Libros y capítulos de libro
URI permanente para esta colección
Examinar
Examinando Libros y capítulos de libro por browse.metadata.publiauthor "ALFONSO ENRIQUE RODRÍGUEZ RÍOS"
Mostrando 1 - 3 de 3
Resultados por página
Opciones de ordenación
- PublicaciónDEVELOPING SECURE BUSINESS PROCESSES: A MODEL DRIVEN APPROACH(PRIVACY PROTECTION MEASURES AND TECHNOLOGIES IN BUSINESS ORGANIZATIONS: ASPECTS AND STNDARDS, 2012)ALFONSO ENRIQUE RODRÍGUEZ RÍOSBUSINESS PROCESSES ARE VALUABLE RESOURCES FOR ENTERPRISES TO MAINTAIN THEIR COMPETITIVENESS. THEY ARE CHARACTERIZED BY DESCRIBING THE SET OF ACTIVITIES THAT ENTERPRISES PERFORM TO REACH THEIR OBJECTIVES. ON THE OTHER HAND, SECURITY IS ALSO AN ESSENTIAL ELEMENT IN CURRENT COMPETITIVENESS. ENTERPRISES INVEST RESOURCES IN KEEPING THEIR ASSETS PROTECTED AND WORRY ABOUT MAINTAINING THEIR CUSTOMERS TRUST. IN THIS WAY, ASPECTS SUCH AS CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY ARE IMPORTANT IN RELATION TO ENTERPRISE ACTIVITIES. IN THIS WORK, WE WILL DEFINE BUSINESS PROCESSES THAT INCORPORATE THE VIEWPOINT OF THE BUSINESS ANALYST REGARDING SECURITY. THE RESULT IS A SECURE BUSINESS PROCESS MODEL THAT IS USED FOR SOFTWARE CREATION UNDER A MODEL-DRIVEN APPROACH. IN THIS WORK, WE WILL SHOW THE MAIN ASPECTS OF THIS PROPOSAL, TAKING INTO CONSIDERATION A CASE STUDY THAT ALLOWS US TO SHOW ITS APPLICABILITY.
- PublicaciónENTERPRISE ARCHITECTURES IN THE LOCAL E-GOVERNMENT CONTEXT: A SYSTEMATIC LITERATURE MAPPING(E-GOVERNMENT PERSPECTIVES, CHALLENGES AND OPPORTUNITIES_, 2020)
;MARÍA ANGÉLICA CARO GUTIÉRREZALFONSO ENRIQUE RODRÍGUEZ RÍOS - PublicaciónMULTIFACTOR AUTHENTICATION METHODS: A FRAMEWORK FOR THEIR COMPARISON AND SELECTION(COMPUTER AND NETWORD SECURITY, 2019)
;MARÍA ANGÉLICA CARO GUTIÉRREZALFONSO ENRIQUE RODRÍGUEZ RÍOSTHERE ARE MULTIPLE TECHNIQUES FOR USERS TO AUTHENTICATE THEMSELVES IN SOFTWARE APPLICATIONS, SUCH AS TEXT PASSWORDS, SMART CARDS, AND BIOMETRICS. TWO OR MORE OF THESE TECHNIQUES CAN BE COMBINED TO INCREASE SECURITY, WHICH IS KNOWN AS MULTIFACTOR AUTHENTICATION. SYSTEMS COMMONLY UTILIZE AUTHENTICATION AS PART OF THEIR ACCESS CONTROL WITH THE OBJECTIVE OF PROTECTING THE INFORMATION STORED WITHIN THEM. HOWEVER, THE DECISION OF WHAT AUTHENTICATION TECHNIQUE TO IMPLEMENT IN A SYSTEM IS OFTEN TAKEN BY THE SOFTWARE DEVELOPMENT TEAM IN CHARGE OF IT. A POOR DECISION DURING THIS STEP COULD LEAD TO A FATAL MISTAKE IN RELATION TO SECURITY, CREATING THE NECESSITY FOR A METHOD THAT SYSTEMATIZES THIS TASK. THUS, THIS BOOK CHAPTER PRESENTS A THEORETICAL DECISION FRAMEWORK THAT TACKLES THIS ISSUE BY PROVIDING GUIDELINES BASED ON THE EVALUATED APPLICATION?S CHARACTERISTICS AND TARGET CONTEXT. THESE GUIDELINES WERE DEFINED THROUGH THE APPLICATION OF AN EXTENSIVE ACTION-RESEARCH METHODOLOGY IN COLLABORATION WITH EXPERTS FROM A MULTINATIONAL SOFTWARE DEVELOPMENT COMPANY.