Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jose L. Muñoz is active.

Publication


Featured researches published by Jose L. Muñoz.


Internet Research | 2009

A review of trust modeling in ad hoc networks

Marcela M. Mejia; Néstor M. Peña; Jose L. Muñoz; Oscar Esparza

Purpose – Mobile ad hoc networks rely on cooperation to perform essential network mechanisms such as routing. Therefore, network performance depends to a great extent on giving participating nodes an incentive for cooperation. The level of trust among nodes is the most frequently used parameter for promoting cooperation in distributed systems. There are different models for representing trust, each of which is suited to a particular context and leads to different procedures for computing and propagating trust. The goal of this study is to analyze the most representative approaches for mobile ad hoc networks. It aims to obtain a qualitative comparison of the modeling approaches, according to the three basic components of a trust model: information gathering, information scoring and ranking, and action execution.Design/methodology/approach – The paper identifies the different tasks required by a trust system and compares the way they are implemented when the system model itself is based on information theor...


Computer Communications | 2006

Secure brokerage mechanisms for mobile electronic commerce

Oscar Esparza; Jose L. Muñoz; Miguel Soriano; Jordi Forné

The possibility of making the Internet accessible via mobile devices has generated an important opportunity for electronic commerce. Nevertheless, some deficiencies deter a massive use of m-commerce applications. Security and easiness of use are unavoidable conditions. The use of brokerage systems constitutes an interesting solution to speed up the information delivery to the users. Moreover, brokers can use mobile agents to efficiently and easily perform the search and retrieval of commercial information in the Internet. Although the mobile agent technology is a very suitable choice for the m-commerce scenario, there are security issues that hinder its use. In particular, an important aspect that must be solved for the m-commerce scenario is the mobile agent protection from manipulation attacks performed by malicious hosts. The first part of this paper describes a mechanism to reach this protection. We describe how to use software watermarking techniques in the mobile agent to detect manipulation attacks, and how the broker can be used to punish the malicious hosts. Once an m-commerce site is selected by the user, an end-to-end secure transaction must be established. The transaction can use several protocols, from a simple secure TLS channel to send a credit card number until a sophisticated payment protocol. In any case, Public Key Certificates (PKCs) are required for these protocols. It must be stressed that certificates management is a heavy process and that clients in the brokerage scenario are usually resource-limited. For this reason, the best option is that clients delegate this task to the broker. Notice that the broker is a Trusted Third Party (TTP) and, in general, it is not resource-limited. Therefore, the broker is appropriate for storing and managing PKCs. The second part of this paper addresses this issue, with a particular emphasis in the certificate status management which is the most complex task of certificate management.


international conference on web engineering | 2003

Host revocation authority: a way of protecting mobile agents from malicious hosts

Oscar Esparza; Miguel Soriano; Jose L. Muñoz; Jordi Forné

Mobile agents are software entities that consist of code, data and state, and that can migrate autonomously from host to host executing their code. Despite its benefits, security issues restrict the use of code mobility. The approach that is presented here aids to solve the problem of malicious hosts by using a Trusted Third Party, the Host Revocation Authority. The HoRA controls which are the hosts that acted maliciously in the past. The agent sender must consult the HoRA before sending an agent in order to remove from the agents itinerary all the revoked hosts. The HoRA can also revoke a malicious host if the agent sender detects and proves that this malicious host did not act honestly.


database and expert systems applications | 2003

Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts

Oscar Esparza; Marcel Fernandez; Miguel Soriano; Jose L. Muñoz; Jordi Forné

Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems.


International Journal of Information Security | 2004

Certificate revocation system implementation based on the Merkle hash tree

Jose L. Muñoz; Jordi Forné; Oscar Esparza; Miguel Soriano

Public-key cryptography is widely used to provide Internet security services. The public-key infrastructure (PKI) is the infrastructure that supports the public-key cryptography, and the revocation of certificates implies one of its major costs. The goal of this article is to explain in detail a certificate revocation system based on the Merkle hash tree (MHT) called AD–MHT. AD–MHT uses the data structures proposed by Naor and Nissim in their authenticated dictionary (AD) [20]. This work describes the tools used and the details of the AD–MHT implementation. The authors also address important issues not addressed in the original AD proposal, such as responding to a request, revoking a certificate, deleting an expired certificate, the status checking protocol for communicating the AD–MHT repository with the users, verifying a response, system security, and, finally, performance evaluation.


applied cryptography and network security | 2003

Using OCSP to Secure Certificate-Using Transactions in M-commerce

Jose L. Muñoz; Jordi Forné; Oscar Esparza; Bernabe Miguel Soriano

The possibility of making the Internet accessible via mobile telephones has generated an important opportunity for electronic commerce. Nevertheless, some deficiencies deter its mass acceptance in e-commerce applications. In order to speed up the information delivery, the use of brokerage systems constitutes an interesting solution. In this paper we review the problem of certificate validation in m-commerce transactions and we present an architecture where a broker is used as OCSP responder for the certificate validation. A modification over OCSP called \(\mathcal{H}\)-OCSP is also proposed as a way to reduce the computational load and the bandwidth requirements of OCSP which is specially desirable in the wireless environment. The ASN.1 add-on for \(\mathcal{H}\)-OCSP that makes it inter-operable with the standard OCSP is defined and the behaviour of \(\mathcal{H}\)-OCSP compared to standard OCSP is evaluated.


Computer Education | 1997

Multiple representation for understanding data structures

Biffah Hanciles; Venky Shankararaman; Jose L. Muñoz

Abstract The nature of the nations dynamic workforce and the demand for workers with knowledge-based and information systems skills require with increasing importance the delivery of education with a focus on these areas of activity. Those who seek post-secondary education often are unable to attend class seminars in the traditional campus-oriented learning environment. Advanced information technologies-interactive television for example-are becoming viable and popular extensions of the traditional classroom. The capabilities of these media differ, however, in their characteristics and in their ability to deliver instruction. Case data were collected in order to explore whether and how the computer-based systems construction, in the form of expert systems development by students, can be achieved successfully in a distance learning environment. The results of the study suggest that not only can successful systems development be achieved, but that the hands-on aspect of systems development contributes to increased student attention, learning, and sense of achievement. However, one must be cautious when implementing such projects in a distance environment. Issues which merit careful consideration prior to such an undertaking include the choice of software, direction in the use of the software, and means of instructional support for students who have questions or experience difficulties with the concepts and software.-The nature of the nations dynamic workforce and the demand for workers with knowledge-based and information systems skills require with increasing importance the delivery of education with a focus on these areas of activity. Those who seek post-secondary education often are unable to attend class seminars in the traditional campus-oriented learning environment. Advanced information technologies-interactive television for example-are becoming viable and popular extensions of the traditional classroom. The capabilities of these media differ, however, in their characteristics and in their ability to deliver instruction. Case data were collected in order to explore whether and how the computer-based systems construction, in the form of expert systems development by students, can be achieved successfully in a distance learning environment. The results of the study suggest that not only can successful systems development be achieved, but that the hands-on aspect of systems development contributes to increased student attention, learning, and sense of achievement. However, one must be cautious when implementing such projects in a distance environment. Issues which merit careful consideration prior to such an undertaking include the choice of software, direction in the use of the software, and means of instructional support for students who have questions or experience difficulties with the concepts and software.


Journal of Network and Computer Applications | 2013

COACH: COllaborative certificate stAtus CHecking mechanism for VANETs

Carlos Gañán; Jose L. Muñoz; Oscar Esparza; Jorge Mata-Díaz; Juan Hernández-Serrano; Juanjo Alins

Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using digital certificates. However, if a vehicle is no longer trusted, its certificates have to be revoked and this status information has to be made available to other vehicles as soon as possible. In this paper, we propose a collaborative certificate status checking mechanism called COACH to efficiently distribute certificate revocation information in VANETs. In COACH, we embed a hash tree in each standard Certificate Revocation List (CRL). This dual structure is called extended-CRL. A node possessing an extended-CRL can respond to certificate status requests without having to send the complete CRL. Instead, the node can send a short response (less than 1 kB) that fits in a single UDP message. Obviously, the substructures included in the short responses are authenticated. This means that any node possessing an extended-CRL can produce short responses that can be authenticated (including Road Side Units or intermediate vehicles). We also propose an extension to the COACH mechanism called EvCOACH that is more efficient than COACH in scenarios with relatively low revocation rates per CRL validity period. To build EvCOACH, we embed an additional hash chain in the extended-CRL. Finally, by conducting a detailed performance evaluation, COACH and EvCOACH are proved to be reliable, efficient, and scalable.


database and expert systems applications | 2002

Evaluation of certificate revocation policies: OCSP vs. Overissued-CRL

Jose L. Muñoz; Jordi Forné; Juan C. Castro

Public key cryptography is widely used to provide Internet security services. PKI is the infrastructure that supports public key cryptography and revocation of certificates implies one of its major costs. In this paper we propose a model to compare revocation policies and use it to compare the main revocation policies: OCSP and Overissued-CRL.


data and knowledge engineering | 2012

Optimal tag suppression for privacy protection in the semantic Web

Javier Parra-Arnau; David Rebollo-Monedero; Jordi Forné; Jose L. Muñoz; Oscar Esparza

Leveraging on the principle of data minimization, we propose tag suppression, a privacy-enhancing technique for the semantic Web. In our approach, users tag resources on the Web revealing their personal preferences. However, in order to prevent privacy attackers from profiling users based on their interests, they may wish to refrain from tagging certain resources. Consequently, tag suppression protects user privacy to a certain extent, but at the cost of semantic loss incurred by suppressing tags. In a nutshell, our technique poses a trade-off between privacy and suppression. In this paper, we investigate this trade-off in a mathematically systematic fashion and provide an extensive theoretical analysis. We measure user privacy as the entropy of the users tag distribution after the suppression of some tags. Equipped with a quantitative measure of both privacy and utility, we find a close-form solution to the problem of optimal tag suppression. Experimental results on a real-world tagging application show how our approach may contribute to privacy protection.

Collaboration


Dive into the Jose L. Muñoz's collaboration.

Top Co-Authors

Avatar

Oscar Esparza

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Jordi Forné

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Jorge Mata-Díaz

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Juanjo Alins

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Miguel Soriano

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Carlos Gañán

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Elizabeth Rendon-Morales

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

William J Buchanan

Edinburgh Napier University

View shared research outputs
Top Co-Authors

Avatar

Abiola Abimbola

Edinburgh Napier University

View shared research outputs
Top Co-Authors

Avatar

Juan Caubet

Polytechnic University of Catalonia

View shared research outputs
Researchain Logo
Decentralizing Knowledge