Mostrando 6 resultados de: 6
Publisher
2015 10th Iberian Conference on Information Systems and Technologies, CISTI 2015(2)
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(2)
ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings(1)
Proceedings of the 5th Iberian Conference on Information Systems and Technologies, CISTI 2010(1)
Área temáticas
Ciencias de la computación(5)
Métodos informáticos especiales(2)
Dirección general(1)
Funcionamiento de bibliotecas y archivos(1)
Física aplicada(1)
Comparative analysis between the techniques used in the Requirements Engineering, evaluating such techniques forehead to the characteristics of software projects
Conference ObjectAbstract: It is tried to emphasize the importance of the Engineering of Requirements in the development of sofPalabras claves:Engineering of requirement, Process model, Techniques of IRAutores:D Jaramillo Hurtado, D. Valdivieso, Danilo Jaramillo Hurtado, Narvaez D.Fuentes:googlerraaescopusDesign and validation of enterprise application architectures
ArticleAbstract: This work presents the results of the process of design and assessment of the enterprise applicationPalabras claves:"4+1", Applications Architecture, Business architecture, Enterprise architecture, Esb, SOA, TogafAutores:Armando Cabrera, Carrillo J.D., Danilo Jaramillo Hurtado, Freddy Romero, Marco AbadFuentes:scopusIncidence of software quality attributes in the design, construction and deployment of Cloud architectural environments
Conference ObjectAbstract: Cloud Computing (CC) is a new paradigm in the world of computing, it includes several service and dePalabras claves:CLOUD COMPUTING, quality attributes, SDLC, Software architectureAutores:Ana Lucia Poma Gallegos, Armando Cabrera, Danilo Jaramillo Hurtado, G. Ana Poma, Marco Abad, Verdúm J.C.Fuentes:googlescopusIncluding security mechanisms into systems architecture supporting vulnerabilities
Conference ObjectAbstract: The development of information systems and their construction must be ever more efficient, they mustPalabras claves:component, INFORMATION, MECHANISMS, security, vulnerabilitiesAutores:A. Cabrera Silva, Armando Cabrera, D Jaramillo Hurtado, Danilo Jaramillo Hurtado, José Carrillo V., M. Abad Espinoza, Marco AbadFuentes:rraaescopusInformation security in implementing web applications for small businesses based on COBIT5-SI
Conference ObjectAbstract: The Information Security is one of the preventive measures to take account for the proper functioninPalabras claves:cobit5, information security, WEB APPLICATIONSAutores:Danilo Jaramillo Hurtado, E. Kruskaya Salazar, Franco GuamánFuentes:scopusSecurity framework for mobile application development and its contribution to cyberresilience
ArticleAbstract: Digital transformation integrates technologies in the areas of an organization. Organizations are coPalabras claves:CyberResilience, Mobile application, securityAutores:Consuelo Ramos, Danilo Jaramillo Hurtado, G. Karla RomeroFuentes:scopus