Including security mechanisms into systems architecture supporting vulnerabilities
The development of information systems and their construction must be ever more efficient, they must present a detailed analysis in relation to security. Thus, it must integrate security mechanisms during the stages of analysis and construction, these mechanisms may have a different arrangement acco...
Gorde:
| Egile nagusia: | |
|---|---|
| Beste egile batzuk: | , |
| Formatua: | article |
| Argitaratua: |
2010
|
| Gaiak: | |
| Sarrera elektronikoa: | http://dx.doi.org/10.1109/ICSTE.2010.5608751 http://dspace.utpl.edu.ec/handle/123456789/19263 |
| Etiketak: |
Etiketa erantsi
Etiketarik gabe, Izan zaitez lehena erregistro honi etiketa jartzen!
|
| _version_ | 1858999311323365376 |
|---|---|
| author | Abad Espinoza, M. |
| author2 | Jaramillo Hurtado, D. Cabrera Silva, A. |
| author2_role | author author |
| author_facet | Abad Espinoza, M. Jaramillo Hurtado, D. Cabrera Silva, A. |
| author_role | author |
| collection | Repositorio Universidad Técnica Particular de Loja |
| dc.creator.none.fl_str_mv | Abad Espinoza, M. Jaramillo Hurtado, D. Cabrera Silva, A. |
| dc.date.none.fl_str_mv | 2010-07-01 2017-06-16T22:03:14Z 2017-06-16T22:03:14Z 25/10/2010 |
| dc.identifier.none.fl_str_mv | http://dx.doi.org/10.1109/ICSTE.2010.5608751 9.78E+17 http://dx.doi.org/10.1109/ICSTE.2010.5608751 http://dspace.utpl.edu.ec/handle/123456789/19263 |
| dc.language.none.fl_str_mv | Inglés |
| dc.publisher.none.fl_str_mv | ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings |
| dc.rights.none.fl_str_mv | info:eu-repo/semantics/openAccess |
| dc.source.none.fl_str_mv | reponame:Repositorio Universidad Técnica Particular de Loja instname:Universidad Técnica Particular de Loja instacron:UTPL |
| dc.subject.none.fl_str_mv | component information mechanisms security vulnerabilities |
| dc.title.none.fl_str_mv | Including security mechanisms into systems architecture supporting vulnerabilities |
| dc.type.none.fl_str_mv | info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/article |
| description | The development of information systems and their construction must be ever more efficient, they must present a detailed analysis in relation to security. Thus, it must integrate security mechanisms during the stages of analysis and construction, these mechanisms may have a different arrangement according to how they are used. Then the security mechanisms will be integrated according to its nature the information system depending on the architecture defined for this. © 2010 IEEE. |
| eu_rights_str_mv | openAccess |
| format | article |
| id | UTPL_e1d8c4a832a390c80922da0ff3696df7 |
| identifier_str_mv | 9.78E+17 |
| instacron_str | UTPL |
| institution | UTPL |
| instname_str | Universidad Técnica Particular de Loja |
| language_invalid_str_mv | Inglés |
| network_acronym_str | UTPL |
| network_name_str | Repositorio Universidad Técnica Particular de Loja |
| oai_identifier_str | oai:dspace.utpl.edu.ec:123456789/19263 |
| publishDate | 2010 |
| publisher.none.fl_str_mv | ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings |
| reponame_str | Repositorio Universidad Técnica Particular de Loja |
| repository.mail.fl_str_mv | . |
| repository.name.fl_str_mv | Repositorio Universidad Técnica Particular de Loja - Universidad Técnica Particular de Loja |
| repository_id_str | 1227 |
| spelling | Including security mechanisms into systems architecture supporting vulnerabilitiesAbad Espinoza, M.Jaramillo Hurtado, D.Cabrera Silva, A.componentinformationmechanismssecurityvulnerabilitiesThe development of information systems and their construction must be ever more efficient, they must present a detailed analysis in relation to security. Thus, it must integrate security mechanisms during the stages of analysis and construction, these mechanisms may have a different arrangement according to how they are used. Then the security mechanisms will be integrated according to its nature the information system depending on the architecture defined for this. © 2010 IEEE.ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings2017-06-16T22:03:14Z2010-07-012017-06-16T22:03:14Z25/10/2010info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articlehttp://dx.doi.org/10.1109/ICSTE.2010.56087519.78E+17http://dx.doi.org/10.1109/ICSTE.2010.5608751http://dspace.utpl.edu.ec/handle/123456789/19263Inglésinfo:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica Particular de Lojainstname:Universidad Técnica Particular de Lojainstacron:UTPL2017-06-16T22:03:14Zoai:dspace.utpl.edu.ec:123456789/19263Institucionalhttps://dspace.utpl.edu.ec/Institución privadahttps://www.utpl.edu.ec/https://dspace.utpl.edu.ec/oai.Ecuador...opendoar:12272017-06-16T22:03:14Repositorio Universidad Técnica Particular de Loja - Universidad Técnica Particular de Lojafalse |
| spellingShingle | Including security mechanisms into systems architecture supporting vulnerabilities Abad Espinoza, M. component information mechanisms security vulnerabilities |
| status_str | publishedVersion |
| title | Including security mechanisms into systems architecture supporting vulnerabilities |
| title_full | Including security mechanisms into systems architecture supporting vulnerabilities |
| title_fullStr | Including security mechanisms into systems architecture supporting vulnerabilities |
| title_full_unstemmed | Including security mechanisms into systems architecture supporting vulnerabilities |
| title_short | Including security mechanisms into systems architecture supporting vulnerabilities |
| title_sort | Including security mechanisms into systems architecture supporting vulnerabilities |
| topic | component information mechanisms security vulnerabilities |
| url | http://dx.doi.org/10.1109/ICSTE.2010.5608751 http://dspace.utpl.edu.ec/handle/123456789/19263 |