Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Security Reference Architecture for Big Data., , , and . DOLAP, volume 2062 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)A Security Pattern for Key-Value NoSQL Database Authorization., , , and . EuroPLoP, page 12:1-12:4. ACM, (2018)A misuse Pattern for DDoS in the IoT., , and . EuroPLoP, page 34:1-34:5. ACM, (2018)Security Reference Architecture for Cyber-Physical Systems (CPS)., , , , and . J. Univers. Comput. Sci., 27 (6): 609-634 (2021)Modelado de Requisitos de Seguridad para Big Data., , and . CIbSE, page 515-522. Curran Associates, (2018)Securing Databases Using Big Data Technology., , and . ICIQ, page 93-102. Alarcos Research Group (UCLM), (2016)BlockBD: a security pattern to incorporate blockchain in big data ecosystems., , , and . EuroPLoP, page 17:1-17:8. ACM, (2019)Unbiased Rounding for HUB Floating-Point Addition., , and . IEEE Trans. Computers, 67 (9): 1359-1365 (2018)Digit Recurrence Floating-Point Division under HUB Format.. ARITH, page 79-86. IEEE Computer Society, (2016)On-line Decimal Adder with RBCD Representation., , , and . ASAP, page 53-60. IEEE Computer Society, (2012)