Author of the publication

Eliciting Security Requirements for Business Processes of Legacy Systems.

, , , , , , and . PoEM, volume 235 of Lecture Notes in Business Information Processing, page 91-107. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application., , and . ER Workshops, volume 5833 of Lecture Notes in Computer Science, page 126-136. Springer, (2009)Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems., , , , and . Future Internet, 8 (3): 36 (2016)Security Reference Architecture for Cyber-Physical Systems (CPS)., , , , and . J. Univers. Comput. Sci., 27 (6): 609-634 (2021)Towards a Quantum World in Cybersecurity Land., , , , , and . IS-EUD Workshops, volume 3408 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros., , and . CIbSE, page 388-393. (2009)Developing a Secure Mobile Grid System through a UML Extension., , , and . J. Univers. Comput. Sci., 16 (17): 2333-2352 (2010)Systematic design of secure Mobile Grid systems., , , and . J. Netw. Comput. Appl., 34 (4): 1168-1183 (2011)Defining Viewpoints for Security Architectural Patterns., , , and . SECRYPT, page 419-424. INSTICC Press, (2006)PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices., , , and . ARES, page 136-143. IEEE Computer Society, (2008)Security Analysis in the Migration to Cloud Environments., , , and . Future Internet, 4 (2): 469-487 (2012)