• Publications
  • Influence
QoS/QoE-based Wi-Fi Network Trust and Reputation
In recent years, Wi-Fi technologies have become very popular and the trend is continuing to climb. Unfortunately, there is a risk to use Wi-Fi networks in range because there is no way to selectExpand
  • 1
  • 1
  • PDF
Towards mobile/wearable device electrosmog reduction through careful network selection
TLDR
We propose a new network switching selection model and its algorithms that minimize the non-ionizing radiation of these devices during use. Expand
  • 11
  • PDF
Flexible Communication: A Secure and Trust-Based Free Wi-Fi Password Sharing Service
TLDR
This paper introduces Flexible Communication, a secure and trust-based Wi-Fi password sharing service, which relies on a social-networking oriented trust model approach and which at the same time allows the user to locate and to connect to those networks at any time. Expand
  • 7
Trust Management for Selecting Trustworthy Access Points
Both free and low-priced mobile wireless networks are expanding and its users are more numerous every day. This success is particularly due to the mobility offered to users. These networks haveExpand
  • 5
Reputation-based Telecommunication Network Selection
TLDR
We present our work in progress towards attack-resistant sharing of quality of service information and network provider reputation among mobile users in a decentralized peer-to-peer fashion. Expand
  • 4
  • PDF
Formal Modeling and Verification of Opportunity-enabled Risk Management
TLDR
With the advent of the Bring-Your-Own-Device (BYOD) trend, mobile work is achieving a widespread diffusion that challenges the traditional view of security standard and risk management. Expand
  • 2
  • PDF
Design and validation of a trust-based opportunity-enabled risk management system
TLDR
We present a methodology called opportunity-enabled risk management (OPPRIM), which supports the decision-making process in access control to remote corporate assets in a trust-based setting. Expand
  • 2
OPPRIM: Opportunity-Enabled Risk Management for Trust and Risk-Aware Asset Access Decision-Making
Nowadays BYOD and mobile work are a reality even if they challenge traditional security perimeters and risk management that mainly focus on the threats that these mobile opportunities create. They doExpand
  • 3
  • PDF
Verifying Hotspot Quality User Rating with Certified QoS Evidence
TLDR
We provide an Android application that allows the users to rate the networks they have used and to check that their rating corresponds to the true network quality they have experienced by measuring and certifying Quality of Service evidence such as delay, jitter and packet loss. Expand
  • 1
On the Road to Privacy- and Data Protection-Friendly Security Technologies in the Workplace – A Case-Study of the MUSES Risk and Trust Analysis Engine
It seems generally accepted that the major threat for company security occurs from within the organisation itself. Given the potential threats for the value attached to information resources,Expand
  • 2