David Garcia Rosado

Orcid: 0000-0003-4613-5501

According to our database1, David Garcia Rosado authored at least 48 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks.
Comput. Stand. Interfaces, 2025

2024
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals.
Frontiers Comput. Sci., June, 2024

Maritime cybersecurity: protecting digital seas.
Int. J. Inf. Sec., April, 2024

Minimizing incident response time in real-world scenarios using quantum computing.
Softw. Qual. J., March, 2024

An ontology-based secure design framework for graph-based databases.
Comput. Stand. Interfaces, March, 2024

Enabling security risk assessment and management for business process models.
J. Inf. Secur. Appl., 2024

2023
Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning.
Internet Things, December, 2023

Systematic review of SIEM technology: SIEM-SC birth.
Int. J. Inf. Sec., June, 2023

Towards a Quantum World in Cybersecurity Land.
Proceedings of the Joint Proceedings of the Workshops, 2023

2022
Security policies by design in NoSQL document databases.
J. Inf. Secur. Appl., 2022

Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern.
Comput. Ind., 2022

2021
Security Reference Architecture for Cyber-Physical Systems (CPS).
J. Univers. Comput. Sci., 2021

MARISMA-BiDa pattern: Integrated risk analysis for big data.
Comput. Secur., 2021

CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems.
Comput. Ind., 2021

2020
Definition and Verification of Security Configurations of Cyber-Physical Systems.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2016
Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems.
Future Internet, 2016

2015
Special Issue on Secure Information Systems Engineering.
Comput. J., 2015

Modelling secure cloud systems based on system requirements.
Proceedings of the 2nd IEEE Workshop on Evolving Security and Privacy Requirements Engineering, 2015

Eliciting Security Requirements for Business Processes of Legacy Systems.
Proceedings of the Practice of Enterprise Modeling, 2015

A Framework for Secure Migration Processes of Legacy Systems to the Cloud.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2014
Enterprise security pattern: a new type of security pattern.
Secur. Commun. Networks, 2014

Security in information systems: Advances and new challenges.
Comput. Stand. Interfaces, 2014

Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study.
Proceedings of the WOSIS 2014, 2014

2013
An analysis of security issues for cloud computing.
J. Internet Serv. Appl., 2013

2012
Security in Information Systems: New Challenges and Opportunities.
J. Univers. Comput. Sci., 2012

An Overview of Current Information Systems Security Challenges and Innovations.
J. Univers. Comput. Sci., 2012

Security Analysis in the Migration to Cloud Environments.
Future Internet, 2012

2011
Security services architecture for Secure Mobile Grid Systems.
J. Syst. Archit., 2011

Systematic design of secure Mobile Grid systems.
J. Netw. Comput. Appl., 2011

Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems.
IEICE Trans. Inf. Syst., 2011

2010
Developing a Secure Mobile Grid System through a UML Extension.
J. Univers. Comput. Sci., 2010

Analysis of Secure Mobile Grid Systems: A systematic approach.
Inf. Softw. Technol., 2010

A Study of Security Approaches for the Development of Mobile Grid Systems.
Proceedings of the ICSOFT 2010, 2010

2009
Managing Security and its Maturity in Small and Medium-sized Enterprises.
J. Univers. Comput. Sci., 2009

The practical application of a process for eliciting and designing security in web service systems.
Inf. Softw. Technol., 2009

Obtaining Security Requirements for a Mobile Grid System.
Int. J. Grid High Perform. Comput., 2009

Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services.
J. Res. Pract. Inf. Technol., 2009

Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros.
Proceedings of the XIV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2009), 2009

Reusable security use cases for mobile grid environments.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application.
Proceedings of the Advances in Conceptual Modeling - Challenging Perspectives, 2009

Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros.
Proceedings of the Memorias de la XII Conferencia Iberoamericana de Software Engineering (CIbSE 2009), 2009

2008
Engineering Process Based on Grid Use Cases for Mobile Grid Systems.
Proceedings of the ICSOFT 2008, 2008

PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices.
Proceedings of the The Third International Conference on Availability, 2008

2007
Defining Security Architectural Patterns Based on Viewpoints.
Proceedings of the Computational Science and Its Applications, 2007

2006
Security patterns and requirements for internet-based applications.
Internet Res., 2006

Security Patterns Related to Security Requirements.
Proceedings of the Security in Information Systems, 2006

Defining Viewpoints for Security Architectural Patterns.
Proceedings of the SECRYPT 2006, 2006

A Study of Security Architectural Patterns.
Proceedings of the The First International Conference on Availability, 2006


  Loading...