Rubén Trapero
YOU?
Author Swipe
View article: Service discovery suite for user-centric service creation
Service discovery suite for user-centric service creation Open
Two emerging trends are impacting the CIT world: service orientation and user centricity. The OPUCE project aims at developing a platform to mix together both philosophies into an environment where end-users are capable of building highly …
View article: Key Innovations in ANASTACIA: Advanced Networked Agents for Security and Trust Assessment in CPS/IOT Architectures
Key Innovations in ANASTACIA: Advanced Networked Agents for Security and Trust Assessment in CPS/IOT Architectures Open
This book chapter presents the main key innovations being devised, implemented and validated in the scope of Anastacia H2020 EU research project, to meet the cybersecurity challenge of protecting dynamically heterogenous IoT scenarios, end…
View article: CIPSEC-Enhancing Critical Infrastructure Protection with Innovative Security Framework
CIPSEC-Enhancing Critical Infrastructure Protection with Innovative Security Framework Open
In the recent years, the majority of the world's Critical Infrastructures (CIs) have evolved to be more flexible, cost efficient and able to offer better services and conditions for business growth. Through this evolution, CIs and companie…
View article: Telco Cloud Resilience: Synergies between Fault and Security Management
Telco Cloud Resilience: Synergies between Fault and Security Management Open
This work capitalizes on the concept of network function virtualization at the telco cloud, and presents a joint study between fault management and security management. Specifically, the commonalities of fault and security management are p…
View article: Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach
Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach Open
A security study of 5G networks and the use of security trust zones in network slicing architectures are presented in this paper. In such an approach, the security trust zone concept is analyzed in terms of a profiling methodology that tak…