Author of the publication

Designing security policies for complex SCADA systems management and protection.

, and . IJITM, 15 (4): 313-332 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Ontology for Requirements Analysis of Managers' Policies in Financial Institutions., and . IESA, page 27-38. Springer, (2007)If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network., , , , and . CRiSIS, page 85-92. IEEE, (2008)An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504., , , and . RCIS, page 35-44. IEEE, (2008)Towards the ENTRI Framework: Security Risk Management Enhanced by the Use of Enterprise Architectures., , , and . CAiSE Workshops, volume 215 of Lecture Notes in Business Information Processing, page 459-469. Springer, (2015)Critical Infrastructures Governance Exploring SCADA Cybernetics through Architectured Policy Semantic., and . SMC, page 4766-4771. IEEE, (2013)An integrated conceptual model for information system security risk management supported by enterprise architecture management., , , , , and . Software and Systems Modeling, 18 (3): 2285-2312 (2019)Framework for Engineering Complex Security Requirements Patterns., and . ICITCS, page 1-5. IEEE Computer Society, (2016)Capability-Driven Design of Business Service Ecosystem to Support Risk Governance in Regulatory Ecosystems., , and . CSIMQ, (2017)On the Development of a Modelling Framework for Value Co-creation., , , and . VMBO, volume 2239 of CEUR Workshop Proceedings, page 122-132. CEUR-WS.org, (2018)Towards a Language to Support Value Cocreation: An Extension to the ArchiMate Modeling Framework., , and . FedCSIS, page 751-760. (2018)