Author of the publication

Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems.

, , , , and . Future Internet, 8 (3): 36 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis in the Migration to Cloud Environments., , , and . Future Internet, 4 (2): 469-487 (2012)Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning., , , , and . Internet Things, (December 2023)Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems., , and . IEICE Trans. Inf. Syst., 94-D (2): 243-254 (2011)Obtaining Security Requirements for a Mobile Grid System., , , and . Int. J. Grid High Perform. Comput., 1 (3): 1-17 (2009)Defining Security Architectural Patterns Based on Viewpoints., , , and . ICCSA (3), volume 4707 of Lecture Notes in Computer Science, page 262-272. Springer, (2007)MARISMA-BiDa pattern: Integrated risk analysis for big data., , , , , and . Comput. Secur., (2021)Managing Security and its Maturity in Small and Medium-sized Enterprises., , , and . J. Univers. Comput. Sci., 15 (15): 3038-3058 (2009)Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study., , , and . WOSIS, page 26-37. SciTePress, (2014)An ontology-based secure design framework for graph-based databases., , , , , and . Comput. Stand. Interfaces, (March 2024)Systematic review of SIEM technology: SIEM-SC birth., , , and . Int. J. Inf. Sec., 22 (3): 691-711 (June 2023)