Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems., , and . WOSIS, page 135-145. INSTICC Press, (2006)Towards a Classification of Security Metrics., , and . WOSIS, page 342-350. INSTICC Press, (2004)A Model Driven Approach for Secure XML Database Development., , , and . WOSIS, page 33-46. INSTICC Press, (2006)Access Control of SVG Documents., , , and . DBSec, volume 256 of IFIP Conference Proceedings, page 219-230. Kluwer, (2002)Web services enterprise security architecture: a case study., , and . SWS, page 10-19. ACM, (2005)Implementing an Access Control System for SVG Documents., , and . OTM Workshops, volume 2889 of Lecture Notes in Computer Science, page 741-753. Springer, (2003)Extensión de UML 2.0 para especificar Requisitos de Seguridad en Procesos de Negocios., , and . CIbSE, page 375-388. (2006)Analysis-Level Classes from Secure Business Processes Through Model Transformations., , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 104-114. Springer, (2007)Towards security requirements management for software product lines: A security domain requirements engineering process., , and . Comput. Stand. Interfaces, 30 (6): 361-371 (2008)Secure information systems development - a survey and comparison., , and . Comput. Secur., 24 (4): 308-321 (2005)