Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Main Issues in Big Data Security., , and . Future Internet, 8 (3): 44 (2016)Security Reference Architecture for Cyber-Physical Systems (CPS)., , , , and . J. Univers. Comput. Sci., 27 (6): 609-634 (2021)Modelado de Requisitos de Seguridad para Big Data., , and . CIbSE, page 515-522. Curran Associates, (2018)Application of security reference architecture to Big Data ecosystems in an industrial scenario., , , , and . Softw. Pract. Exp., 50 (8): 1520-1538 (2020)Securing Databases Using Big Data Technology., , and . ICIQ, page 93-102. Alarcos Research Group (UCLM), (2016)MARISMA-BiDa pattern: Integrated risk analysis for big data., , , , , and . Comput. Secur., (2021)Secure Development of Big Data Ecosystems., , , and . IEEE Access, (2019)Towards a Security Reference Architecture for Big Data., , , and . DOLAP, volume 2062 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)A Security Pattern for Key-Value NoSQL Database Authorization., , , and . EuroPLoP, page 12:1-12:4. ACM, (2018)A misuse Pattern for DDoS in the IoT., , and . EuroPLoP, page 34:1-34:5. ACM, (2018)