Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aplicación práctica de un proceso de ingeniería de requisitos de seguridad., , and . JISBD, page 315-324. (2006)Gestión Integral de Requisitos de Seguridad en Líneas de Producto Software., , and . JISBD, page 177-186. Thomson Editorial, (2007)Applying a Security Requirements Engineering Process., , and . ESORICS, volume 4189 of Lecture Notes in Computer Science, page 192-206. Springer, (2006)A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements., , and . ARES, page 654-661. IEEE Computer Society, (2006)A comparison of software design security metrics., , and . ECSA Companion Volume, page 236-242. ACM, (2010)Aplicando un Proceso de Ingeniería de Requisitos de Seguridad de Dominio para Líneas de Producto Software., , and . CIbSE, page 141-154. (2008)Análisis Comparativo de Propuestas de Establecimiento de Requisitos de Seguridad para el Desarrollo de Sistemas de Información Seguros., , and . CIbSE, page 345-358. (2006)Security Requirements Engineering Process for Software Product Lines: A Case Study., , and . ICSEA, page 1-6. IEEE Computer Society, (2008)SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines., , and . WOSIS, page 220-232. INSTICC Press, (2007)Security Requirements in Software Product Lines., , and . SECRYPT, page 442-449. INSTICC Press, (2008)