Universidad Carlos III de MadridDepartamento de Ingeniería Telemática
Home / Personal / Profesores Visitantes / Daniel Díaz Sánchez
anteriorsiguiente

DanielDiaz Sanchez
Profesor Visitante

Teléfono: ( +34) 91624- 6233
( +34) 91624- 6233

Fax: (+34) 91624- 8749

E-mail:ddsit.uc3m.es
daniel.diazuc3m.es

Dirección: University Carlos III
Depto: Telematic Engineering
Avda. de la Universidad
Building: Torres Quevedo Room: 40F04
Zip: 28911Leganes ( Madrid) Spain (ES)

Visitas: Escuela Politécnica Superior
Building: Torres Quevedo
Room: 40F04 

Tutorias
Lunes 11-12 (Preferente) Martes 16:00-17:00 (Preferente)
Miercoles 10:00-125:00 (Cita previa)

PROYECTOS FIN DE CARRERA

english version
prevasive

        Noticias
[20:01:00 08-06-2007] Certificados de atributos en Linux: ITU X.509/RFC 3281 attribute certificates toolkit para OpenSSL
[20:01:00 09-10-2006] Certificados de atributos: ITU X.509/RFC 3281 attribute certificates toolkit para OpenSSL
[15:31:00 02-10-2006] PFC: Lista de PROYECTOS DE FIN DE CARRERA
[15:31:00 01-10-2005] OpenSSL: OpenSSL 0.98a for PocketPC released

        Docencia
2008-2008
Computación en la red (coordinador): Ing. Telecomunicación 3er Curso/2º Cuatrimestre
Computación de Sistemas Ubicuos (Máster Interuniversitario en Ingeniería Telemática) Master
Master en Ingeniería Web: Master
2007-2008
Computación en la red (coordinador): Ing. Telecomunicación 3er Curso/2º Cuatrimestre
Representacion de datos: Ing. Tecnica Telematica 1er Curso/2º Cuatrimestre
Programacion de sistemas: Ing. Tecnica Sistemas 1er Curso/2º Cuatrimestre
Laboratorio de programación: Ing. Telecomunicacion 1er Curso/2º Cuatrimestre
Master en Ingeniería Web: Master
2006-2007
Representacion de datos: Ing. Tecnica Telematica 1er Curso/2º Cuatrimestre
Programacion de sistemas: Ing. Tecnica Sistemas 1er Curso/2º Cuatrimestre
Laboratorio de programación: Ing. Telecomunicacion 1er Curso/2º Cuatrimestre
Master en Ingeniería Web: Master
2005-2006
Representacion de datos: Ing. Tecnica Telematica 1er Curso/2º Cuatrimestre
Programacion de sistemas: Ing. Tecnica Sistemas 1er Curso/2º Cuatrimestre
Laboratorio de programación: Ing. Telecomunicacion 1er Curso/2º Cuatrimestre
Master en Ingeniería Web: Master
Master en Comercio Electrónico: Master
2004-2005
Uso y configuración de Linux: Curso Fondo Social Europeo
        Investigación
Proyecto Raudos 2 link
Grupos de investigación
PERVASIVE: Pervasive Computing Laboratory
GAST: Grupo Aplicaciones y Servicios Telematicos
Temas de investigación
Mejora de los APIs de seguridad interna y protocolos de seguridad:
Nuevas tecnicas de autorización:
Diseño de software embebido: Mejorando la capacidad de interacción de los dispositivos limitados
Redes de control (Domotica) EIB/KONNEX: European Installation Bus (EIB Partner)
Publicaciones Visita la página de publicaciones de Pervasive

2009

Díaz-Sánchez, D., A. Marín, F. Almenárez, and A. Cortés. "Sharing conditional access modules through the home network for Pay TV Access." Journal/Magazine: Transactions on Consummer Electronics (Accepted, Pending to be published) (2009).
Abstract : In this article we present a system for sharing a Conditional Access Module among different visualization devices. Current pay-TV systems require having conditional access modules and smart cards replicated at every visualization device willing to access Pay-TV contents. In this article, we show how a home gateway, capable of securely distribute decryption keys to home visualization device, an inexpensive descrambler, and a home network, enable a flexible solution to access Pay-TV.

2008

Cortés-Martín, A., C. García-Rubio, C. Campo, A. Marín López, F. Almenárez Mendoza, and D. Díaz Sánchez. "Decoupling path failure detection from congestion control to improve SCTP failovers." Journal/Magazine: IEEE COMMUN LETT. Vol:12. Issue: 11 (2008): Pages:858–860.
Abstract : SCTP handover is too slow to be useful as a mobility solution for most applications. With quicker handovers, SCTP will be an interesting solution to mobility. SCTP uses retransmissions as probes for path failure detection. Congestion control forces slow paced retransmissions but quick failovers need fast paced probes. Our solution is to stop using retransmissions as probes. Instead, we propose active path monitoring using unreliable heartbeats. Applications can tune this algorithm to meet their own requirements. We show data from a simple experiment in a real environment.
Keywords: Computer network reliability; congestion control; transport protocols
Díaz-Sánchez, D., A. Marín, F. Almenarez, C. Campo, A. Cortés, and C. García-Rubio. "Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment." Wireless and Mobile Networking. Ed. Springer Boston. Vol. 284/2008., 2008. 271–282.
Abstract : User-centric services might enforce requirements difficult to be endorsed by visited networks unless tight coupled trust relations are previously established among providers. Maintaining those fixed trust relations is costly and unmanageable if the number of providers increases. Moreover, it requires providers to use a common security model, credentials, policies…Trust Negotiation can be the solution to this problem since allows to negotiate gradually a security state enabling multiple factor authentication and authorization even for “strangers” by exchanging various credentials. However, there are still two problems to solve, the first one is the delay introduced by the trust negotiation messages if used as bootstrapping in every interaction; the second one is the lack of protocol support. In this article we address those problems by presenting an extension to TLS that enables trust negotiation and credential issuing (to speed-up following interactions) over a secure channel.
Diaz-Sanchez, D., A. Marin, F. Almenarez, and A. Cortes. "DVB-H Key Management System for UMTS Capable Devices.", 2008. 1–2.
Abstract : In this paper we present a system to enable pay-per- view services in mobile handhelds which takes benefits of both DVB-H and UMTS networks. DVB-H infrastructure provides a more appropriate content delivery framework that UMTS. Despite this fact, UMTS can play an important role for charging and key distribution for pay-per-view applications by means of the provider SIM smart card.
Keywords: 3G mobile communication, cryptography, digital video broadcasting, telecommunication network managementDVB-H key management system, SIM smart card, UMTS capable devices, content delivery framework, mobile handhelds, pay-per-view services

2007

Díaz Sánchez, D., A. Marín López, F. Almenárez Mendoza, C. Campo Vázquez, and C. García-Rubio. "Context awareness in network selection for dynamic environments." Journal/Magazine: Telecommunication Systems. Vol:36. Issue: 1 (2007): Pages:49–60.
Abstract : Abstract Mobile devices of new generation are able to connect to multiple networks and to constitute new infrastructureless networks. These dynamic environments require new security paradigms and automatic mechanisms to minimize user intervention. Our goal is the definition of a new concept of distance that considers the current domain constraints and the user preferences. This paper addresses some of the problems of these complex environments by using Multidimensional Scaling (MDS) techniques. We also propose collaborative mechanisms for automatic environment marking. Based on these ideas we have developed Pervasive Interaction Manager (PervsIM), a decision mechanism that selects the most appropriate network or peer to interact with. Besides we have defined an embedded access control module which ensures that PervsIM decisions are followed by all applications. Furthermore, several simulation results and implementation details outline how these results can be incorporated in today’s mobile devices.
Keywords: Context-awareness;Network selection;Mobile devices;Pervasive computing
Díaz-Sánchez, D., A. Marín, and F. Almenárez. "Enhancing access control for mobile devices with an agnostic trust negotiation decision engine." Personal Wireless Communications. Ed. Springer Boston., 2007. 304–315.
Abstract : Dynamic open environments demand trust negotiation systems for unknown entities willing to communicate. A security context has to be negotiated gradually in a fair peer to peer basis depending on the security level demanded by the application. Trust negotiation engines are driven by decision engines that lack of flexibility: depend on the implementation, policies languages or credentials types to be used. In this paper we present an agnostic engine able to combine all that information despite its origin or language allowing to select policies or requirements, credentials and resources to disclose, according to user preferences and context using iterative weighted Multidimensional Scaling to assist a mobile device during a trust negotiation.
Keywords: trust negotiation;access control;flexible
Marín López, A., D. Díaz-Sánchez, F. Almenárez, C. García-Rubio, and C. Campo. "Smart card-based agents for fair non-repudiation." Journal/Magazine: Computer Networks. Vol:51. Issue: 9 (2007): Pages:2288–2298.
Abstract : Non-repudiation protocols are of great importance for electronic interactions. Different protocols have been proposed in this field, progressively relaxing the requirements on the computing power of both parties, and on the load and involvement of a trusted third party (TTP). Besides, there is a need to provide mobile users with a protocol adequate for ad hoc scenarios, where only unreliable channels can be guaranteed, and where the CA may not be reachable. In this paper we propose a new version of the fair non-repudiation protocol proposed by Gürgens et al. in [Sigrid Gürgens, Carsten Rudolph, Holger Vogt, On the security of fair non-repudiation protocols, in: Colin Boyd, Wenbo Mao (Eds.), ISC, Lecture Notes in Computer Science, vol. 2851, Springer, 2003, pp. 193-207]. We show unfair scenarios that can appear if one party controls the communication among the TTP and the other party. We introduce notary agents, which play the TTP role, and run our fair non-repudiation protocol. Notary agents execute inside the smart card, and sign the protocol messages with the user’s private key on his behalf. Our approach enables the protocol to run on unreliable channels, disconnected from the CA.
Keywords: Fairness; Non-repudiation protocol; Smart card; Unreliable channels; Electronic transactions; Ad hoc mode
Schaefer R., W. Mueller, A. Marín López, and D. Díaz Sánchez. Using Smart Cards for Secure and Device Independent User Interfaces . Singapore, 10-12 September 2007, 2007.
Abstract : Smart Cards are becoming a ubiquitous means for securing a wide range of interactive applications. However in many cases its use is limited for authentication purposes only. In this paper we extend the use of smart cards for carrying abstract user interface descriptions which can be rendered on different and potentially remote clients that in addition can support varying interaction modalities. This adds on the one hand to the security since a backend application cannot be used without the UI description, and on the other hand to the versatility of applications, since all devices with a respective renderer for certain modalities can be utilized.
Keywords: Smart Card; Abstract User Interface; Device Independence
Schaefer R., W. Mueller, A. Marín López, and D. Díaz Sánchez. "Device Independent User Interfaces for Smart Cards." 9th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2007) . Singapore, 9-12 September 2007, 2007.
Abstract : Smart Cards are becoming a ubiquitous means for securing a wide range of interactive applications. However in many cases its use is limited for authentication purposes only. In this paper we extend the use of smart cards for carrying abstract user interface descriptions which can be rendered on different and potentially remote clients that in addition can support different interaction modalities. This adds on the one hand to the security since a backend application cannot be used without the UI description, and on the other hand to the versatility of applications, since all devices with a respective renderer for certain modalities can be utilized.
Proyectos de investigación
Consulte esta información en Pervasive Computing Laboratory
        LINKS


english version

Localización | Personal | Docencia | Investigación | Novedades | Intranet
inicio | mapa del web | contacta