Please use this identifier to cite or link to this item:
http://dspace.utpl.edu.ec/handle/123456789/19263
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Abad Espinoza, M. | es_ES |
dc.contributor.author | Jaramillo Hurtado, D. | es_ES |
dc.contributor.author | Cabrera Silva, A. | es_ES |
dc.date.accessioned | 2017-06-16T22:03:14Z | - |
dc.date.available | 2010-07-01 | es_ES |
dc.date.available | 2017-06-16T22:03:14Z | - |
dc.date.submitted | 25/10/2010 | es_ES |
dc.identifier | http://dx.doi.org/10.1109/ICSTE.2010.5608751 | es_ES |
dc.identifier.issn | 9.78E+17 | es_ES |
dc.identifier.other | http://dx.doi.org/10.1109/ICSTE.2010.5608751 | es_ES |
dc.identifier.uri | http://dspace.utpl.edu.ec/handle/123456789/19263 | - |
dc.description.abstract | The development of information systems and their construction must be ever more efficient, they must present a detailed analysis in relation to security. Thus, it must integrate security mechanisms during the stages of analysis and construction, these mechanisms may have a different arrangement according to how they are used. Then the security mechanisms will be integrated according to its nature the information system depending on the architecture defined for this. © 2010 IEEE. | es_ES |
dc.language | Inglés | es_ES |
dc.subject | component | es_ES |
dc.subject | information | es_ES |
dc.subject | mechanisms | es_ES |
dc.subject | security | es_ES |
dc.subject | vulnerabilities | es_ES |
dc.title | Including security mechanisms into systems architecture supporting vulnerabilities | es_ES |
dc.type | Article | es_ES |
dc.publisher | ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings | es_ES |
Appears in Collections: | Artículos de revistas Científicas |
Files in This Item:
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.