Daniel Mellado

According to our database1, Daniel Mellado authored at least 31 papers between 2006 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Empirical evaluation of a cloud computing information security governance framework.
Inf. Softw. Technol., 2015

ISGcloud: a Security Governance Framework for Cloud Computing.
Comput. J., 2015

A Framework for Secure Migration Processes of Legacy Systems to the Cloud.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2014
Secure Tropos framework for software product lines requirements engineering.
Comput. Stand. Interfaces, 2014

Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study.
Proceedings of the WOSIS 2014, 2014

2012
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment.
J. Univers. Comput. Sci., 2012

An Overview of Current Information Systems Security Challenges and Innovations.
J. Univers. Comput. Sci., 2012

Security Analysis in the Migration to Cloud Environments.
Future Internet, 2012

2011
A Comparative Review of Cloud Security Proposals with ISO/IEC 27002.
Proceedings of the WOSIS 2011, 2011

2010
Security requirements engineering framework for software product lines.
Inf. Softw. Technol., 2010

A systematic review of security requirements engineering.
Comput. Stand. Interfaces, 2010

A comparison of software design security metrics.
Proceedings of the Software Architecture, 4th European Conference, 2010

2009
Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Towards security requirements management for software product lines: A security domain requirements engineering process.
Comput. Stand. Interfaces, 2008

Security Requirements in Software Product Lines.
Proceedings of the SECRYPT 2008, 2008

Gestión de la Variabilidad de los Requisitos de Seguridad en Líneas de Producto.
Proceedings of the XIII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2008), 2008

Security Requirements Engineering Process for Software Product Lines: A Case Study.
Proceedings of the Third International Conference on Software Engineering Advances, 2008

Security Requirements Management in Software Product Line Engineering.
Proceedings of the e-Business and Telecommunications - International Conference, 2008

Aplicando un Proceso de Ingeniería de Requisitos de Seguridad de Dominio para Líneas de Producto Software.
Proceedings of the Memorias de la XI Conferencia Iberoamericana de Software Engineering (CIbSE 2008), 2008

Security Requirements Variability for Software Product Lines.
Proceedings of the The Third International Conference on Availability, 2008

2007
A common criteria based security requirements engineering process for the development of secure information systems.
Comput. Stand. Interfaces, 2007

SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines.
Proceedings of the Security in Information Systems, 2007

Gestión Integral de Requisitos de Seguridad en Líneas de Producto Software.
Proceedings of the XII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2007), 2007

Soporte Automatizado a la Ingeniería de Requisitos de Seguridad.
Proceedings of the Memorias de la X Conferencia Iberoamericana de Software Engineering (CIbSE 2007), 2007

2006
SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems.
Proceedings of the Security in Information Systems, 2006

Secure Information Systems Development - Based on a Security Requirements Engineering Process.
Proceedings of the SECRYPT 2006, 2006

Aplicación práctica de un proceso de ingeniería de requisitos de seguridad.
Proceedings of the XI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2006), 2006

A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems.
Proceedings of the Computational Science and Its Applications, 2006

Applying a Security Requirements Engineering Process.
Proceedings of the Computer Security, 2006

Análisis Comparativo de Propuestas de Establecimiento de Requisitos de Seguridad para el Desarrollo de Sistemas de Información Seguros.
Proceedings of the Memorias de la IX Conferenci a Iberoamericana de Software Engineering (CIbSE 2006), 2006

A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements.
Proceedings of the The First International Conference on Availability, 2006


  Loading...