2021
Autores
Alves, S; Ramos, M;
Publicação
Electronic Proceedings in Theoretical Computer Science, EPTCS
Abstract
In this work, we develop a polymorphic record calculus with extensible records. Extensible records are records that can have new fields added to them, or preexisting fields removed from them. We also develop a static type system for this calculus and a sound and complete type inference algorithm. Most ML-style polymorphic record calculi that support extensible records are based on row variables. We present an alternative construction based on the polymorphic record calculus developed by Ohori. Ohori based his polymorphic record calculus on the idea of kind restrictions. This allowed him to express polymorphic operations on records such as field selection and modification. With the addition of extensible types, we were able to extend Ohori’s original calculus with other powerful operations on records such as field addition and removal. © S. Alves & M. Ramos
2021
Autores
Alves, S; Iglésias, J;
Publicação
CoRR
Abstract
2021
Autores
Alves, S; Fernández, M; Ramos, M;
Publicação
CoRR
Abstract
2021
Autores
Sousa, P; Magalhaes, L; Resende, J; Martins, R; Antunes, L;
Publicação
SENSORS
Abstract
The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate and circumvent current trust mechanisms. Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems. While digital certificates are one of the most prevalent ways to establish identity and perform authentication, their provision at scale remains open. This provisioning process is usually an arduous task that encompasses device configuration, including identity and key provisioning. Human configuration errors are often the source of many security and privacy issues, so this task should be semi-autonomous to minimize erroneous configurations during this process. In this paper, we propose an identity management (IdM) and authentication method called YubiAuthIoT. The overall provisioning has an average runtime of 1137.8 ms +/- 65.11+delta. We integrate this method with the FIWARE platform, as a way to provision and authenticate IoT devices.
2021
Autores
Sousa, PR;
Publicação
Abstract
2021
Autores
S. Resende, J; Almeida, M; Martins, R; Antunes, L;
Publicação
Proceedings of Entropy 2021: The Scientific Tool of the 21st Century
Abstract
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.