Ramon Martí - Academia.edu (original) (raw)
Papers by Ramon Martí
12th International World Wide Web Conference …, 2003
I. INTRODUCTION This paper describes the requirements and implementation of the security mechanis... more I. INTRODUCTION This paper describes the requirements and implementation of the security mechanisms for a Wireless Mobile Health Care system, MobiHealth, co-funded by the European Commission (IST-2001-36006). The following topics of security in the MobiHealth system ...
La cooperación entre los diferentes grupos que intervienen en el control y gestión de emergencias... more La cooperación entre los diferentes grupos que intervienen en el control y gestión de emergencias no es algo trivial. Actualmente esta cooperación se realiza de manera física, con comunicaciones verbales e informes que hacen que no sea todo lo rápida que cabe esperar. De la mano de la informatización de los sistemas de soporte a la emergencia, nace la necesidad de compartir la información recogida por los diferentes grupos, con el objetivo de aunar esfuerzos. En el presente documento, afrontamos la interoperabilidad desde la vertiente de control de acceso. Para ello, proponemos un mecanismo de conversión de atributos que permite a los miembros de cada grupo de la emergencia actuar en calidad de usuarios en los sistemas del resto de grupos. Políticas de conversión establecen relaciones entre puestos jerárquicos equivalentes de cada grupo. El mecanismo contempla el error intrínseco en la conversión así como gestiona su transitividad permitiendo una más ágil, sencilla y segura cooperac...
Progress in Artificial Intelligence, 2012
This paper introduces a double multiagent architecture allowing the triage of victims in emergenc... more This paper introduces a double multiagent architecture allowing the triage of victims in emergency scenarios and the automatic update of their medical condition. Gathering updated information about the medical condition of victims is critical for designing an optimal evacuation strategy that minimizes the number of casualties in the aftermath of an emergency. The proposed scheme, currently under development, combines Wireless Sensor Networks (WSN), an Electronic Triage Tag and a double multiagent system (Agilla-JADE) to achieve a low cost, no infrastructure-based, efficient system. Initial results of the WSN roaming done by Agilla agents are presented.
arXiv (Cornell University), Jun 13, 2007
This paper presents a proposal for a flexible agent mobility architecture based on IEEE-FIPA stan... more This paper presents a proposal for a flexible agent mobility architecture based on IEEE-FIPA standards and intended to be one of them. This proposal is a first step towards interoperable mobility mechanisms, which are needed for future agent migration between different kinds of platforms. Our proposal is presented as a flexible and robust architecture that has been successfully implemented in the JADE and AgentScape platforms. It is based on an open set of protocols, allowing new protocols and future improvements to be accommodated in the architecture. With this proposal we demonstrate that a standard architecture for agent mobility capable of supporting several agent platforms can be defined and implemented.
Lecture Notes in Computer Science, 1994
This paper presents the design and implementation of a platform independent Client/Server Brokera... more This paper presents the design and implementation of a platform independent Client/Server Brokerage Application based on WWW Technology. This work has been done in the context of the MULTIMEDIATOR Project (ACTS 096). This document is structured in three parts. The first one gives an overview of the MULTIMEDIATOR system, the second one explains the implementation of a Client/Server Model for a specific access method (forms access) in MULTIMEDIATOR, and the third one explains how the MULTIMEDIATOR system implements some brokerage features. A key innovation in the forms access mechanism of the MULTIMEDIATOR system is the re-use of existing Internet technology and software for developing a Client/Server Distributed Application following the DOAM (Distributed Office Applications Model, ISO/IEC 10031) Model.
Intelligence in Services and Networks: Technology …, 1997
This paper presents the design and implementation of a platform independent Client/Server Brokera... more This paper presents the design and implementation of a platform independent Client/Server Brokerage Application based on WWW Technology. This work has been done in the context of the MULTIMEDIATOR Project (ACTS 096). This document is structured in three parts. The first one gives an overview of the MULTIMEDIATOR system, the second one explains the implementation of a Client/Server Model for a specific access method (forms access) in MULTIMEDIATOR, and the third one explains how the MULTIMEDIATOR system implements some brokerage features. A key innovation in the forms access mechanism of the MULTIMEDIATOR system is the re-use of existing Internet technology and software for developing a Client/Server Distributed Application following the DOAM (Distributed Office Applications Model, ISO/IEC 10031) Model.
XML is an SGML-based language designed for the interchange of documents with more flexible and po... more XML is an SGML-based language designed for the interchange of documents with more flexible and powerful features than those provided by HTML. It can be considered as an intermediate step between HTML and SGML. On one hand, it is a fully conformant SGML application, but without most of the features of SGML that make it complex to handle or that are rarely used. On the other hand, XML is not restricted to a fixed DTD as HTML is: users can choose from the set of available DTDs the one that is best suited for their applications, or develop new ones for fully satisfying their requirements. Although XML is initially a meta-language intended for publishing on the Web, there are many other applications of XML. Some of them are being widely used, some others are under investigation and some others still need be to be conceived. In the paper, we describe some general uses of XML, such as metadata description or XML/EDI, and some experiences with XML, that include statistics handling, forms in...
Pervasive and Mobile Computing, 2015
In this paper, we use graph analysis to evaluate the network architecture of a large scale delay ... more In this paper, we use graph analysis to evaluate the network architecture of a large scale delay tolerant network (DTN) of transoceanic aircraft. At LCN (Local Computer Networks) 2014 we analyzed information propagation inside a pure opportunistic version of this network, a scenario constructed from more than 2,500 traces of transatlantic flights in which communications relied only on the sporadic contacts between airplanes. As only a small percentage of the nodes were capable of performing efficient air-to-ground communications we concluded the need to devise a more suitable network architecture by combining opportunistic and satellite communication systems. We propose a generic methodology based on graph analysis (both static and dynamic temporal) to evaluate the different ways to create this new architecture. We show the architectural combination that most improves the network delivery performance while minimizing its deployment costs.
Lecture Notes in Computer Science, 1998
This paper presents the latest developments in the TINA Service Architecture with respect to serv... more This paper presents the latest developments in the TINA Service Architecture with respect to service provisioning performed by two or more independent business entities. In other words, service level federation and the underlying rationale, concepts and principles are explained and exemplified by scenarios. The mapping to inter-domain reference points and the present status and expected developments in the newly created TINA work groups are given.
European Conference on Universal Multiservice Networks, 2004
This paper discusses the implementation and performance evaluation of the security services in a ... more This paper discusses the implementation and performance evaluation of the security services in a mobile healthcare system. The system consists of a number of sensors attached to the patient, which collect data that are sent via 2.5G or 3G mobile telephony to a hospital or healthcare centre for monitoring. Security is an essential requirement of the system due to the
Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05), 2005
Digital watermarking is the art of hiding information in digital contents such as images, audio c... more Digital watermarking is the art of hiding information in digital contents such as images, audio clips, and videos. We can take advantage of this technique by adding author information as well as buying information for a digital purchase. In this paper we propose a protocol for secure anonymous digital purchase to deter buyers from executing illegal redistribution of digital contents. We propose a protocol to allow merchants to obtain a proof of treachery from dishonest buyers.
IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004, 2004
Different IT applications require different Security Services. We have been working in the area o... more Different IT applications require different Security Services. We have been working in the area of ehealth applications in a mobile environment, and we have needed to integrate specific Security Services. The paper presents those Security Services for Mobile e-Health Services and how we have implemented them. First, the different security threats specially oriented to the e-health applications are described, like patients' data eavesdropping and manipulation. Afterwards, the different security mechanisms to address these specific security threats are described, e.g. data confidentiality and integrity, together with the restrictions of dynamic IP addresses. Following, the specification of security services requirements and the implementation possibilities to address them in the Mobile e-Health Services are described. As an example of security services integrated into an ehealth system, the paper includes the description of the mobile e-health service MobiHealth, an application developed under the MobiHealth Project, co-funded by the European Commission (IST-2001-36006), focused on the security services added to it.
Advances in Soft Computing, 2009
... Departament of Information and Communications Engineering, Universitat Aut`onoma de Barcelona... more ... Departament of Information and Communications Engineering, Universitat Aut`onoma de Barcelona, 08193 Cerdanyola del Vall`es, Spain {abraham.martin, ramon.marti.escale, sergi.robles, carlos.martinez}@uab.cat Abstract. ...
Lecture Notes in Computer Science, 2004
Abstract. Different IT applications require different network and ap-plication security services.... more Abstract. Different IT applications require different network and ap-plication security services. We have been working in the area of e-health applications in mobile environments, and we have needed to integrate security services therein. This paper presents a ...
Lecture Notes in Computer Science, 2006
Mobility offers important advantages to information agent applications, specially those related t... more Mobility offers important advantages to information agent applications, specially those related to information retrieval. However, problems like security and interoperability are important barriers to the adoption of this technology. This paper focuses its attention to interoperability. Over the years, several solutions for mobile agents have been proposed, but each one covering specific problems leaving others unsolved. In this paper we analyse the problem of interoperability of mobile agents as a whole. We present an approach based on the use of FIPA ACL as the foundations to reach interoperability between different mobile agent system implementations at different levels. The implementation of the proposed solution has been adopted by JADE as the default mechanism to move agents among platforms and it has been widely used by its community.
Lecture Notes in Computer Science, 2007
FIPA-Based Interoperable Agent Mobility Jordi Cucurull, Ramon Martí, Sergi Robles, Joan Borrell, ... more FIPA-Based Interoperable Agent Mobility Jordi Cucurull, Ramon Martí, Sergi Robles, Joan Borrell, and Guillermo Navarro ... Vieira-Marques, P., Robles, S., Cucurull, J., Cruz-Correia, R., Navarro, G., Martí, R.: Secure integration of distributed medical data using mobile agents. ...
12th International World Wide Web Conference …, 2003
I. INTRODUCTION This paper describes the requirements and implementation of the security mechanis... more I. INTRODUCTION This paper describes the requirements and implementation of the security mechanisms for a Wireless Mobile Health Care system, MobiHealth, co-funded by the European Commission (IST-2001-36006). The following topics of security in the MobiHealth system ...
La cooperación entre los diferentes grupos que intervienen en el control y gestión de emergencias... more La cooperación entre los diferentes grupos que intervienen en el control y gestión de emergencias no es algo trivial. Actualmente esta cooperación se realiza de manera física, con comunicaciones verbales e informes que hacen que no sea todo lo rápida que cabe esperar. De la mano de la informatización de los sistemas de soporte a la emergencia, nace la necesidad de compartir la información recogida por los diferentes grupos, con el objetivo de aunar esfuerzos. En el presente documento, afrontamos la interoperabilidad desde la vertiente de control de acceso. Para ello, proponemos un mecanismo de conversión de atributos que permite a los miembros de cada grupo de la emergencia actuar en calidad de usuarios en los sistemas del resto de grupos. Políticas de conversión establecen relaciones entre puestos jerárquicos equivalentes de cada grupo. El mecanismo contempla el error intrínseco en la conversión así como gestiona su transitividad permitiendo una más ágil, sencilla y segura cooperac...
Progress in Artificial Intelligence, 2012
This paper introduces a double multiagent architecture allowing the triage of victims in emergenc... more This paper introduces a double multiagent architecture allowing the triage of victims in emergency scenarios and the automatic update of their medical condition. Gathering updated information about the medical condition of victims is critical for designing an optimal evacuation strategy that minimizes the number of casualties in the aftermath of an emergency. The proposed scheme, currently under development, combines Wireless Sensor Networks (WSN), an Electronic Triage Tag and a double multiagent system (Agilla-JADE) to achieve a low cost, no infrastructure-based, efficient system. Initial results of the WSN roaming done by Agilla agents are presented.
arXiv (Cornell University), Jun 13, 2007
This paper presents a proposal for a flexible agent mobility architecture based on IEEE-FIPA stan... more This paper presents a proposal for a flexible agent mobility architecture based on IEEE-FIPA standards and intended to be one of them. This proposal is a first step towards interoperable mobility mechanisms, which are needed for future agent migration between different kinds of platforms. Our proposal is presented as a flexible and robust architecture that has been successfully implemented in the JADE and AgentScape platforms. It is based on an open set of protocols, allowing new protocols and future improvements to be accommodated in the architecture. With this proposal we demonstrate that a standard architecture for agent mobility capable of supporting several agent platforms can be defined and implemented.
Lecture Notes in Computer Science, 1994
This paper presents the design and implementation of a platform independent Client/Server Brokera... more This paper presents the design and implementation of a platform independent Client/Server Brokerage Application based on WWW Technology. This work has been done in the context of the MULTIMEDIATOR Project (ACTS 096). This document is structured in three parts. The first one gives an overview of the MULTIMEDIATOR system, the second one explains the implementation of a Client/Server Model for a specific access method (forms access) in MULTIMEDIATOR, and the third one explains how the MULTIMEDIATOR system implements some brokerage features. A key innovation in the forms access mechanism of the MULTIMEDIATOR system is the re-use of existing Internet technology and software for developing a Client/Server Distributed Application following the DOAM (Distributed Office Applications Model, ISO/IEC 10031) Model.
Intelligence in Services and Networks: Technology …, 1997
This paper presents the design and implementation of a platform independent Client/Server Brokera... more This paper presents the design and implementation of a platform independent Client/Server Brokerage Application based on WWW Technology. This work has been done in the context of the MULTIMEDIATOR Project (ACTS 096). This document is structured in three parts. The first one gives an overview of the MULTIMEDIATOR system, the second one explains the implementation of a Client/Server Model for a specific access method (forms access) in MULTIMEDIATOR, and the third one explains how the MULTIMEDIATOR system implements some brokerage features. A key innovation in the forms access mechanism of the MULTIMEDIATOR system is the re-use of existing Internet technology and software for developing a Client/Server Distributed Application following the DOAM (Distributed Office Applications Model, ISO/IEC 10031) Model.
XML is an SGML-based language designed for the interchange of documents with more flexible and po... more XML is an SGML-based language designed for the interchange of documents with more flexible and powerful features than those provided by HTML. It can be considered as an intermediate step between HTML and SGML. On one hand, it is a fully conformant SGML application, but without most of the features of SGML that make it complex to handle or that are rarely used. On the other hand, XML is not restricted to a fixed DTD as HTML is: users can choose from the set of available DTDs the one that is best suited for their applications, or develop new ones for fully satisfying their requirements. Although XML is initially a meta-language intended for publishing on the Web, there are many other applications of XML. Some of them are being widely used, some others are under investigation and some others still need be to be conceived. In the paper, we describe some general uses of XML, such as metadata description or XML/EDI, and some experiences with XML, that include statistics handling, forms in...
Pervasive and Mobile Computing, 2015
In this paper, we use graph analysis to evaluate the network architecture of a large scale delay ... more In this paper, we use graph analysis to evaluate the network architecture of a large scale delay tolerant network (DTN) of transoceanic aircraft. At LCN (Local Computer Networks) 2014 we analyzed information propagation inside a pure opportunistic version of this network, a scenario constructed from more than 2,500 traces of transatlantic flights in which communications relied only on the sporadic contacts between airplanes. As only a small percentage of the nodes were capable of performing efficient air-to-ground communications we concluded the need to devise a more suitable network architecture by combining opportunistic and satellite communication systems. We propose a generic methodology based on graph analysis (both static and dynamic temporal) to evaluate the different ways to create this new architecture. We show the architectural combination that most improves the network delivery performance while minimizing its deployment costs.
Lecture Notes in Computer Science, 1998
This paper presents the latest developments in the TINA Service Architecture with respect to serv... more This paper presents the latest developments in the TINA Service Architecture with respect to service provisioning performed by two or more independent business entities. In other words, service level federation and the underlying rationale, concepts and principles are explained and exemplified by scenarios. The mapping to inter-domain reference points and the present status and expected developments in the newly created TINA work groups are given.
European Conference on Universal Multiservice Networks, 2004
This paper discusses the implementation and performance evaluation of the security services in a ... more This paper discusses the implementation and performance evaluation of the security services in a mobile healthcare system. The system consists of a number of sensors attached to the patient, which collect data that are sent via 2.5G or 3G mobile telephony to a hospital or healthcare centre for monitoring. Security is an essential requirement of the system due to the
Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05), 2005
Digital watermarking is the art of hiding information in digital contents such as images, audio c... more Digital watermarking is the art of hiding information in digital contents such as images, audio clips, and videos. We can take advantage of this technique by adding author information as well as buying information for a digital purchase. In this paper we propose a protocol for secure anonymous digital purchase to deter buyers from executing illegal redistribution of digital contents. We propose a protocol to allow merchants to obtain a proof of treachery from dishonest buyers.
IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004, 2004
Different IT applications require different Security Services. We have been working in the area o... more Different IT applications require different Security Services. We have been working in the area of ehealth applications in a mobile environment, and we have needed to integrate specific Security Services. The paper presents those Security Services for Mobile e-Health Services and how we have implemented them. First, the different security threats specially oriented to the e-health applications are described, like patients' data eavesdropping and manipulation. Afterwards, the different security mechanisms to address these specific security threats are described, e.g. data confidentiality and integrity, together with the restrictions of dynamic IP addresses. Following, the specification of security services requirements and the implementation possibilities to address them in the Mobile e-Health Services are described. As an example of security services integrated into an ehealth system, the paper includes the description of the mobile e-health service MobiHealth, an application developed under the MobiHealth Project, co-funded by the European Commission (IST-2001-36006), focused on the security services added to it.
Advances in Soft Computing, 2009
... Departament of Information and Communications Engineering, Universitat Aut`onoma de Barcelona... more ... Departament of Information and Communications Engineering, Universitat Aut`onoma de Barcelona, 08193 Cerdanyola del Vall`es, Spain {abraham.martin, ramon.marti.escale, sergi.robles, carlos.martinez}@uab.cat Abstract. ...
Lecture Notes in Computer Science, 2004
Abstract. Different IT applications require different network and ap-plication security services.... more Abstract. Different IT applications require different network and ap-plication security services. We have been working in the area of e-health applications in mobile environments, and we have needed to integrate security services therein. This paper presents a ...
Lecture Notes in Computer Science, 2006
Mobility offers important advantages to information agent applications, specially those related t... more Mobility offers important advantages to information agent applications, specially those related to information retrieval. However, problems like security and interoperability are important barriers to the adoption of this technology. This paper focuses its attention to interoperability. Over the years, several solutions for mobile agents have been proposed, but each one covering specific problems leaving others unsolved. In this paper we analyse the problem of interoperability of mobile agents as a whole. We present an approach based on the use of FIPA ACL as the foundations to reach interoperability between different mobile agent system implementations at different levels. The implementation of the proposed solution has been adopted by JADE as the default mechanism to move agents among platforms and it has been widely used by its community.
Lecture Notes in Computer Science, 2007
FIPA-Based Interoperable Agent Mobility Jordi Cucurull, Ramon Martí, Sergi Robles, Joan Borrell, ... more FIPA-Based Interoperable Agent Mobility Jordi Cucurull, Ramon Martí, Sergi Robles, Joan Borrell, and Guillermo Navarro ... Vieira-Marques, P., Robles, S., Cucurull, J., Cruz-Correia, R., Navarro, G., Martí, R.: Secure integration of distributed medical data using mobile agents. ...