Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services., , , , and . Journal of Research and Practice in Information Technology, 41 (2): 135-154 (2009)Enterprise security pattern: A model-driven architecture instance., , , and . Computer Standards & Interfaces, 36 (4): 748-758 (2014)The practical application of a process for eliciting and designing security in web service systems., , and . JISBD, page 143-143. IBERGARCETA Pub. S.L., (2010)HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management., , , and . J. UCS, 18 (12): 1703-720 (2012)Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications., , , and . J. UCS, 20 (2): 79-106 (2014)Desirable Characteristics for an ISMS oriented to SMEs., , , and . WOSIS, page 151-158. SciTePress, (2011)SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems., , and . WOSIS, page 135-145. INSTICC Press, (2006)SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level., , , and . WOSIS, page 245-256. INSTICC Press, (2007)Security Patterns Related to Security Requirements., , , and . WOSIS, page 163-173. INSTICC Press, (2006)Towards a Classification of Security Metrics., , and . WOSIS, page 342-350. INSTICC Press, (2004)