Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Desirable Characteristics for an ISMS oriented to SMEs., , , and . WOSIS, page 151-158. SciTePress, (2011)SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems., , and . WOSIS, page 135-145. INSTICC Press, (2006)SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level., , , and . WOSIS, page 245-256. INSTICC Press, (2007)Security Patterns Related to Security Requirements., , , and . WOSIS, page 163-173. INSTICC Press, (2006)Towards a Classification of Security Metrics., , and . WOSIS, page 342-350. INSTICC Press, (2004)A Model Driven Approach for Secure XML Database Development., , , and . WOSIS, page 33-46. INSTICC Press, (2006)Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises., , , and . SECRYPT, page 355-362. INSTICC Press, (2007)Using REFSENO to Represent Knowledge in the Software Maintenance Process., , , and . DEXA Workshops, page 488-493. IEEE Computer Society, (2004)Validando la Usabilidad y Mantenibilidad de los Modelos de Procesos de Negocio: un Experimento y su Réplica., , , and . CIbSE, page 63-76. (2007)Experimento Exploratorio para la Validación de Medidas para Modelos de Procesos de Negocio., , , and . JIISIC, page 283-292. Facultad de Ciencias e Ingeniería and Departamento de Ingeniería, Pontificia Universidad Católica del Perú, (2007)