Mostrando 5 resultados de: 5
Filtros aplicados
Publisher
IEEE Access(2)
Universidad de Cuenca(2)
Proceedings of the ACM Symposium on Applied Computing(1)
Área temáticas
Biblioteconomía y Documentación informatica(1)
Economía de la tierra y la energía(1)
Funcionamiento de bibliotecas y archivos(1)
Física aplicada(1)
Otros problemas y servicios sociales(1)
A Systematic Mapping Study on Software Quality Control Techniques for Assessing Privacy in Information Systems
ArticleAbstract: Software Quality Control (SQC) techniques are widely used throughout the software development procesPalabras claves:Data Protection, Information Systems, Mapping, privacy, Software Engineering, software quality control, Systematic studyAutores:Danny S. Guamán, del Álamo J.M., Julio C. CaizaFuentes:googlescopusA response toolkit to provide an active response against intrusions using Ontology-Based IRS
ArticleAbstract: Active response systems are intended to run an automatic response against an intrusion. However, runPalabras claves:Autores:Danny S. Guamán, Julio C. Caiza, Verónica MateosFuentes:rraaeA system of privacy patterns for user control
Conference ObjectAbstract: Privacy by Design is prescribed by the new European General Data Protection Regulation. Getting thisPalabras claves:Data Protection, Pattern system, Privacy by design, Privacy design strategies, Privacy patternsAutores:Colesky M., Del Lamo J.M., Hoepman J.H., Julio C. Caiza, Martín Y.S.Fuentes:googlescopusGDPR Compliance Assessment for Cross-Border Personal Data Transfers in Android Apps
ArticleAbstract: The pervasiveness of Android mobile applications and the services they support allow the personal daPalabras claves:android, Application, assessment, ASSURANCE, COMPLIANCE, Data Protection, dynamic analysis, Evaluation, GDPR, Mobile, privacy, Software quality, TESTINGAutores:Danny S. Guamán, del Álamo J.M., Julio C. CaizaFuentes:googlescopusResponse toolkit to provide an active response against intrusions using Ontology-Based IRS
ArticleAbstract: Los sistemas de respuesta activa tienen por objetivo ejecutar una respuesta en contra de una intrusiPalabras claves:Respuesta A Intrusiones, Respuestas Activa, SEGURIDAD DE REDESAutores:DIUC, Danny S. Guamán, Dirección de Investigación de la Universidad de Cuenca, Julio C. Caiza, Universidad de Cuenca, Verónica MateosFuentes:rraae