Buscar
Mostrando ítems 1-10 de 36
Ponencia
Definition and Verification of Security Configurations of Cyber-Physical Systems
(Springer, 2020)
The proliferation of Cyber-Physical Systems (CPSs) is rais ing serious security challenges. These are complex systems, integrating physical elements into automated networked systems, often containing a variety of devices, ...
Ponencia
Improving the Diagnosability of Business Process Management Systems Using Test Points
(Springer, 2010)
The management and automation of business processes have become an essential task within IT organizations, where the diagnosis is a very important issue, since it enables fault isolation in a business process. The ...
Ponencia
AMADEUS: Towards the AutoMAteD secUrity teSting
(ACM: Association for Computing Machinery, 2020)
The proper configuration of systems has become a fundamental factor to avoid cybersecurity risks. Thereby, the analysis of cyber security vulnerabilities is a mandatory task, but the number of vul nerabilities and system ...
Ponencia
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes
(Springer, 2012)
Risk management has become an essential mechanism for business and security analysts, since it enable the identification, evalu ation and treatment of any threats, vulnerabilities, and risks to which organizations maybe ...
Ponencia
Una propuesta usando Restricciones para la toma de decisiones en la tolerancia a fallos en procesos de negocio
(Mondragón Unibertsitatea, 2009)
Cuando un proceso de negocio no obtiene el objetivo que se propone será necesario realizar una diagnosis y detección de errores, descubriendo qué servicios están funcionando de forma incorrecta para su sustitución. El ...
Ponencia
Resolución de acuerdos en Procesos de Negocio para Multiproceso Software usando Programación con Restricciones Distribuidas
(Asociación de Ingeniería del Software y Tecnologías de Desarrollo de Software (SISTEDES), 2010)
Un proceso de negocio consiste en un conjunto de actividades que trabajan de manera coordinada para obtener un objetivo común. A veces, la defiición del objetivo usando un acuerdo de proceso de negocio clásico no es ...
Artículo
Feature models to boost the vulnerability management process
(Elsevier, 2022)
Vulnerability management is a critical and very challenging process that allows organisations to design a procedure to identify potential vulnerabilities, assess the level of risk, and define remediation mechanisms to ...
Ponencia
Fault diagnosis in databases for business processes
(PHM Society, 2010)
Business processes involve data that can be modified or updated by various activities. These data must satisfy the business rules associated to the process. As the information treated in a business process tends to be ...
Ponencia
Diagnosis de Errores en la Gestión de Procesos Software con Programación con Restricciones
(Asociación de Ingeniería del Software y Tecnologías de Desarrollo de Software (SISTEDES), 2010)
El desarrollo de proyectos software similares es habitual en las empresas de desarrollo de software. Esto proporciona una base de conocimiento sobre cómo se han comportado otros proyectos similares y la posibilidad de ...
Artículo
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
(Elsevier, 2013)
Context: The use of Business Process Management Systems (BPMS) has emerged in the IT arena for the automation of business processes. In the majority of cases, the issue of security is overlooked by default in these systems, ...