- Advanced Database Systems and Queries
- Service-Oriented Architecture and Web Services
- Access Control and Trust
- Information and Cyber Security
- Business Process Modeling and Analysis
- Cloud Computing and Resource Management
- Distributed systems and fault tolerance
- Data Quality and Management
- Cloud Data Security Solutions
- Safety Systems Engineering in Autonomy
- Engineering and Information Technology
- E-Learning and Knowledge Management
- Distributed and Parallel Computing Systems
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Semantic Web and Ontologies
- Advanced Software Engineering Methodologies
- Technology in Education and Healthcare
- Software Engineering Research
- Quantum Information and Cryptography
- Model-Driven Software Engineering Techniques
- Scientific Computing and Data Management
- Network Security and Intrusion Detection
- Data Management and Algorithms
- Quantum Computing Algorithms and Architecture
Universidad de Cantabria
2011-2024
University of Buenos Aires
2022
University of Castilla-La Mancha
2008-2022
Software (Spain)
2019
Harvard University Press
2018
World Academy of Art and Science
2017
University of Westminster
2016
Clinica Universidad de Navarra
2012
Universidad Europea
2010
Marqués de Valdecilla University Hospital
1992
Abstract The Information Security Management Systems (ISMS) are global and risk-driven processes that allow companies to develop their cybersecurity strategy by defining security policies, valuable assets, controls, technologies for protecting systems information from threats vulnerabilities. Despite the implementation of such management infrastructures, incidents or breaches happen. Each incident has associated a level severity set mitigation so in order restore ISMS, appropriate controls...
Cyber-physical systems (CPSs) are smart that include engineered interacting networks of physical and computational components. CPSs have an increasingly presence on critical infrastructures impact in almost every aspect our daily life, including transportation, healthcare, electric power, advanced manufacturing. However, face a growing serious security issue due to the widespread connectivity between cyber world world. Although risk assessment methods for traditional IT now very mature,...
In the last years, Cyber-physical systems (CPS) have attracted substantial mainstream, especially in industrial sector, since they become focus of cyber-attacks. CPS are complex that encompass a great variety hardware and software components with countless number configurations features. For this reason, construction, validation, diagnosis security major challenge. An invalid requirement for can produce partial or incomplete configuration, even misconfigurations, hence catastrophic...
Abstract The information society depends increasingly on risk assessment and management systems as means to adequately protect its key assets. availability of these is now vital for the protection evolution companies. However, several factors have led an increasing need more accurate analysis approaches. These are: speed at which technologies evolve, their global impact growing requirement companies collaborate. Risk processes must consequently adapt new circumstances technological...
As the Internet of Things (IoT) becomes more integral across diverse sectors, including healthcare, energy provision and industrial automation, exposure to cyber vulnerabilities potential attacks increases accordingly. Facing these challenges, essential function an Information Security Management System (ISMS) in safeguarding vital information assets comes fore. Within this framework, risk management is key, tasked with responsibility adequately restoring system event a cybersecurity...
This work has been partially supported by the METASIGN project (TIN2004-00779) from Spanish Ministry of Education and Science, Regional Government Valencia, QUASIMODO MISTICO projects Science Technology Castilla-La Mancha (Spain).
Cloud computing offers massive scalability and elasticity required by many scientific commercial applications. Combining the computational data handling capabilities of clouds with parallel processing also has potential to tackle Big Data problems efficiently. Science gateway frameworks workflow systems enable application developers implement complex applications make these available for end-users via simple graphical user interfaces. The integration such tools on cloud opens new...
Appears in: INTED2024 Proceedings Publication year: 2024Page: 6395 (abstract only)ISBN: 978-84-09-59215-9ISSN: 2340-1079doi: 10.21125/inted.2024.1675Conference name: 18th International Technology, Education and Development ConferenceDates: 4-6 March, 2024Location: Valencia, Spain
Data Warehouses (DWs) are currently considered to be the cornerstone of Business Intelligence (BI) systems. Security is a key issue in DWs since business information that they manage crucial and highly sensitive, should carefully protected. However, increasing amount data available on Web signifies more DW systems considering as primary source through which populate their DWs. XML therefore widely accepted being principal means provide easier metadata interchange among heterogeneous sources from
Abstract NoSQL technologies have become a common component in many information systems and software applications. These are focused on performance, enabling scalable processing of large volumes structured unstructured data. Unfortunately, most developments over consider security as an afterthought, putting at risk personal data individuals potentially causing severe economic loses well reputation crisis. In order to avoid these situations, companies require approach that introduces...
Maintaining a high level of animal welfare is essential in zoos, sanctuaries and aquaria for ethical, legislative functional reasons. Therefore, it necessary to have assessment protocols that can be incorporated into daily management programs. Currently, there are different approaches assessing zoos. Those applied multiple species consist checklists or qualitative assessments, with limitations, especially regarding the lack guidance selection interpretation indicators. Validated also exist,...
Data Warehouses (DW) manage historical information for the decision making process and enterprises, it is vitally important to consider security requirements from earliest stages of development process. OLAP tools are most used implementing consulting DWs necessary define measures avoid that users can access unauthorized by executing queries. We have created a MDA architecture developing secure DW in this paper, we will propose how implement defined at upper abstraction levels using our...
The importance of data security is currently increasing owing to the number transactions that are continuously taking place. Large amounts generated, stored, modified and transferred every second, signifying databases require an appropriate capacity, control protection will enable them maintain a secure environment for so much data. Big Data becoming prominent trend in our society, data, including sensitive personal information, being loaded into NoSQL other technologies analysis processing....