Publicacions en què col·labora amb Mario G. Piattini Velthuis (57)

2016

  1. Empowering global software development with business intelligence

    Information and Software Technology, Vol. 76, pp. 81-91

2011

  1. Secure business process model specification through a UML 2.0 activity diagram profile

    Decision Support Systems, Vol. 51, Núm. 3, pp. 446-465

2010

  1. An MDA compliant approach for designing secure data warehouses

    Web Services Security Development and Architecture: Theoretical and Practical Issues (IGI Global), pp. 261-272

  2. Defining and transforming security rules in an MDA approach for DWs

    International Journal of Business Intelligence and Data Mining, Vol. 5, Núm. 2, pp. 116-133

  3. Security over the information systems development cycle

    Software Engineering for Secure Systems: Industrial and Research Perspectives (IGI Global), pp. 113-154

2009

  1. A UML 2.0 profile to define security requirements for Data Warehouses

    Computer Standards and Interfaces, Vol. 31, Núm. 5, pp. 969-983

  2. An engineering process for developing Secure Data Warehouses

    Information and Software Technology, Vol. 51, Núm. 6, pp. 1033-1051

  3. Applying an MDA-based approach to consider security rules in the development of secure DWs

    Proceedings - International Conference on Availability, Reliability and Security, ARES 2009

  4. Including security rules support in an MDA approach for secure DWs

    Proceedings - International Conference on Availability, Reliability and Security, ARES 2009

2008

  1. An MDA compliant approach for designing secure data warehouses

    Handbook of Research on Information Security and Assurance (IGI Global), pp. 495-503

  2. Automatic generation of secure multidimensional code for Data Warehouses by using QVT transformations: An MDA approach

    CEUR Workshop Proceedings

  3. Automatic generation of secure multidimensional code for data warehouses: An MDA approach

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  4. Building a secure star schema in data warehouses by an extension of the relational package from CWM

    Computer Standards and Interfaces, Vol. 30, Núm. 6, pp. 341-350

  5. Designing secure data warehouses

    Selected Readings on Database Technologies and Applications (IGI Global), pp. 134-147

  6. How to implement multidimensional security into OLAP tools

    International Journal of Business Intelligence and Data Mining, Vol. 3, Núm. 3, pp. 255-276

  7. Implementing multidimensional security into OLAP tools

    ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings

  8. JISBD2007-05: Secure business processes defined through a UML 2.0 extension

    IEEE Latin America Transactions

  9. JISBD2007-07: An extension of the relational metamodel of CWM to represent secure data warehouses at the logical level

    IEEE Latin America Transactions

  10. Modelado de requisitos de seguridad para almacenes de datos

    Memorias de la 11th Conferencia Iberoamericana de Software Engineering - CIbSE 2008

  11. Obtaining secure code in SQL Server Analysis Services by using MDA and QVT

    WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS