C
Celeste Campo
Researcher at Carlos III Health Institute
Publications - 53
Citations - 743
Celeste Campo is an academic researcher from Carlos III Health Institute. The author has contributed to research in topics: Service discovery & Ubiquitous computing. The author has an hindex of 14, co-authored 49 publications receiving 673 citations. Previous affiliations of Celeste Campo include Complutense University of Madrid & Charles III University of Madrid.
Papers
More filters
PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄
Florina Almenarez,Celeste Campo +1 more
TL;DR: PTM overcomes the challenges posed by dynamic open environments, making use of the autonomy and cooperable behaviour of the entities, and facilitates ad-hoc trust relationships, and allows trust information exchange through a recommendation protocol.
Book ChapterDOI
TrustAC: trust-based access control for pervasive devices
TL;DR: A distributed solution for access control, making use of the autonomy and cooperation capability of the devices, since in open dynamic environments is very difficult to depend on central server.
Proceedings ArticleDOI
PDP and GSDL: a new service discovery middleware to support spontaneous interactions in pervasive systems
TL;DR: A new service discovery middleware specifically designed for pervasive computing environments is proposed, composed of a service discovery protocol, Pervasive Discovery Protocol (PDP), and a service description language, Generic Service Description Language (GSDL).
Journal ArticleDOI
PDP: a lightweight discovery protocol for local-scope interactions in wireless ad hoc networks
TL;DR: A new service discovery protocol specifically designed for ad hoc networks, the pervasive discovery protocol (PDP), which reduces power consumption of the most limited devices by prioritising the replies of the less limited ones, allowing the others to abort their answers.
Journal ArticleDOI
Trust management for multimedia P2P applications in autonomic networking
TL;DR: This paper proposes an evolutionary model of trust management that captures dynamic entities' behaviour over time and explains protection mechanisms against several attacks, which are based on the cooperative behaviour of the entities, trust relationship properties, and trust rules.