Author of the publication

Security services architecture for Secure Mobile Grid Systems.

, , and . Journal of Systems Architecture - Embedded Systems Design, 57 (3): 240-258 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enterprise security pattern: A model-driven architecture instance., , , and . Computer Standards & Interfaces, 36 (4): 748-758 (2014)Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services., , , , and . Journal of Research and Practice in Information Technology, 41 (2): 135-154 (2009)HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management., , , and . J. UCS, 18 (12): 1703-720 (2012)Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications., , , and . J. UCS, 20 (2): 79-106 (2014)The practical application of a process for eliciting and designing security in web service systems., , and . JISBD, page 143-143. IBERGARCETA Pub. S.L., (2010)Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises., , , and . SECRYPT, page 355-362. INSTICC Press, (2007)Desirable Characteristics for an ISMS oriented to SMEs., , , and . WOSIS, page 151-158. SciTePress, (2011)SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems., , and . WOSIS, page 135-145. INSTICC Press, (2006)SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level., , , and . WOSIS, page 245-256. INSTICC Press, (2007)Security Patterns Related to Security Requirements., , , and . WOSIS, page 163-173. INSTICC Press, (2006)