Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2021

An ML-style Record Calculus with Extensible Records

Autores
Alves, S; Ramos, M;

Publicação
Electronic Proceedings in Theoretical Computer Science, EPTCS

Abstract
In this work, we develop a polymorphic record calculus with extensible records. Extensible records are records that can have new fields added to them, or preexisting fields removed from them. We also develop a static type system for this calculus and a sound and complete type inference algorithm. Most ML-style polymorphic record calculi that support extensible records are based on row variables. We present an alternative construction based on the polymorphic record calculus developed by Ohori. Ohori based his polymorphic record calculus on the idea of kind restrictions. This allowed him to express polymorphic operations on records such as field selection and modification. With the addition of extensible types, we were able to extend Ohori’s original calculus with other powerful operations on records such as field addition and removal. © S. Alves & M. Ramos

2021

A Graphical Framework for the Category-Based Metamodel for Access Control and Obligations

Autores
Alves, S; Iglésias, J;

Publicação
CoRR

Abstract

2021

EVL: a typed functional language for event processing

Autores
Alves, S; Fernández, M; Ramos, M;

Publicação
CoRR

Abstract

2021

Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE

Autores
Sousa, P; Magalhaes, L; Resende, J; Martins, R; Antunes, L;

Publicação
SENSORS

Abstract
The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate and circumvent current trust mechanisms. Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems. While digital certificates are one of the most prevalent ways to establish identity and perform authentication, their provision at scale remains open. This provisioning process is usually an arduous task that encompasses device configuration, including identity and key provisioning. Human configuration errors are often the source of many security and privacy issues, so this task should be semi-autonomous to minimize erroneous configurations during this process. In this paper, we propose an identity management (IdM) and authentication method called YubiAuthIoT. The overall provisioning has an average runtime of 1137.8 ms +/- 65.11+delta. We integrate this method with the FIWARE platform, as a way to provision and authenticate IoT devices.

2021

Privacy Preserving Middleware Platform for IoT

Autores
Sousa, PR;

Publicação

Abstract

2021

A Kolmogorov Complexity for multidisciplinary domains

Autores
S. Resende, J; Almeida, M; Martins, R; Antunes, L;

Publicação
Proceedings of Entropy 2021: The Scientific Tool of the 21st Century

Abstract

  • 39
  • 200