Mostrando 4 resultados de: 4
Filtros aplicados
Subtipo de publicación
Conference Object(4)
Publisher
ICSOFT 2007 - 2nd International Conference on Software and Data Technologies, Proceedings(1)
Proceedings - 1st International Symposium on Empirical Software Engineering and Measurement, ESEM 2007(1)
Proceedings of the 5th International Workshop on Security in Information Systems - WOSIS 2007; In Conjunction with ICEIS 2007(1)
SECRYPT 2007 - International Conference on Security and Cryptography, Proceedings(1)
Área temáticas
Dirección general(3)
Programación informática, programas, datos, seguridad(3)
Derecho privado(2)
Ciencias de la computación(1)
Métodos informáticos especiales(1)
Área de conocimiento
Ciencias de la computación(2)
Ingeniería de software(2)
Tecnologías de la información y la comunicación(2)
Automatización(1)
Software(1)
Origen
scopus(4)
A controlled experiment for selecting transformations based on quality attributes in the context of MDA
Conference ObjectAbstract: In this paper, we briefly introduce a controlled experiment to investigate the selection of alternatPalabras claves:Autores:Abraho S., Carsí J.A., Emilio Insfran, Genero M., Piattini-Velthuis M., Ramos I.Fuentes:scopusDeveloping a model and a tool to manage the information security in small and medium enterprises
Conference ObjectAbstract: The maturity and security management systems are essential in order to guarantee the continuity andPalabras claves:ISMS, Maturity model, Risk analysis, SMEAutores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Piattini-Velthuis M., Villafranca D.Fuentes:scopusMMISS-SME practical development: Maturity model for information systems security management in SMEs
Conference ObjectAbstract: For enterprises to be able to use information technologies and communications with guarantees, it isPalabras claves:Autores:Luis Enrique Sánchez Crespo, Piattini-Velthuis M., Villafranca D.Fuentes:scopusScmm-tool tool for computer automation of the information security management systems
Conference ObjectAbstract: For enterprises to be able to use information technologies and communications with guarantees, it isPalabras claves:ISMS, Maturity model, Risk analysis, SMEAutores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Piattini-Velthuis M., Villafranca D.Fuentes:scopus