From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics., , и . Security and Management, стр. 109-117. CSREA Press, (2004)A Comparison of Secure Information Systems Design Methodologies., , и . CAiSE Workshops (1), стр. 189-198. Faculty of Computer Science and Information Technology, Riga Technical University, Riga, Latvia, (2004)PWSSEC: Proceso de Desarrollo para Seguridad de Servicios., , и . JISBD, стр. 203-210. Thomson, (2005)Aplicación práctica de un proceso de ingeniería de requisitos de seguridad., , и . JISBD, стр. 315-324. (2006)Applying a Security Requirements Engineering Process., , и . ESORICS, том 4189 из Lecture Notes in Computer Science, стр. 192-206. Springer, (2006)Secure business process model specification through a UML 2.0 activity diagram profile., , , и . Decis. Support Syst., 51 (3): 446-465 (2011)A practical application of our MDD approach for modeling secure XML data warehouses., , , и . Decis. Support Syst., 52 (4): 899-925 (2012)Main Issues in Big Data Security., , и . Future Internet, 8 (3): 44 (2016)Model driven development of secure XML databases., , , и . SIGMOD Rec., 35 (3): 22-27 (2006)Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes., , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 51-61. Springer, (2006)