Mostrando 10 resultados de: 14
Publisher
2015 10th Iberian Conference on Information Systems and Technologies, CISTI 2015(3)
Advances in Intelligent Systems and Computing(2)
ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings(2)
Iberian Conference on Information Systems and Technologies, CISTI(2)
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(2)
Área temáticas
Ciencias de la computación(9)
Programación informática, programas, datos, seguridad(6)
Dirección general(3)
Métodos informáticos especiales(2)
Administración pública y ciencia militar(1)
Área de conocimiento
Ingeniería de software(7)
Software(6)
Ciencias de la computación(4)
Educación superior(1)
Gestión(1)
Comparative analysis between the techniques used in the Requirements Engineering, evaluating such techniques forehead to the characteristics of software projects
Conference ObjectAbstract: It is tried to emphasize the importance of the Engineering of Requirements in the development of sofPalabras claves:Engineering of requirement, Process model, Techniques of IRAutores:D Jaramillo Hurtado, D. Valdivieso, Danilo Jaramillo Hurtado, Narvaez D.Fuentes:googlerraaescopusAgile methodologies applied in teaching-learning process in engineering: A case of study
Conference ObjectAbstract: To espouse the principles, values and agile practices in the academic scope, it is proposed to use tPalabras claves:academic field, agile practices, ScrumAutores:Abad Patricio, Danilo Jaramillo Hurtado, Fernanda Maricela Soto-Guerrero, Manuel Sucunuta, Rodriguez-Morales Germania, Samanta Patricia Cueva-CarrionFuentes:googlescopusDefinition and implementation of the enterprise business layer through a business reference model, using the architecture development method ADM-TOGAF
Conference ObjectAbstract: Definition and implementation of the Enterprise Business Layer, is focused on strengthening the busiPalabras claves:Autores:Armando Cabrera, Danilo Jaramillo Hurtado, Jefferson Gómez, Marco Abad, Verdúm J.C.Fuentes:scopusDefinition of cybersecurity businness framework based on ADM-TOGAF
Conference ObjectAbstract: In this paper a set of activities and steps that are required to implement a framework enterprise cyPalabras claves:ADM, CYBERSECURITY, Enterprise architecture, TogafAutores:Armando Cabrera, Danilo Jaramillo Hurtado, Marco Abad, V. Alfredo Torres, Verdúm J.C.Fuentes:scopusDesign and validation of enterprise application architectures
ArticleAbstract: This work presents the results of the process of design and assessment of the enterprise applicationPalabras claves:"4+1", Applications Architecture, Business architecture, Enterprise architecture, Esb, SOA, TogafAutores:Armando Cabrera, Carrillo J.D., Danilo Jaramillo Hurtado, Freddy Romero, Marco AbadFuentes:scopusImplementation of techniques and OWASP security recommendations to avoid SQL and XSS attacks using J2EE and WS-Security
Conference ObjectAbstract: This work contains the implementation of techniques and recommendations OWASP on a SOA prototype devPalabras claves:Metro Framework, OWASP, SOA, SQL injection, WS-Security, XSSAutores:Daniel Alejandro Guaman Coronel, Daniel Guamán, Danilo Jaramillo Hurtado, Guamán F., Manuel SucunutaFuentes:googlescopusImplementation of techniques, standards and safety recommendations to prevent XSS and SQL injection attacks in Java EE RESTful applications
Conference ObjectAbstract: There are recommendations and tools, given by OWASP that suggest basic techniques of prevention andPalabras claves:OWASP, REST, SQL injection, XSSAutores:D Jaramillo Hurtado, D. Guaman Coronel, Daniel Alejandro Guaman Coronel, Daniel Guamán, Danilo Jaramillo Hurtado, F. Guaman Bastidas, Franco Guamán, R. Correa Quezada, Roddy A. Correa, Roddy Andrés Correa TenesacaFuentes:googlerraaescopusIncidence of software quality attributes in the design, construction and deployment of Cloud architectural environments
Conference ObjectAbstract: Cloud Computing (CC) is a new paradigm in the world of computing, it includes several service and dePalabras claves:CLOUD COMPUTING, quality attributes, SDLC, Software architectureAutores:Ana Lucia Poma Gallegos, Armando Cabrera, Danilo Jaramillo Hurtado, G. Ana Poma, Marco Abad, Verdúm J.C.Fuentes:googlescopusIncluding security mechanisms into systems architecture supporting vulnerabilities
Conference ObjectAbstract: The development of information systems and their construction must be ever more efficient, they mustPalabras claves:component, INFORMATION, MECHANISMS, security, vulnerabilitiesAutores:A. Cabrera Silva, Armando Cabrera, D Jaramillo Hurtado, Danilo Jaramillo Hurtado, José Carrillo V., M. Abad Espinoza, Marco AbadFuentes:rraaescopusInformation security in implementing web applications for small businesses based on COBIT5-SI
Conference ObjectAbstract: The Information Security is one of the preventive measures to take account for the proper functioninPalabras claves:cobit5, information security, WEB APPLICATIONSAutores:Danilo Jaramillo Hurtado, E. Kruskaya Salazar, Franco GuamánFuentes:scopus