Skip to main content

and
  1. No Access

    Reference Work Entry In depth

    Data Warehouse Security

    Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo in Encyclopedia of Database Systems (2018)

  2. No Access

    Living Reference Work Entry In depth

    Data Warehouse Security

    Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo in Encyclopedia of Database Systems

  3. Article

    Open Access

    An analysis of security issues for cloud computing

    Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because es...

    Keiko Hashizume, David G Rosado in Journal of Internet Services and Applicati… (2013)

  4. No Access

    Chapter and Conference Paper

    Towards the Secure Modelling of OLAP Users’ Behaviour

    Information Security is a crucial aspect for organizations, and must be considered during the development of Information Systems. The data in Data Warehouses (DWs) are highly sensitive since they manage histor...

    Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo in Secure Data Management (2010)

  5. No Access

    Chapter and Conference Paper

    Security Culture in Small and Medium-Size Enterprise

    The information society depends ever-increasingly on Information Security Management Systems (ISMSs), and these systems have become vital to SMEs. However, ISMSs must be adapted to SME’s specific characteristi...

    Luis Enrique Sánchez, Antonio Santos-Olmo in ENTERprise Information Systems (2010)

  6. No Access

    Chapter and Conference Paper

    Applicability of Security Patterns

    Information Security has become one of the fundamental mainstays in organizations owing to the ever-increasing cyber attacks against them in recent years. Both the designers of security mechanisms and the secu...

    Roberto Ortiz, Santiago Moral-García in On the Move to Meaningful Internet Systems… (2010)

  7. No Access

    Chapter and Conference Paper

    Building ISMS through the Reuse of Knowledge

    The information society is increasingly more dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has become crucial to the evolution of Small and Medium-size E...

    Luis Enrique Sánchez, Antonio Santos-Olmo in Trust, Privacy and Security in Digital Bus… (2010)

  8. No Access

    Reference Work Entry In depth

    Data Warehouse Security

    Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo in Encyclopedia of Database Systems (2009)

  9. No Access

    Chapter and Conference Paper

    Security Requirements Management in Software Product Line Engineering

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current prod...

    Daniel Mellado, Eduardo Fernández-Medina in e-Business and Telecommunications (2009)

  10. No Access

    Chapter and Conference Paper

    Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach

    Data Warehouses (DW) manage enterprise information for the decision making process, and the establishment of security measures at all stages of the DW development process is also highly important as unauthoriz...

    Carlos Blanco in On the Move to Meaningful Internet Systems… (2008)

  11. No Access

    Chapter and Conference Paper

    Analysis-Level Classes from Secure Business Processes Through Model Transformations

    Nowadays, business processes (BP) are important in the maintenance of competitiveness within enterprises. Moreover, security is a crucial issue in business performance. In the last few years, the languages use...

    Alfonso Rodríguez, Eduardo Fernández-Medina in Trust, Privacy and Security in Digital Bus… (2007)

  12. No Access

    Chapter and Conference Paper

    Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes

    Security is a crucial issue for business performance, but usually, it is considered after the business processes definition. Many security requirements can be expressed at the business process level. A busines...

    Alfonso Rodríguez, Eduardo Fernández-Medina in Trust and Privacy in Digital Business (2006)

  13. Chapter and Conference Paper

    Applying a Security Requirements Engineering Process

    Nowadays, security solutions are mainly focused on providing security defences, instead of solving one of the main reasons for security problems that refers to an appropriate Information Systems (IS) design. I...

    Daniel Mellado, Eduardo Fernández-Medina in Computer Security – ESORICS 2006 (2006)