Carlos Blanco

ORCID: 0000-0001-9001-0904
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Database Systems and Queries
  • Service-Oriented Architecture and Web Services
  • Access Control and Trust
  • Information and Cyber Security
  • Business Process Modeling and Analysis
  • Cloud Computing and Resource Management
  • Distributed systems and fault tolerance
  • Data Quality and Management
  • Cloud Data Security Solutions
  • Safety Systems Engineering in Autonomy
  • Engineering and Information Technology
  • E-Learning and Knowledge Management
  • Distributed and Parallel Computing Systems
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Semantic Web and Ontologies
  • Advanced Software Engineering Methodologies
  • Technology in Education and Healthcare
  • Software Engineering Research
  • Quantum Information and Cryptography
  • Model-Driven Software Engineering Techniques
  • Scientific Computing and Data Management
  • Network Security and Intrusion Detection
  • Data Management and Algorithms
  • Quantum Computing Algorithms and Architecture

Universidad de Cantabria
2011-2024

University of Buenos Aires
2022

University of Castilla-La Mancha
2008-2022

Software (Spain)
2019

Harvard University Press
2018

World Academy of Art and Science
2017

University of Westminster
2016

Clinica Universidad de Navarra
2012

Universidad Europea
2010

Marqués de Valdecilla University Hospital
1992

Abstract The Information Security Management Systems (ISMS) are global and risk-driven processes that allow companies to develop their cybersecurity strategy by defining security policies, valuable assets, controls, technologies for protecting systems information from threats vulnerabilities. Despite the implementation of such management infrastructures, incidents or breaches happen. Each incident has associated a level severity set mitigation so in order restore ISMS, appropriate controls...

10.1007/s11219-023-09632-6 article EN cc-by Software Quality Journal 2023-05-26

Cyber-physical systems (CPSs) are smart that include engineered interacting networks of physical and computational components. CPSs have an increasingly presence on critical infrastructures impact in almost every aspect our daily life, including transportation, healthcare, electric power, advanced manufacturing. However, face a growing serious security issue due to the widespread connectivity between cyber world world. Although risk assessment methods for traditional IT now very mature,...

10.1016/j.compind.2022.103715 article EN cc-by-nc-nd Computers in Industry 2022-06-20

In the last years, Cyber-physical systems (CPS) have attracted substantial mainstream, especially in industrial sector, since they become focus of cyber-attacks. CPS are complex that encompass a great variety hardware and software components with countless number configurations features. For this reason, construction, validation, diagnosis security major challenge. An invalid requirement for can produce partial or incomplete configuration, even misconfigurations, hence catastrophic...

10.1016/j.iot.2023.100989 article EN cc-by-nc Internet of Things 2023-11-15

Abstract The information society depends increasingly on risk assessment and management systems as means to adequately protect its key assets. availability of these is now vital for the protection evolution companies. However, several factors have led an increasing need more accurate analysis approaches. These are: speed at which technologies evolve, their global impact growing requirement companies collaborate. Risk processes must consequently adapt new circumstances technological...

10.1007/s11704-023-1582-6 article EN cc-by Frontiers of Computer Science 2023-11-25

As the Internet of Things (IoT) becomes more integral across diverse sectors, including healthcare, energy provision and industrial automation, exposure to cyber vulnerabilities potential attacks increases accordingly. Facing these challenges, essential function an Information Security Management System (ISMS) in safeguarding vital information assets comes fore. Within this framework, risk management is key, tasked with responsibility adequately restoring system event a cybersecurity...

10.3390/info15040181 article EN cc-by Information 2024-03-27

This work has been partially supported by the METASIGN project (TIN2004-00779) from Spanish Ministry of Education and Science, Regional Government Valencia, QUASIMODO MISTICO projects Science Technology Castilla-La Mancha (Spain).

10.3217/jucs-015-08-1607 article EN cc-by Zenodo (CERN European Organization for Nuclear Research) 2009-04-28

Cloud computing offers massive scalability and elasticity required by many scientific commercial applications. Combining the computational data handling capabilities of clouds with parallel processing also has potential to tackle Big Data problems efficiently. Science gateway frameworks workflow systems enable application developers implement complex applications make these available for end-users via simple graphical user interfaces. The integration such tools on cloud opens new...

10.1007/s10723-016-9369-8 article EN cc-by Journal of Grid Computing 2016-06-13

Appears in: INTED2024 Proceedings Publication year: 2024Page: 6395 (abstract only)ISBN: 978-84-09-59215-9ISSN: 2340-1079doi: 10.21125/inted.2024.1675Conference name: 18th International Technology, Education and Development ConferenceDates: 4-6 March, 2024Location: Valencia, Spain

10.21125/inted.2024.1675 article EN INTED proceedings 2024-03-01

Data Warehouses (DWs) are currently considered to be the cornerstone of Business Intelligence (BI) systems. Security is a key issue in DWs since business information that they manage crucial and highly sensitive, should carefully protected. However, increasing amount data available on Web signifies more DW systems considering as primary source through which populate their DWs. XML therefore widely accepted being principal means provide easier metadata interchange among heterogeneous sources from

10.1145/1754239.1754251 article EN 2010-03-22

Abstract NoSQL technologies have become a common component in many information systems and software applications. These are focused on performance, enabling scalable processing of large volumes structured unstructured data. Unfortunately, most developments over consider security as an afterthought, putting at risk personal data individuals potentially causing severe economic loses well reputation crisis. In order to avoid these situations, companies require approach that introduces...

10.1007/s10115-021-01589-x article EN cc-by Knowledge and Information Systems 2021-07-13

Maintaining a high level of animal welfare is essential in zoos, sanctuaries and aquaria for ethical, legislative functional reasons. Therefore, it necessary to have assessment protocols that can be incorporated into daily management programs. Currently, there are different approaches assessing zoos. Those applied multiple species consist checklists or qualitative assessments, with limitations, especially regarding the lack guidance selection interpretation indicators. Validated also exist,...

10.3389/fvets.2022.1033821 article EN cc-by Frontiers in Veterinary Science 2022-12-08

Data Warehouses (DW) manage historical information for the decision making process and enterprises, it is vitally important to consider security requirements from earliest stages of development process. OLAP tools are most used implementing consulting DWs necessary define measures avoid that users can access unauthorized by executing queries. We have created a MDA architecture developing secure DW in this paper, we will propose how implement defined at upper abstraction levels using our...

10.1109/ares.2008.179 article EN 2008-03-01

The importance of data security is currently increasing owing to the number transactions that are continuously taking place. Large amounts generated, stored, modified and transferred every second, signifying databases require an appropriate capacity, control protection will enable them maintain a secure environment for so much data. Big Data becoming prominent trend in our society, data, including sensitive personal information, being loaded into NoSQL other technologies analysis processing....

10.1016/j.jisa.2022.103120 article EN cc-by-nc-nd Journal of Information Security and Applications 2022-02-02
Coming Soon ...