Including security mechanisms into systems architecture supporting vulnerabilities

The development of information systems and their construction must be ever more efficient, they must present a detailed analysis in relation to security. Thus, it must integrate security mechanisms during the stages of analysis and construction, these mechanisms may have a different arrangement acco...

पूर्ण विवरण

में बचाया:
ग्रंथसूची विवरण
मुख्य लेखक: Abad Espinoza, M. (author)
अन्य लेखक: Jaramillo Hurtado, D. (author), Cabrera Silva, A. (author)
स्वरूप: article
प्रकाशित: 2010
विषय:
ऑनलाइन पहुंच:http://dx.doi.org/10.1109/ICSTE.2010.5608751
http://dspace.utpl.edu.ec/handle/123456789/19263
टैग: टैग जोड़ें
कोई टैग नहीं, इस रिकॉर्ड को टैग करने वाले पहले व्यक्ति बनें!
_version_ 1858999311323365376
author Abad Espinoza, M.
author2 Jaramillo Hurtado, D.
Cabrera Silva, A.
author2_role author
author
author_facet Abad Espinoza, M.
Jaramillo Hurtado, D.
Cabrera Silva, A.
author_role author
collection Repositorio Universidad Técnica Particular de Loja
dc.creator.none.fl_str_mv Abad Espinoza, M.
Jaramillo Hurtado, D.
Cabrera Silva, A.
dc.date.none.fl_str_mv 2010-07-01
2017-06-16T22:03:14Z
2017-06-16T22:03:14Z
25/10/2010
dc.identifier.none.fl_str_mv http://dx.doi.org/10.1109/ICSTE.2010.5608751
9.78E+17
http://dx.doi.org/10.1109/ICSTE.2010.5608751
http://dspace.utpl.edu.ec/handle/123456789/19263
dc.language.none.fl_str_mv Inglés
dc.publisher.none.fl_str_mv ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:Repositorio Universidad Técnica Particular de Loja
instname:Universidad Técnica Particular de Loja
instacron:UTPL
dc.subject.none.fl_str_mv component
information
mechanisms
security
vulnerabilities
dc.title.none.fl_str_mv Including security mechanisms into systems architecture supporting vulnerabilities
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/article
description The development of information systems and their construction must be ever more efficient, they must present a detailed analysis in relation to security. Thus, it must integrate security mechanisms during the stages of analysis and construction, these mechanisms may have a different arrangement according to how they are used. Then the security mechanisms will be integrated according to its nature the information system depending on the architecture defined for this. © 2010 IEEE.
eu_rights_str_mv openAccess
format article
id UTPL_e1d8c4a832a390c80922da0ff3696df7
identifier_str_mv 9.78E+17
instacron_str UTPL
institution UTPL
instname_str Universidad Técnica Particular de Loja
language_invalid_str_mv Inglés
network_acronym_str UTPL
network_name_str Repositorio Universidad Técnica Particular de Loja
oai_identifier_str oai:dspace.utpl.edu.ec:123456789/19263
publishDate 2010
publisher.none.fl_str_mv ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings
reponame_str Repositorio Universidad Técnica Particular de Loja
repository.mail.fl_str_mv .
repository.name.fl_str_mv Repositorio Universidad Técnica Particular de Loja - Universidad Técnica Particular de Loja
repository_id_str 1227
spelling Including security mechanisms into systems architecture supporting vulnerabilitiesAbad Espinoza, M.Jaramillo Hurtado, D.Cabrera Silva, A.componentinformationmechanismssecurityvulnerabilitiesThe development of information systems and their construction must be ever more efficient, they must present a detailed analysis in relation to security. Thus, it must integrate security mechanisms during the stages of analysis and construction, these mechanisms may have a different arrangement according to how they are used. Then the security mechanisms will be integrated according to its nature the information system depending on the architecture defined for this. © 2010 IEEE.ICSTE 2010 - 2010 2nd International Conference on Software Technology and Engineering, Proceedings2017-06-16T22:03:14Z2010-07-012017-06-16T22:03:14Z25/10/2010info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articlehttp://dx.doi.org/10.1109/ICSTE.2010.56087519.78E+17http://dx.doi.org/10.1109/ICSTE.2010.5608751http://dspace.utpl.edu.ec/handle/123456789/19263Inglésinfo:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica Particular de Lojainstname:Universidad Técnica Particular de Lojainstacron:UTPL2017-06-16T22:03:14Zoai:dspace.utpl.edu.ec:123456789/19263Institucionalhttps://dspace.utpl.edu.ec/Institución privadahttps://www.utpl.edu.ec/https://dspace.utpl.edu.ec/oai.Ecuador...opendoar:12272017-06-16T22:03:14Repositorio Universidad Técnica Particular de Loja - Universidad Técnica Particular de Lojafalse
spellingShingle Including security mechanisms into systems architecture supporting vulnerabilities
Abad Espinoza, M.
component
information
mechanisms
security
vulnerabilities
status_str publishedVersion
title Including security mechanisms into systems architecture supporting vulnerabilities
title_full Including security mechanisms into systems architecture supporting vulnerabilities
title_fullStr Including security mechanisms into systems architecture supporting vulnerabilities
title_full_unstemmed Including security mechanisms into systems architecture supporting vulnerabilities
title_short Including security mechanisms into systems architecture supporting vulnerabilities
title_sort Including security mechanisms into systems architecture supporting vulnerabilities
topic component
information
mechanisms
security
vulnerabilities
url http://dx.doi.org/10.1109/ICSTE.2010.5608751
http://dspace.utpl.edu.ec/handle/123456789/19263