Mostrando 3 resultados de: 3
Filtros aplicados
Publisher
2015 10th Iberian Conference on Information Systems and Technologies, CISTI 2015(1)
ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings(1)
Iberian Conference on Information Systems and Technologies, CISTI(1)
Área temáticas
Análisis numérico(1)
Ciencias de la computación(1)
Funcionamiento de bibliotecas y archivos(1)
Física aplicada(1)
Programación informática, programas, datos, seguridad(1)
Área de conocimiento
Ingeniería de software(1)
Including security mechanisms into systems architecture supporting vulnerabilities
Conference ObjectAbstract: The development of information systems and their construction must be ever more efficient, they mustPalabras claves:component, INFORMATION, MECHANISMS, security, vulnerabilitiesAutores:A. Cabrera Silva, Armando Cabrera, D Jaramillo Hurtado, Danilo Jaramillo Hurtado, José Carrillo V., M. Abad Espinoza, Marco AbadFuentes:rraaescopusInformation security in implementing web applications for small businesses based on COBIT5-SI [Seguridad de la Información en la implementación de aplicaciones web para pequeñas empresas en base a COBIT5-SI]
ArticleAbstract: The Information Security is one of the preventive measures to take account for the proper functioninPalabras claves:cobit5, information security, web applications.Autores:D Jaramillo Hurtado, F. Guaman Bastidas, K. SalazarFuentes:rraaeRequeriments elicitaction of resilience for systems information based on the model CERT-RMM [Elicitación de requisitos de resiliencia para sistemas de información basado en el modelo CERT-RMM]
ArticleAbstract: It intends emphasize the important of an effective requirements elicitation of resilience to determiPalabras claves:cert, requirements elicitation, resilience, resilience requirements, rmm model, software resiliencyAutores:D Jaramillo Hurtado, J. Palacios A.Fuentes:rraae