Mostrando 10 resultados de: 14
Publisher
2015 10th Iberian Conference on Information Systems and Technologies, CISTI 2015(3)
Advances in Intelligent Systems and Computing(2)
ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings(2)
Iberian Conference on Information Systems and Technologies, CISTI(2)
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(2)
Área temáticas
Ciencias de la computación(9)
Programación informática, programas, datos, seguridad(6)
Dirección general(3)
Métodos informáticos especiales(2)
Administración pública y ciencia militar(1)
Comparative analysis between the techniques used in the Requirements Engineering, evaluating such techniques forehead to the characteristics of software projects
Conference ObjectAbstract: It is tried to emphasize the importance of the Engineering of Requirements in the development of sofPalabras claves:Engineering of requirement, Process model, Techniques of IRAutores:D Jaramillo Hurtado, D. Valdivieso, Danilo Jaramillo Hurtado, Narvaez D.Fuentes:googlerraaescopusDefinition and implementation of the enterprise business layer through a business reference model, using the architecture development method ADM-TOGAF
Conference ObjectAbstract: Definition and implementation of the Enterprise Business Layer, is focused on strengthening the busiPalabras claves:Autores:Armando Cabrera, Danilo Jaramillo Hurtado, Jefferson Gómez, Marco Abad, Verdúm J.C.Fuentes:scopusDefinition of cybersecurity businness framework based on ADM-TOGAF
Conference ObjectAbstract: In this paper a set of activities and steps that are required to implement a framework enterprise cyPalabras claves:ADM, CYBERSECURITY, Enterprise architecture, TogafAutores:Armando Cabrera, Danilo Jaramillo Hurtado, Marco Abad, V. Alfredo Torres, Verdúm J.C.Fuentes:scopusAgile methodologies applied in teaching-learning process in engineering: A case of study
Conference ObjectAbstract: To espouse the principles, values and agile practices in the academic scope, it is proposed to use tPalabras claves:academic field, agile practices, ScrumAutores:Abad Patricio, Danilo Jaramillo Hurtado, Fernanda Maricela Soto-Guerrero, Manuel Sucunuta, Rodriguez-Morales Germania, Samanta Patricia Cueva-CarrionFuentes:googlescopusDesign and validation of enterprise application architectures
ArticleAbstract: This work presents the results of the process of design and assessment of the enterprise applicationPalabras claves:"4+1", Applications Architecture, Business architecture, Enterprise architecture, Esb, SOA, TogafAutores:Armando Cabrera, Carrillo J.D., Danilo Jaramillo Hurtado, Freddy Romero, Marco AbadFuentes:scopusImplementation of techniques and OWASP security recommendations to avoid SQL and XSS attacks using J2EE and WS-Security
Conference ObjectAbstract: This work contains the implementation of techniques and recommendations OWASP on a SOA prototype devPalabras claves:Metro Framework, OWASP, SOA, SQL injection, WS-Security, XSSAutores:Daniel Alejandro Guaman Coronel, Daniel Guamán, Danilo Jaramillo Hurtado, Guamán F., Manuel SucunutaFuentes:googlescopusImplementation of techniques, standards and safety recommendations to prevent XSS and SQL injection attacks in Java EE RESTful applications
Conference ObjectAbstract: There are recommendations and tools, given by OWASP that suggest basic techniques of prevention andPalabras claves:OWASP, REST, SQL injection, XSSAutores:D Jaramillo Hurtado, D. Guaman Coronel, Daniel Alejandro Guaman Coronel, Daniel Guamán, Danilo Jaramillo Hurtado, F. Guaman Bastidas, Franco Guamán, R. Correa Quezada, Roddy A. Correa, Roddy Andrés Correa TenesacaFuentes:googlerraaescopusIncidence of software quality attributes in the design, construction and deployment of Cloud architectural environments
Conference ObjectAbstract: Cloud Computing (CC) is a new paradigm in the world of computing, it includes several service and dePalabras claves:CLOUD COMPUTING, quality attributes, SDLC, Software architectureAutores:Ana Lucia Poma Gallegos, Armando Cabrera, Danilo Jaramillo Hurtado, G. Ana Poma, Marco Abad, Verdúm J.C.Fuentes:googlescopusIncluding security mechanisms into systems architecture supporting vulnerabilities
Conference ObjectAbstract: The development of information systems and their construction must be ever more efficient, they mustPalabras claves:component, INFORMATION, MECHANISMS, security, vulnerabilitiesAutores:A. Cabrera Silva, Armando Cabrera, D Jaramillo Hurtado, Danilo Jaramillo Hurtado, José Carrillo V., M. Abad Espinoza, Marco AbadFuentes:rraaescopusInformation security in implementing web applications for small businesses based on COBIT5-SI
Conference ObjectAbstract: The Information Security is one of the preventive measures to take account for the proper functioninPalabras claves:cobit5, information security, WEB APPLICATIONSAutores:Danilo Jaramillo Hurtado, E. Kruskaya Salazar, Franco GuamánFuentes:scopus