Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Minimizing incident response time in real-world scenarios using quantum computing

    The Information Security Management Systems (ISMS) are global and risk-driven processes that allow companies to develop their cybersecurity strategy by defining security policies, valuable assets, controls, an...

    Manuel A. Serrano, Luis E. Sánchez, Antonio Santos-Olmo in Software Quality Journal (2024)

  2. No Access

    Chapter and Conference Paper

    Cybersecurity in the Maritime Sector: A Point of Analysis in Risk Management

    Regardless of the field of action (civilian, military, …), cybersecurity risks for the maritime sector are increasingly varied and their attack methodologies more innovative. The appearance of policies from di...

    Ferney Martínez, Luis Enrique Sánchez in Proceedings of the IV Iberoamerican Congre… (2024)

  3. Article

    Open Access

    Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals

    The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets. The availability of these systems is now vital for the protecti...

    Antonio Santos-Olmo, Luis Enrique Sánchez, David G. Rosado in Frontiers of Computer Science (2023)

  4. Article

    Open Access

    Improving security in NoSQL document databases through model-driven modernization

    NoSQL technologies have become a common component in many information systems and software applications. These technologies are focused on performance, enabling scalable processing of large volumes of structur...

    Alejandro Maté, Jesús Peral, Juan Trujillo in Knowledge and Information Systems (2021)

  5. No Access

    Chapter and Conference Paper

    Definition and Verification of Security Configurations of Cyber-Physical Systems

    The proliferation of Cyber-Physical Systems (CPSs) is raising serious security challenges. These are complex systems, integrating physical elements into automated networked systems, often containing a variety ...

    Ángel Jesús Varela-Vaca, David G. Rosado, Luis Enrique Sánchez in Computer Security (2020)

  6. No Access

    Reference Work Entry In depth

    Data Warehouse Security

    Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo in Encyclopedia of Database Systems (2018)

  7. No Access

    Chapter and Conference Paper

    How the Conceptual Modelling Improves the Security on Document Databases

    Big Data is becoming a prominent trend in our society. Ever larger amounts of data, including sensitive and personal information, are being loaded into NoSQL and other Big Data technologies for analysis and pr...

    Carlos Blanco, Diego García-Saiz, Jesús Peral, Alejandro Maté in Conceptual Modeling (2018)

  8. No Access

    Living Reference Work Entry In depth

    Data Warehouse Security

    Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo in Encyclopedia of Database Systems

  9. Chapter and Conference Paper

    A Framework for Secure Migration Processes of Legacy Systems to the Cloud

    The emergence of cloud computing as a major trend in the IT industry signifies that corporate users of this paradigm are confronted with the challenge of securing their systems in this new environment. An impo...

    Luis Márquez, David G. Rosado in Advanced Information Systems Engineering W… (2015)

  10. Chapter and Conference Paper

    Eliciting Security Requirements for Business Processes of Legacy Systems

    The modernisation of enterprise legacy systems, without compromises in their functionality, is a demanding and time consuming endeavour. To retain the underlying business behaviour during their modernisation, ...

    Nikolaos Argyropoulos, Luis Márquez Alcañiz in The Practice of Enterprise Modeling (2015)

  11. Article

    Open Access

    An analysis of security issues for cloud computing

    Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because es...

    Keiko Hashizume, David G Rosado in Journal of Internet Services and Applicati… (2013)

  12. Chapter and Conference Paper

    Analysis of Application of Security Patterns to Build Secure Systems

    Both new technology business models and the new tendencies in the field of computing are forcing organizations to undergo a constant evolution in order to maintain their competitiveness in markets. This evolut...

    Roberto Ortiz, Javier Garzás in Advanced Information Systems Engineering W… (2011)

  13. No Access

    Chapter and Conference Paper

    Towards the Secure Modelling of OLAP Users’ Behaviour

    Information Security is a crucial aspect for organizations, and must be considered during the development of Information Systems. The data in Data Warehouses (DWs) are highly sensitive since they manage histor...

    Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo in Secure Data Management (2010)

  14. No Access

    Chapter and Conference Paper

    Security Culture in Small and Medium-Size Enterprise

    The information society depends ever-increasingly on Information Security Management Systems (ISMSs), and these systems have become vital to SMEs. However, ISMSs must be adapted to SME’s specific characteristi...

    Luis Enrique Sánchez, Antonio Santos-Olmo in ENTERprise Information Systems (2010)

  15. No Access

    Chapter and Conference Paper

    Applicability of Security Patterns

    Information Security has become one of the fundamental mainstays in organizations owing to the ever-increasing cyber attacks against them in recent years. Both the designers of security mechanisms and the secu...

    Roberto Ortiz, Santiago Moral-García in On the Move to Meaningful Internet Systems… (2010)

  16. No Access

    Chapter and Conference Paper

    Building ISMS through the Reuse of Knowledge

    The information society is increasingly more dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has become crucial to the evolution of Small and Medium-size E...

    Luis Enrique Sánchez, Antonio Santos-Olmo in Trust, Privacy and Security in Digital Bus… (2010)

  17. No Access

    Reference Work Entry In depth

    Data Warehouse Security

    Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo in Encyclopedia of Database Systems (2009)

  18. No Access

    Chapter and Conference Paper

    Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application

    Systems based on Grid computing have not traditionally been developed through suitable methodologies and have not taken into account security requirements throughout their development, offering technical secur...

    David G. Rosado, Eduardo Fernández-Medina in Advances in Conceptual Modeling - Challeng… (2009)

  19. No Access

    Chapter and Conference Paper

    Towards a Modernization Process for Secure Data Warehouses

    Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints are not properly integrated i...

    Carlos Blanco, Ricardo Pérez-Castillo in Data Warehousing and Knowledge Discovery (2009)

  20. No Access

    Chapter and Conference Paper

    Security Requirements Management in Software Product Line Engineering

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current prod...

    Daniel Mellado, Eduardo Fernández-Medina in e-Business and Telecommunications (2009)

previous disabled Page of 2