We evaluate long-distance effects in K-->pipi decays using a calculational scheme base... more We evaluate long-distance effects in K-->pipi decays using a calculational scheme based on partial conservation of axial-vector current, current algebra, and suppression of exotic Regge meson trajectories. We find that the DeltaI=12 rule emerges naturally from these properties of hadronic physics. Moreover the calculated long-distance contributions are seen to play the dominant role, as opposed to short-distance effects.
Internet of Things (IoT) is a broad term which indicates the concept of increasingly pervasive co... more Internet of Things (IoT) is a broad term which indicates the concept of increasingly pervasive connected devices (embedded within, attached to or related to “Things”) supporting various applications to enhance the awareness and the capabilities of users. The adoption of IoT essentially depends upon trust. Moreover this trust must be established and maintained with respect to a broad group of stakeholders otherwise IoT will face, to some degree or other, challenges which may restrict adoption scope or delay its timing. Without sufficient IoT security it is highly likely that some applications will more resemble the Intranet of Things rather than the Internet of Things as users seek to place their own proprietary protection barriers and thus frustrating broad interoperability. Many of the device connections to the Internet today more closely resemble the Intranet of Things which differs dramatically from the vision for the Internet of Things, the latter being a much more open and interoperable environment allowing in theory the connection with many more objects and, with their multiple IoT compatible devices. One specific challenge within IoT is the control exercised over information collected by increasingly small and pervasive mobile devices, like RFID or future micro-nano sensors which can be ingested, implanted, worn or distributed elsewhere within the environment. In most cases, such devices have the capability of being wireless connected and accessible at all times and by anyone. In this context, the challenge is to ensure that the information collected and stored by the devices should be visible and distributed only by those legally permitted and authorized, acknowledging that permissions and authorizations may change throughout a devices or objects life or lives. This element of IoT represents one of a number of perceived and real concerns which are grouped under the title of IoT privacy. One aspect which often gets overlooked particularly frequently by those of us who entered adulthood before the year 1990 is the importance of the virtual-world. The Internet is a virtual environment. IoT is capable of establishing an important new bridge between the real and virtual-worlds. This bridge is likely to grow and become more relevant to the lives of citizens in the future allowing real-world augmentation of virtual-worlds and conversely allow the virtual-world to be enhanced by real-world information. Noteworthy is that IoT devices may be real or, virtual or, include aspects of both, either instantaneously or one or the other over a device’s or thing’s lifetime. IoT not only supports the exchange of information it nourishes the creation of greater automation. When IoT delivers this automation often reference is made to “smart” e.g. smart-city, smart-healthcare, etc. Trusted IoT therefore extends to confident and appropriate outcomes and not only the aggregation of clear dependable and timely information. Similar such “smart” automation has been widely used for investment banking transactions which has shown how a small change can cause an almost instantaneous and unstoppable global avalanche of stock values which was neither intended nor justified and resulting in severe penalties for a large number of stakeholders. IoT and “smart” applications effects need careful consideration and possibly some form of permanent monitoring to identity potential risks and oversee the development and introduction of suitably appropriate measures. A future IoT governance model has a role in overseeing such measures are put in place to protect IoT users and reinforce trust and confidence in “smart” applications. This chapter provides an overview of how the FP7 projects iCore, BUTLER, GAMBAS and IoT@Work within IERC Activity Chain 05 have approached IoT – security, privacy and governance
a series of events covering related topics on theory and practice on security, cryptography, secu... more a series of events covering related topics on theory and practice on security, cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion detection and other areas related to low enforcement, security data mining, malware models, etc. Security, defined for ensuring protected communication among terminals and user applications across public and private networks, is the core for guaranteeing confidentiality, privacy, and data protection. Security affects business and individuals, raises the business risk, and requires a corporate and individual culture. In the open business space offered by Internet, it is a need to improve defenses against hackers, disgruntled employees, and commercial rivals. There is a required balance between the effort and resources spent on security versus security achievements. Some vulnerability can be addressed using the rule of 80:20, meaning 80% of the vulnerabilities can be addressed for 20% of the costs. Other technical aspe...
— Current business-critical systems have stringent requirements for the significant and measurabl... more — Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems achieve arbitrary resilience by a brute-force approach. Self-healing is either rudimentary or non-existent. In this study we present a self-healing and secure adaptive messaging middleware that provides solutions to overcome limitations in robustness, resilience, self-adaptability, scalability, and assurance against security threats and erroneous input during run-time in the face of changing threats. This developed system supports a messaging infrastructure which enables adaptive functions and assurance against security vulnerabilities and erroneous input vulnerabilities to improve the reliability, robustness and dependability of business-critical infrastructures. It provides autonomous adjustments of the run-time configuration of the system in ord...
Blockchains are emerging technologies that propose new business models and value propositions. Be... more Blockchains are emerging technologies that propose new business models and value propositions. Besides their application for cryptocurrency purposes, as distributed ledgers of transactions, they enable new ways to provision trusted information in a distributed fashion. In this paper, we present our product tagging solution designed to help Small & Medium Enterprises (SMEs) protect their brands against counterfeit products and parallel markets, as well as to enhance UX (User Experience) and promote the brand and product.Our solution combines the use of DLT to assure, in a verifiable and permanent way, the trustworthiness and confidentiality of the information associated to the goods and the innovative CP-ABE encryption technique to differentiate accessibility to the product’s information.
Bringing Telecommunication Services to the People — IS&N '95, 1995
The adoption of technology in co-operative working environments deeply affects social and cultura... more The adoption of technology in co-operative working environments deeply affects social and cultural practices. This is particularly the case in environments which traditionally show much resistance to innovation. These are issues which can influence systems appreciation and evaluation of performance in an important way. The AREA project has been concerned with the design and testing of a multimedia distributed service
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012), 2012
The industrial sector is being impacted by the Internet of Things due to the increasing availabil... more The industrial sector is being impacted by the Internet of Things due to the increasing availability of computing and communication capabilities in a wide range of devices and equipment deployed in the shop floor. This requires substantial architectural and functional improvements in order to actually manage and exploit the potential of such smart components. The EU FP7 IoT@Work project aims at addressing the issues of Plug&Work configuration and self-management features in automation systems. This paper focuses on presenting the architecture and the main features of the IoT@Work Event Notification Service (ENS) middleware that is used to support an event-driven communication paradigm among devices and services, both inside and outside the factory plant.
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Resource and information protection plays a relevant role in distributed systems. Most of the cur... more Resource and information protection plays a relevant role in distributed systems. Most of the currently proposed authorization frameworks do not provide scalable, manageable, effective, and efficient mechanisms to support distributed systems with many interacting services. The advent of IoT will further increase the need for scalable and manageable solutions able to face the potentially unbound number of sensors, actuators and related resources, services and subjects. This is even more relevant if we take into account that IoT environments can envisage not only a greater number of resources to manage, but also a substantial increase of the interaction dynamics. This paper presents a capability based access control system that enterprises, or even individuals, can use to manage their own access control processes to services and information. The proposed mechanism supports rights delegation and a more sophisticated access control customization. The proposed approach is being developed within the European FP7 IoT@Work project to manage access control for some of the project's services deployed in the shop floor.
Antonio J. Jara Gregorio Martin Maria Victoria Bueno Delgado Joel Rodrigues Carmelo R. García Rod... more Antonio J. Jara Gregorio Martin Maria Victoria Bueno Delgado Joel Rodrigues Carmelo R. García Rodrigo Roman André Gomes Sandra Sendra Diego López-De-Ipiña Jose Bravo Oscar Mayora Ana Martinez Félix Jesús Villanueva Matthias Kovatsch Jorge Da Silva Carlos Lamsfus Angel G. Andrade Jorge Granjal Ramon Alcarria José Santa Antonio Garcia-Macias Dhananjay Singh Walter Colitti Gervasio Varela Pedro Martinez-Julia Vittorio Miori Borja Gamecho Leandro Marin Andres Garcia Jose Manuel Pastor Mikel Larrea David Nunes Francesc Campà Srdjan ...
We evaluate long-distance effects in K-->pipi decays using a calculational scheme base... more We evaluate long-distance effects in K-->pipi decays using a calculational scheme based on partial conservation of axial-vector current, current algebra, and suppression of exotic Regge meson trajectories. We find that the DeltaI=12 rule emerges naturally from these properties of hadronic physics. Moreover the calculated long-distance contributions are seen to play the dominant role, as opposed to short-distance effects.
Internet of Things (IoT) is a broad term which indicates the concept of increasingly pervasive co... more Internet of Things (IoT) is a broad term which indicates the concept of increasingly pervasive connected devices (embedded within, attached to or related to “Things”) supporting various applications to enhance the awareness and the capabilities of users. The adoption of IoT essentially depends upon trust. Moreover this trust must be established and maintained with respect to a broad group of stakeholders otherwise IoT will face, to some degree or other, challenges which may restrict adoption scope or delay its timing. Without sufficient IoT security it is highly likely that some applications will more resemble the Intranet of Things rather than the Internet of Things as users seek to place their own proprietary protection barriers and thus frustrating broad interoperability. Many of the device connections to the Internet today more closely resemble the Intranet of Things which differs dramatically from the vision for the Internet of Things, the latter being a much more open and interoperable environment allowing in theory the connection with many more objects and, with their multiple IoT compatible devices. One specific challenge within IoT is the control exercised over information collected by increasingly small and pervasive mobile devices, like RFID or future micro-nano sensors which can be ingested, implanted, worn or distributed elsewhere within the environment. In most cases, such devices have the capability of being wireless connected and accessible at all times and by anyone. In this context, the challenge is to ensure that the information collected and stored by the devices should be visible and distributed only by those legally permitted and authorized, acknowledging that permissions and authorizations may change throughout a devices or objects life or lives. This element of IoT represents one of a number of perceived and real concerns which are grouped under the title of IoT privacy. One aspect which often gets overlooked particularly frequently by those of us who entered adulthood before the year 1990 is the importance of the virtual-world. The Internet is a virtual environment. IoT is capable of establishing an important new bridge between the real and virtual-worlds. This bridge is likely to grow and become more relevant to the lives of citizens in the future allowing real-world augmentation of virtual-worlds and conversely allow the virtual-world to be enhanced by real-world information. Noteworthy is that IoT devices may be real or, virtual or, include aspects of both, either instantaneously or one or the other over a device’s or thing’s lifetime. IoT not only supports the exchange of information it nourishes the creation of greater automation. When IoT delivers this automation often reference is made to “smart” e.g. smart-city, smart-healthcare, etc. Trusted IoT therefore extends to confident and appropriate outcomes and not only the aggregation of clear dependable and timely information. Similar such “smart” automation has been widely used for investment banking transactions which has shown how a small change can cause an almost instantaneous and unstoppable global avalanche of stock values which was neither intended nor justified and resulting in severe penalties for a large number of stakeholders. IoT and “smart” applications effects need careful consideration and possibly some form of permanent monitoring to identity potential risks and oversee the development and introduction of suitably appropriate measures. A future IoT governance model has a role in overseeing such measures are put in place to protect IoT users and reinforce trust and confidence in “smart” applications. This chapter provides an overview of how the FP7 projects iCore, BUTLER, GAMBAS and IoT@Work within IERC Activity Chain 05 have approached IoT – security, privacy and governance
a series of events covering related topics on theory and practice on security, cryptography, secu... more a series of events covering related topics on theory and practice on security, cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion detection and other areas related to low enforcement, security data mining, malware models, etc. Security, defined for ensuring protected communication among terminals and user applications across public and private networks, is the core for guaranteeing confidentiality, privacy, and data protection. Security affects business and individuals, raises the business risk, and requires a corporate and individual culture. In the open business space offered by Internet, it is a need to improve defenses against hackers, disgruntled employees, and commercial rivals. There is a required balance between the effort and resources spent on security versus security achievements. Some vulnerability can be addressed using the rule of 80:20, meaning 80% of the vulnerabilities can be addressed for 20% of the costs. Other technical aspe...
— Current business-critical systems have stringent requirements for the significant and measurabl... more — Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems achieve arbitrary resilience by a brute-force approach. Self-healing is either rudimentary or non-existent. In this study we present a self-healing and secure adaptive messaging middleware that provides solutions to overcome limitations in robustness, resilience, self-adaptability, scalability, and assurance against security threats and erroneous input during run-time in the face of changing threats. This developed system supports a messaging infrastructure which enables adaptive functions and assurance against security vulnerabilities and erroneous input vulnerabilities to improve the reliability, robustness and dependability of business-critical infrastructures. It provides autonomous adjustments of the run-time configuration of the system in ord...
Blockchains are emerging technologies that propose new business models and value propositions. Be... more Blockchains are emerging technologies that propose new business models and value propositions. Besides their application for cryptocurrency purposes, as distributed ledgers of transactions, they enable new ways to provision trusted information in a distributed fashion. In this paper, we present our product tagging solution designed to help Small & Medium Enterprises (SMEs) protect their brands against counterfeit products and parallel markets, as well as to enhance UX (User Experience) and promote the brand and product.Our solution combines the use of DLT to assure, in a verifiable and permanent way, the trustworthiness and confidentiality of the information associated to the goods and the innovative CP-ABE encryption technique to differentiate accessibility to the product’s information.
Bringing Telecommunication Services to the People — IS&N '95, 1995
The adoption of technology in co-operative working environments deeply affects social and cultura... more The adoption of technology in co-operative working environments deeply affects social and cultural practices. This is particularly the case in environments which traditionally show much resistance to innovation. These are issues which can influence systems appreciation and evaluation of performance in an important way. The AREA project has been concerned with the design and testing of a multimedia distributed service
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012), 2012
The industrial sector is being impacted by the Internet of Things due to the increasing availabil... more The industrial sector is being impacted by the Internet of Things due to the increasing availability of computing and communication capabilities in a wide range of devices and equipment deployed in the shop floor. This requires substantial architectural and functional improvements in order to actually manage and exploit the potential of such smart components. The EU FP7 IoT@Work project aims at addressing the issues of Plug&Work configuration and self-management features in automation systems. This paper focuses on presenting the architecture and the main features of the IoT@Work Event Notification Service (ENS) middleware that is used to support an event-driven communication paradigm among devices and services, both inside and outside the factory plant.
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Resource and information protection plays a relevant role in distributed systems. Most of the cur... more Resource and information protection plays a relevant role in distributed systems. Most of the currently proposed authorization frameworks do not provide scalable, manageable, effective, and efficient mechanisms to support distributed systems with many interacting services. The advent of IoT will further increase the need for scalable and manageable solutions able to face the potentially unbound number of sensors, actuators and related resources, services and subjects. This is even more relevant if we take into account that IoT environments can envisage not only a greater number of resources to manage, but also a substantial increase of the interaction dynamics. This paper presents a capability based access control system that enterprises, or even individuals, can use to manage their own access control processes to services and information. The proposed mechanism supports rights delegation and a more sophisticated access control customization. The proposed approach is being developed within the European FP7 IoT@Work project to manage access control for some of the project's services deployed in the shop floor.
Antonio J. Jara Gregorio Martin Maria Victoria Bueno Delgado Joel Rodrigues Carmelo R. García Rod... more Antonio J. Jara Gregorio Martin Maria Victoria Bueno Delgado Joel Rodrigues Carmelo R. García Rodrigo Roman André Gomes Sandra Sendra Diego López-De-Ipiña Jose Bravo Oscar Mayora Ana Martinez Félix Jesús Villanueva Matthias Kovatsch Jorge Da Silva Carlos Lamsfus Angel G. Andrade Jorge Granjal Ramon Alcarria José Santa Antonio Garcia-Macias Dhananjay Singh Walter Colitti Gervasio Varela Pedro Martinez-Julia Vittorio Miori Borja Gamecho Leandro Marin Andres Garcia Jose Manuel Pastor Mikel Larrea David Nunes Francesc Campà Srdjan ...
Uploads