. ICEIS (3) 2009: 49-56 - [c35]Antonio Muñoz, Antonio Maña, Daniel Serrano:
Trusted Computing: The Cornerstone in the Secure Migration Library for Agents. PAAMS 2009: 256-265 - [c34]Antonio Maña, Antonio Muñoz, Daniel Serrano:
Hardware Protection of Agents in Ubiquitous and Ambient Intelligence Environments. PAAMS 2009: 470-479 - [c33]Antonio Maña, Antonio Muñoz, Daniel Serrano:
Protected Computing Approach: Towards the Mutual Protection of Agent Computing. PAAMS 2009: 538-547 - [c32]Antonio Muñoz, Antonio Maña, Daniel Serrano:
The Role of Trusted Computing in the Secure Migration Library for Agents. RCIS 2009: 255-264 - [c31]Beatriz Gallego-Nicasio, Antonio Muñoz, Antonio Maña, Daniel Serrano:
Security Patterns, Towards a Further Level. SECRYPT 2009: 349-356 - [c30]Ernesto Damiani, Antonio Maña:
Toward WS-certificate. SWS 2009: 1-2 - [p8]Antonio Maña, George Spanoudakis, Spyros Kokolakis:
Introduction: The SERENITY vision. Security and Dependability for Ambient Intelligence 2009: 1-18 - [p7]Francisco Sánchez-Cid, Antonio Maña, George Spanoudakis, Christos Kloukinas, Daniel Serrano, Antonio Muñoz:
Representation of Security and Dependability Solutions. Security and Dependability for Ambient Intelligence 2009: 69-95 - [p6]Daniel Serrano, Antonio Maña, Rafael Llarena, Beatriz Gallego-Nicasio Crespo, Keqin Li:
SERENITY Aware Development of Security and Dependability Solutions. Security and Dependability for Ambient Intelligence 2009: 127-141 - [p5]Daniel Serrano, Antonio Maña, Rafael Llarena, Beatriz Gallego-Nicasio Crespo, Keqin Li:
SERENITY Aware System Development Process. Security and Dependability for Ambient Intelligence 2009: 165-179 - [p4]Beatriz Gallego-Nicasio Crespo, Ana Piñuela, Pedro Soria-Rodriguez, Daniel Serrano, Antonio Maña:
The SERENITY Runtime Framework. Security and Dependability for Ambient Intelligence 2009: 183-198 - [p3]Beatriz Gallego-Nicasio Crespo, Ana Piñuela, Pedro Soria-Rodriguez, Daniel Serrano, Antonio Maña:
Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime. Security and Dependability for Ambient Intelligence 2009: 199-212 - [p2]Álvaro Armenteros, Laura García, Antonio Muñoz, Antonio Maña:
Realising the Potential of Serenity in Emerging AmI Ecosystems: Implications and Challenges. Security and Dependability for Ambient Intelligence 2009: 323-342 - [p1]Antonio Maña, George Spanoudakis, Spyros Kokolakis:
Future Directions. Security and Dependability for Ambient Intelligence 2009: 379-383 - [e1]Spyros Kokolakis, Antonio Maña Gómez, George Spanoudakis:
Security and Dependability for Ambient Intelligence. Advances in Information Security 45, Springer 2009, ISBN 978-0-387-88774-6 [contents] - 2008
- [c29]Antonio Maña, Gimena Pujol:
Towards Formal Specification of Abstract Security Properties. ARES 2008: 80-87 - [c28]Antonio Muñoz, Antonio Maña, Daniel Serrano:
Model Cheking Ambient Intelligence with AVISPA. AMIF 2008: 182-193 - [c27]Daniel Serrano, Antonio Maña, Athanasios-Dimitrios Sotirious:
Towards Precise Security Patterns. DEXA Workshops 2008: 287-291 - [c26]Francisco Sánchez-Cid, Antonio Maña:
SERENITY Pattern-Based Software Development Life-Cycle. DEXA Workshops 2008: 305-309 - [c25]Junaid Ahsenali Chaudhry, Themis Palpanas, Periklis Andritsos, Antonio Maña:
Entity Lifecycle Management for OKKAM. IRSW 2008 - [c24]Paolo Bouquet, Heiko Stoermer, Claudia Niederée, Antonio Mana:
Entity Name System: The Back-Bone of an Open and Scalable Web of Data. ICSC 2008: 554-561 - [c23]Hristo Koshutanski, Antonio Maña:
A Semantic Approach to Access Control and Automated Credential Negotiation for Decentralized Online Repositories / An OKKAM Project Use Case. SWAP 2008 - 2007
- [c22]Francisco Sánchez-Cid, Antonio Mana:
Patterns for Automated Management of Security and Dependability Solutions. DEXA Workshops 2007: 739-743 - [c21]Sigrid Gürgens, Carsten Rudolph, Antonio Maña, Antonio Muñoz:
Facilitating the Use of TPM Technologies through S&D Patterns. DEXA Workshops 2007: 765-769 - [c20]Antonio Maña, Antonio Muñoz:
Trusted Code Execution in JavaCard. TrustBus 2007: 269-279 - [c19]Antonio Maña, Antonio Muñoz, Daniel Serrano:
Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence. UIC 2007: 1201-1212 - 2006
- [b1]Antonio Mana, Volkmar Lotz:
Developing ambient intelligence - proceedings of the first international conference on ambient intelligence developments. Springer 2006, ISBN 978-2-287-47469-9, pp. I-X, 1-159 - [c18]Antonio Mana, Antonio Muñoz:
Protected computing vs. trusted computing. COMSWARE 2006: 1-7 - [c17]Antonio Maña, Francisco Sánchez-Cid, Daniel Serrano, Antonio Muñoz:
Towards Secure Ambient Intelligence Scenarios. SEKE 2006: 386-391 - [c16]Javier López, Antonio Maña, Antonio Muñoz:
A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. UIC 2006: 977-987 - 2005
- [j5]Mariemma Inmaculada Yagüe del Valle, Antonio Maña, Javier López:
A metadata-based access control model for web services. Internet Res. 15(1): 99-116 (2005) - [c15]Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana:
Semantic Access Control Model: A Formal Specification. ESORICS 2005: 24-43 - [c14]Carsten Rudolph, Antonio Mana:
Specification and automated processing of security requirements (SAPS'05). ASE 2005: 460 - 2004
- [j4]Javier López, Antonio Mana, José A. Montenegro, Juan J. Ortega:
PKI design based on the use of on-line certification authorities. Int. J. Inf. Sec. 2(2): 91-102 (2004) - [j3]Antonio Mana, Javier López, Juan J. Ortega, Ernesto Pimentel, José M. Troya:
A framework for secure execution of software. Int. J. Inf. Sec. 3(2): 99-112 (2004) - [c13]Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Francisco Sánchez-Cid:
Semantic Interoperability of Authorizations. WOSIS 2004: 269-278 - 2003
- [j2]Javier López, Antonio Maña, Juan J. Ortega, José M. Troya, Mariemma Inmaculada Yagüe del Valle:
Integrating PMI services in CORBA applications. Comput. Stand. Interfaces 25(4): 391-409 (2003) - [j1]Mariemma Inmaculada Yagüe del Valle, Antonio Maña, Javier López, Ernesto Pimentel, José M. Troya:
A secure solution for commercial digital libraries. Online Inf. Rev. 27(3): 147-159 (2003) - [c12]Antonio Mana, José A. Montenegro, Carsten Rudolph, José Luis Vivas:
A business process-driven approach to security engineering. DEXA Workshops 2003: 477-481 - [c11]Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier López, José M. Troya:
Applying the Semantic Web Layers to Access Control. DEXA Workshops 2003: 622-626 - 2002
- [c10]Javier López, Antonio Mana, Mariemma Inmaculada Yagüe del Valle:
XML-Based Distributed Access Control System. EC-Web 2002: 203-213 - [c9]Antonio Mana, Sonia Matamoros:
Practical Mobile Digital Signatures. EC-Web 2002: 224-233 - [c8]Javier López, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya:
Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. EGOV 2002: 211-214 - [c7]Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Javier López, Ernesto Pimentel, José M. Troya:
Secure Content Distribution for Digital Libraries. ICADL 2002: 483-494 - [c6]Javier López, Antonio Mana, Ernesto Pimentel, José M. Troya, Mariemma Inmaculada Yagüe del Valle:
Access Control Infrastructure for Digital Objects. ICICS 2002: 399-410 - 2001
- [c5]Antonio Mana, Ernesto Pimentel:
An Efficient Software Protection Scheme. SEC 2001: 385-402 - 2000
- [c4]Javier López, Antonio Mana, Juan J. Ortega, José M. Troya:
Distributed Storage and Revocation in Digital Certificate Databases. DEXA 2000: 929-938 - [c3]Jorge Dávila, Javier López, Antonio Mana, Juan J. Ortega, José M. Troya:
Development of Secure Internet Applications for Governmental Environments. DEXA Workshop 2000: 362-368
1990 – 1999
- 1999
- [c2]Javier López, Antonio Mana, Juan J. Ortega:
Cert'eM: Certification System Based on Electronic Mail Service Structure. CQRE 1999: 109-118 - 1998
- [c1]Antonio Maña Gómez, F. Villalba-Sánchez, Javier López:
Secure Examinations through the Internet. Teleteaching 1998: 695-704
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint