Please use this identifier to cite or link to this item: http://dspace.utpl.edu.ec/jspui/handle/123456789/19263
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAbad Espinoza, M.es_ES
dc.contributor.authorJaramillo Hurtado, D.es_ES
dc.contributor.authorCabrera Silva, A.es_ES
dc.date.accessioned2017-06-16T22:03:14Z-
dc.date.available2010-07-01es_ES
dc.date.available2017-06-16T22:03:14Z-
dc.date.submitted25/10/2010es_ES
dc.identifierhttp://dx.doi.org/10.1109/ICSTE.2010.5608751es_ES
dc.identifier.issn9.78E+17es_ES
dc.identifier.otherhttp://dx.doi.org/10.1109/ICSTE.2010.5608751es_ES
dc.identifier.urihttp://dspace.utpl.edu.ec/handle/123456789/19263-
dc.description.abstractThe development of information systems and their construction must be ever more efficient, they must present a detailed analysis in relation to security. Thus, it must integrate security mechanisms during the stages of analysis and construction, these mechanisms may have a different arrangement according to how they are used. Then the security mechanisms will be integrated according to its nature the information system depending on the architecture defined for this. © 2010 IEEE.es_ES
dc.languageIngléses_ES
dc.subjectcomponentes_ES
dc.subjectinformationes_ES
dc.subjectmechanismses_ES
dc.subjectsecurityes_ES
dc.subjectvulnerabilitieses_ES
dc.titleIncluding security mechanisms into systems architecture supporting vulnerabilitieses_ES
dc.typeArticlees_ES
dc.publisherICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedingses_ES
Appears in Collections:Artículos de revistas Científicas



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.