From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Applying a Security Requirements Engineering Process., , и . ESORICS, том 4189 из Lecture Notes in Computer Science, стр. 192-206. Springer, (2006)Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics., , и . Security and Management, стр. 109-117. CSREA Press, (2004)PWSSEC: Proceso de Desarrollo para Seguridad de Servicios., , и . JISBD, стр. 203-210. Thomson, (2005)A Comparison of Secure Information Systems Design Methodologies., , и . CAiSE Workshops (1), стр. 189-198. Faculty of Computer Science and Information Technology, Riga Technical University, Riga, Latvia, (2004)Aplicación práctica de un proceso de ingeniería de requisitos de seguridad., , и . JISBD, стр. 315-324. (2006)Gestión Integral de Requisitos de Seguridad en Líneas de Producto Software., , и . JISBD, стр. 177-186. Thomson Editorial, (2007)A BPMN Extension for the Modeling of Security Requirements in Business Processes., , и . IEICE Trans. Inf. Syst., 90-D (4): 745-752 (2007)Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes., , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 51-61. Springer, (2006)Security requirements engineering framework for software product lines., , и . Inf. Softw. Technol., 52 (10): 1094-1117 (2010)Main Issues in Big Data Security., , и . Future Internet, 8 (3): 44 (2016)