Skip to main content

and
  1. Article

    Open Access

    Improving security in NoSQL document databases through model-driven modernization

    NoSQL technologies have become a common component in many information systems and software applications. These technologies are focused on performance, enabling scalable processing of large volumes of structur...

    Alejandro Maté, Jesús Peral, Juan Trujillo in Knowledge and Information Systems (2021)

  2. No Access

    Reference Work Entry In depth

    Data Warehouse Security

    Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo in Encyclopedia of Database Systems (2018)

  3. No Access

    Chapter and Conference Paper

    How the Conceptual Modelling Improves the Security on Document Databases

    Big Data is becoming a prominent trend in our society. Ever larger amounts of data, including sensitive and personal information, are being loaded into NoSQL and other Big Data technologies for analysis and pr...

    Carlos Blanco, Diego García-Saiz, Jesús Peral, Alejandro Maté in Conceptual Modeling (2018)

  4. No Access

    Living Reference Work Entry In depth

    Data Warehouse Security

    Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo in Encyclopedia of Database Systems

  5. No Access

    Chapter and Conference Paper

    Security Culture in Small and Medium-Size Enterprise

    The information society depends ever-increasingly on Information Security Management Systems (ISMSs), and these systems have become vital to SMEs. However, ISMSs must be adapted to SME’s specific characteristi...

    Luis Enrique Sánchez, Antonio Santos-Olmo in ENTERprise Information Systems (2010)

  6. No Access

    Reference Work Entry In depth

    Data Warehouse Security

    Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo in Encyclopedia of Database Systems (2009)

  7. No Access

    Chapter and Conference Paper

    Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application

    Systems based on Grid computing have not traditionally been developed through suitable methodologies and have not taken into account security requirements throughout their development, offering technical secur...

    David G. Rosado, Eduardo Fernández-Medina in Advances in Conceptual Modeling - Challeng… (2009)

  8. No Access

    Chapter and Conference Paper

    Towards a Modernization Process for Secure Data Warehouses

    Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints are not properly integrated i...

    Carlos Blanco, Ricardo Pérez-Castillo in Data Warehousing and Knowledge Discovery (2009)

  9. No Access

    Chapter and Conference Paper

    Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models

    Nowadays, business process modeling, using industrial standards such as UML or BPMN, offers us a good opportunity to incorporate requirements at high levels of abstraction. In the context of Model Driven Archi...

    Alfonso Rodríguez, Eduardo Fernández-Medina in Advances in Conceptual Modeling – Challeng… (2008)

  10. No Access

    Chapter and Conference Paper

    Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach

    Data Warehouses (DW) manage enterprise information for the decision making process, and the establishment of security measures at all stages of the DW development process is also highly important as unauthoriz...

    Carlos Blanco in On the Move to Meaningful Internet Systems… (2008)

  11. No Access

    Chapter and Conference Paper

    M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification

    The early attainment of requirements in a software development process allows us to improve the quality of the product. Although many methods through which to elicit requirements exist, few of them are specifi...

    Alfonso Rodríguez, Eduardo Fernández-Medina in Advances in Conceptual Modeling – Foundati… (2007)

  12. No Access

    Chapter and Conference Paper

    Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile

    Security has become a crucial aspect for the performance of present organizations since the protected object is the mission of them. Therefore, the management approach oriented to business processes has been a...

    Alfonso Rodríguez, Eduardo Fernández-Medina in Advances in Conceptual Modeling - Theory a… (2006)

  13. Chapter and Conference Paper

    Applying a Security Requirements Engineering Process

    Nowadays, security solutions are mainly focused on providing security defences, instead of solving one of the main reasons for security problems that refers to an appropriate Information Systems (IS) design. I...

    Daniel Mellado, Eduardo Fernández-Medina in Computer Security – ESORICS 2006 (2006)

  14. No Access

    Chapter and Conference Paper

    Extending UML for Designing Secure Data Warehouses

    Data Warehouses (DW), Multidimensional (MD) Databases, and On-Line Analytical Processing Applications are used as a very powerful mechanism for discovering crucial business information. Considering the extreme...

    Eduardo Fernández-Medina, Juan Trujillo in Conceptual Modeling – ER 2004 (2004)

  15. No Access

    Chapter and Conference Paper

    Designing Secure Databases for OLS

    Some Database Management Systems (DBMS) allow to implement multilevel databases, but there are no methodologies for designing these databases. Security must be considered as a fundamental requirement in Inform...

    Eduardo Fernández-Medina, Mario Piattini in Database and Expert Systems Applications (2003)