Skip to main content

Showing 1–4 of 4 results for author: Zuquete, A

Searching in archive cs. Search in all archives.
.
  1. Integration of the Captive Portal paradigm with the 802.1X architecture

    Authors: Nuno Marques, André Zúquete, João Paulo Barraca

    Abstract: In a scenario where hotspot wireless networks are increasingly being used, and given the amount of sensitive information exchanged on Internet interactions, there is the need to implement security mechanisms that guarantee data confidentiality and integrity in such networks, as well as the authenticity of the hotspot providers. However, many hotspots today use Captive Portals, which rely on auth… ▽ More

    Submitted 26 August, 2019; originally announced August 2019.

  2. arXiv:1904.01541  [pdf, other

    cs.CR

    An Architecture to Support the Invocation of Personal Services in Web Interactions

    Authors: André Zúquete, Fábio Marques

    Abstract: This paper proposes an architecture to enable Web service providers to interact with personal services. Personal services are vanilla HTTP services that are invoked from a browser, upon a request made by a service Provider, to deliver some service on the client side, i.e., on an execution environment defined by the browser's user. Personal services can be used both to handle content manipulation a… ▽ More

    Submitted 2 April, 2019; originally announced April 2019.

  3. arXiv:1501.03139  [pdf, other

    cs.CR

    Secure and trustworthy file sharing over cloud storage using eID tokens

    Authors: Eduardo Duarte, Filipe Pinheiro, André Zúquete, Hélder Gomes

    Abstract: This paper presents a multi-platform, open-source application that aims to protect data stored and shared in existing cloud storage services. The access to the cryptographic material used to protect data is implemented using the identification and authentication functionalities of national electronic identity (eID) tokens. All peer to peer dialogs to exchange cryptographic material is implemented… ▽ More

    Submitted 13 January, 2015; originally announced January 2015.

    Comments: 12 pages, 1 figure, submitted and presented at OID conference 2014

  4. arXiv:cs/0006045  [pdf, ps, other

    cs.LO cs.CR

    Security Policy Consistency

    Authors: Carlos Ribeiro, Andre Zuquete, Paulo Ferreira, Paulo Guedes

    Abstract: With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies within security policies become harder and more relevant. We have defined a tool based on the CHR language which is able to detect several types of inconsistencies within and between security policies and other specificat… ▽ More

    Submitted 30 June, 2000; originally announced June 2000.

    Comments: To appear in the first CL2000 workshop on Rule-Based Constraint Reasoning and Programming

    ACM Class: F.4.1; D.4.6; K.6.5