Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CRACS

2021

An ML-style Record Calculus with Extensible Records

Authors
Alves, S; Ramos, M;

Publication
Electronic Proceedings in Theoretical Computer Science, EPTCS

Abstract
In this work, we develop a polymorphic record calculus with extensible records. Extensible records are records that can have new fields added to them, or preexisting fields removed from them. We also develop a static type system for this calculus and a sound and complete type inference algorithm. Most ML-style polymorphic record calculi that support extensible records are based on row variables. We present an alternative construction based on the polymorphic record calculus developed by Ohori. Ohori based his polymorphic record calculus on the idea of kind restrictions. This allowed him to express polymorphic operations on records such as field selection and modification. With the addition of extensible types, we were able to extend Ohori’s original calculus with other powerful operations on records such as field addition and removal. © S. Alves & M. Ramos

2021

A Graphical Framework for the Category-Based Metamodel for Access Control and Obligations

Authors
Alves, S; Iglésias, J;

Publication
CoRR

Abstract

2021

EVL: a typed functional language for event processing

Authors
Alves, S; Fernández, M; Ramos, M;

Publication
CoRR

Abstract

2021

Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE

Authors
Sousa, P; Magalhaes, L; Resende, J; Martins, R; Antunes, L;

Publication
SENSORS

Abstract
The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate and circumvent current trust mechanisms. Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems. While digital certificates are one of the most prevalent ways to establish identity and perform authentication, their provision at scale remains open. This provisioning process is usually an arduous task that encompasses device configuration, including identity and key provisioning. Human configuration errors are often the source of many security and privacy issues, so this task should be semi-autonomous to minimize erroneous configurations during this process. In this paper, we propose an identity management (IdM) and authentication method called YubiAuthIoT. The overall provisioning has an average runtime of 1137.8 ms +/- 65.11+delta. We integrate this method with the FIWARE platform, as a way to provision and authenticate IoT devices.

2021

Privacy Preserving Middleware Platform for IoT

Authors
Sousa, PR;

Publication

Abstract

2021

A Kolmogorov Complexity for multidisciplinary domains

Authors
S. Resende, J; Almeida, M; Martins, R; Antunes, L;

Publication
Proceedings of Entropy 2021: The Scientific Tool of the 21st Century

Abstract

  • 39
  • 200