Mostrando 10 resultados de: 11
Publisher
2015 10th Iberian Conference on Information Systems and Technologies, CISTI 2015(3)
Advances in Intelligent Systems and Computing(2)
ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings(2)
2010 IEEE ANDESCON Conference Proceedings, ANDESCON 2010(1)
Iberian Conference on Information Systems and Technologies, CISTI(1)
Área temáticas
Ciencias de la computación(6)
Programación informática, programas, datos, seguridad(4)
Administración pública y ciencia militar(1)
Análisis numérico(1)
Dirección general(1)
Comparative analysis between the techniques used in the Requirements Engineering, evaluating such techniques forehead to the characteristics of software projects
Conference ObjectAbstract: It is tried to emphasize the importance of the Engineering of Requirements in the development of sofPalabras claves:Engineering of requirement, Process model, Techniques of IRAutores:D Jaramillo Hurtado, D. Valdivieso, Danilo Jaramillo Hurtado, Narvaez D.Fuentes:googlerraaescopusDefinition and implementation of the Enterprise Business Layer through a Business Reference Model, using the architecture development method ADM-TOGAF
ArticleAbstract: Definition and implementation of the Enterprise Business Layer, is focused on strengthening the busiPalabras claves:Business reference Model, Business Strategy., Enterprise architectureAutores:A. Cabrera Silva, D Jaramillo Hurtado, J. Carrillo, J. Gómez, M. Abad EspinozaFuentes:rraaeDefinition of cybersecurity businness framework based on ADM-TOGAF [Definición de un Marco de Referencia de Ciberseguridad Empresarial basado en ADM-TOGAF]
ArticleAbstract: In this paper a set of activities and steps that are required to implement a framework enterprise cyPalabras claves:ADM, CYBERSECURITY, Enterprise architecture, TOGAF .Autores:A Torres, A. Cabrera Silva, D Jaramillo Hurtado, J. Carrillo, M. Abad EspinozaFuentes:rraaeDesign and validation of enterprise application architectures [Diseño y validación de arquitecturas de aplicaciones empresariales]
ArticleAbstract: This work presents the results of the process of design and assessment of the enterprise applicationPalabras claves:Applications Architecture, Business architecture, Enterprise architecture, Esb, SOA, Togaf, �4+1�Autores:A. Cabrera Silva, D Jaramillo Hurtado, F. Romero, J. Carrillo, M. Abad EspinozaFuentes:rraaeImplementation of techniques, standards and safety recommendations to prevent XSS and SQL injection attacks in Java EE RESTful applications
Conference ObjectAbstract: There are recommendations and tools, given by OWASP that suggest basic techniques of prevention andPalabras claves:OWASP, REST, SQL injection, XSSAutores:D Jaramillo Hurtado, D. Guaman Coronel, Daniel Alejandro Guaman Coronel, Daniel Guamán, Danilo Jaramillo Hurtado, F. Guaman Bastidas, Franco Guamán, R. Correa Quezada, Roddy A. Correa, Roddy Andrés Correa TenesacaFuentes:googlerraaescopusIncidence of software quality attributes in the design, construction and deployment of Cloud architectural environments
ArticleAbstract: Cloud Computing (CC) is a new paradigm in world of computing, it includes several service and deploPalabras claves:CLOUD COMPUTING, quality attributes, SDLC, Software architectureAutores:A Poma, A. Cabrera Silva, D Jaramillo Hurtado, J. Carrillo, M. Abad EspinozaFuentes:rraaeIncluding security mechanisms into systems architecture supporting vulnerabilities
Conference ObjectAbstract: The development of information systems and their construction must be ever more efficient, they mustPalabras claves:component, INFORMATION, MECHANISMS, security, vulnerabilitiesAutores:A. Cabrera Silva, Armando Cabrera, D Jaramillo Hurtado, Danilo Jaramillo Hurtado, José Carrillo V., M. Abad Espinoza, Marco AbadFuentes:rraaescopusInformation security in implementing web applications for small businesses based on COBIT5-SI [Seguridad de la Información en la implementación de aplicaciones web para pequeñas empresas en base a COBIT5-SI]
ArticleAbstract: The Information Security is one of the preventive measures to take account for the proper functioninPalabras claves:cobit5, information security, web applications.Autores:D Jaramillo Hurtado, F. Guaman Bastidas, K. SalazarFuentes:rraaeRequeriments elicitaction of resilience for systems information based on the model CERT-RMM [Elicitación de requisitos de resiliencia para sistemas de información basado en el modelo CERT-RMM]
ArticleAbstract: It intends emphasize the important of an effective requirements elicitation of resilience to determiPalabras claves:cert, requirements elicitation, resilience, resilience requirements, rmm model, software resiliencyAutores:D Jaramillo Hurtado, J. Palacios A.Fuentes:rraaeRoadmap for the implementation of an enterprise architecture framework oriented to institutions of higher education in Ecuador
Conference ObjectAbstract: This paper proposes a comprehensive and integrated roadmap for the implementation of an enterprise aPalabras claves:Enterprise architecture, framework, higher education, Technologies of governing information of ITAutores:A. Cabrera Silva, Armando Cabrera, Carrillo J.D., D Jaramillo Hurtado, Danilo Jaramillo Hurtado, M. Abad Espinoza, Marco Abad, Román C.Fuentes:rraaescopus