Author of the publication

Extensión de UML 2.0 para especificar Requisitos de Seguridad en Procesos de Negocios.

, , and . CIbSE, page 375-388. (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending RISC-V Processor Datapaths with Multi-Grain Reconfigurable Overlays., , , and . DCIS, page 1-6. IEEE, (2022)Towards an integration of Security Requirements into Business Process Modeling., , and . WOSIS, page 287-297. INSTICC Press, (2005)Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams., , and . WOSIS, page 174-184. INSTICC Press, (2006)Representación de Requisitos de Seguridad en el Modelado de Procesos de Negocios., , and . CIbSE, page 255-266. (2005)Execution modeling in self-aware FPGA-based architectures for efficient resource management., , , , , and . ReCoSoC, page 1-8. IEEE, (2015)Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio., , and . JISBD, page 347-356. (2006)Especificación de Procesos de Negocio Seguros a través de una extensión de UML 2.0., , , and . JISBD, page 336-345. Thomson Editorial, (2007)STRELA: STReaming ELAstic CGRA Accelerator for Embedded Systems., , , , , and . CoRR, (2024)CERBERO: Cross-layer modEl-based fRamework for multi-oBjective dEsign of reconfigurable systems in unceRtain hybRid envirOnments: Invited paper: CERBERO teams from UniSS, UniCA, IBM Research, TASE, INSA-Rennes, UPM, USI, Abinsula, AmbieSense, TNO, S&T, CRF., , , , , , , , , and 11 other author(s). CF, page 320-325. ACM, (2019)Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes., , and . TrustBus, volume 4083 of Lecture Notes in Computer Science, page 51-61. Springer, (2006)