Entity Name System: The Back-Bone of an Open and Scalable Web of Data. P Bouquet, H Stoermer, C Niederée, A Maña 2nd IEEE International Conference on Semantic Computing (ICSC 2008), 2008 | 106 | 2008 |
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin 2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012 | 82 | 2012 |
Applying the semantic web layers to access control MI Yague, A Mana, J Lopez, JM Troya 14th International Workshop on Database and Expert Systems Applications …, 2003 | 74 | 2003 |
An efficient software protection scheme A Mana, E Pimentel Trusted Information: The New Decade Challenge 16, 385-401, 2001 | 57 | 2001 |
A performance-oriented monitoring system for security properties in cloud computing applications A Muñoz, J Gonzalez, A Maña The Computer Journal 55 (8), 979-994, 2012 | 47 | 2012 |
A metadata‐based access control model for web services MI Yagüe, A Maña, J Lopez Internet research 15 (1), 99-116, 2005 | 45 | 2005 |
Semantic access control model: A formal specification MI Yagüe, MM Gallardo, A Mana Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 42 | 2005 |
A framework for secure execution of software A Mana, J Lopez, JJ Ortega, E Pimentel, JM Troya International Journal of Information Security 3, 99-112, 2004 | 40 | 2004 |
A business process-driven approach to security engineering A Mana, JA Montenegro, C Rudolph, JL Vivas 14th International Workshop on Database and Expert Systems Applications …, 2003 | 40 | 2003 |
Certifying services in cloud: The case for a hybrid, incremental and multi-layer approach G Spanoudakis, E Damiani, A Maña 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering …, 2012 | 35 | 2012 |
Towards formal specification of abstract security properties A Maña, G Pujol 2008 Third International Conference on Availability, Reliability and …, 2008 | 34 | 2008 |
Towards secure agent computing for ubiquitous computing and ambient intelligence A Maña, A Muñoz, D Serrano International Conference on Ubiquitous Intelligence and Computing, 1201-1212, 2007 | 33 | 2007 |
Towards ws-certificate E Damiani, A Mana Proceedings of the 2009 ACM workshop on Secure web services, 1-2, 2009 | 29 | 2009 |
Policy based management for security in cloud computing A Waller, I Sandy, E Power, E Aivaloglou, C Skianis, A Muñoz, A Maña Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011 | 28 | 2011 |
Towards semantic resolution of security in ambient environments A Maña, C Rudolph, M Hoffmann, A Badii, S Engberg, R Nair, D Thiemert, ... Developing Ambient Intelligence: Proceedings of the International Conference …, 2008 | 28 | 2008 |
Towards precise security patterns D Serrano, A Maña, AD Sotirious 2008 19th International Workshop on Database and Expert Systems Applications …, 2008 | 27 | 2008 |
Strengthening the security of machine readable documents by combining RFID and optical memory devices A Maña, V Lotz, M Lehtonen, F Michahelles, T Staake, E Fleisch Developing Ambient Intelligence: Proceedings of the First International …, 2006 | 25 | 2006 |
Integrating PMI services in CORBA applications J Lopez, A Mana, JJ Ortega, JM Troya, MI Yagüe Computer Standards & Interfaces 25 (4), 391-409, 2003 | 24 | 2003 |
Bridging the gap between software certification and trusted computing for securing cloud computing A Muñoz, A Maña 2013 IEEE ninth world congress on services, 103-110, 2013 | 23 | 2013 |
Serenity pattern-based software development life-cycle F Sanchez-Cid, A Maña 2008 19th International Workshop on Database and Expert Systems Applications …, 2008 | 23 | 2008 |