se ha leído el artículo
array:24 [ "pii" => "S1697791213000940" "issn" => "16977912" "doi" => "10.1016/j.riai.2013.11.006" "estado" => "S300" "fechaPublicacion" => "2014-01-01" "aid" => "155" "copyright" => "EA" "copyrightAnyo" => "2012" "documento" => "article" "crossmark" => 0 "licencia" => "http://creativecommons.org/licenses/by-nc-nd/3.0/" "subdocumento" => "fla" "cita" => "Revista Iberoamericana de Automática e Informática industrial. 2014;11:86-97" "abierto" => array:3 [ "ES" => true "ES2" => true "LATM" => true ] "gratuito" => true "lecturas" => array:2 [ "total" => 2136 "formatos" => array:3 [ "EPUB" => 27 "HTML" => 1574 "PDF" => 535 ] ] "itemSiguiente" => array:19 [ "pii" => "S1697791213000952" "issn" => "16977912" "doi" => "10.1016/j.riai.2013.11.007" "estado" => "S300" "fechaPublicacion" => "2014-01-01" "aid" => "156" "copyright" => "EA" "documento" => "article" "crossmark" => 0 "licencia" => "http://creativecommons.org/licenses/by-nc-nd/3.0/" "subdocumento" => "fla" "cita" => "Revista Iberoamericana de Automática e Informática industrial. 2014;11:98-108" "abierto" => array:3 [ "ES" => true "ES2" => true "LATM" => true ] "gratuito" => true "lecturas" => array:2 [ "total" => 1549 "formatos" => array:3 [ "EPUB" => 31 "HTML" => 1001 "PDF" => 517 ] ] "es" => array:11 [ "idiomaDefecto" => true "titulo" => "Marco de Componentes con soporte para reemplazo dinámico y seguro en sistemas de tiempo real" "tienePdf" => "es" "tieneTextoCompleto" => "es" "tieneResumen" => array:2 [ 0 => "es" 1 => "en" ] "paginas" => array:1 [ 0 => array:2 [ "paginaInicial" => "98" "paginaFinal" => "108" ] ] "titulosAlternativos" => array:1 [ "en" => array:1 [ "titulo" => "Component Framework for supporting safe and dynamic replacement in real-time systems" ] ] "contieneResumen" => array:2 [ "es" => true "en" => true ] "contieneTextoCompleto" => array:1 [ "es" => true ] "contienePdf" => array:1 [ "es" => true ] "autores" => array:1 [ 0 => array:2 [ "autoresLista" => "Julio Cano, Marisol García-Valls, Pablo Basanta-Val" "autores" => array:3 [ 0 => array:2 [ "nombre" => "Julio" "apellidos" => "Cano" ] 1 => array:2 [ "nombre" => "Marisol" "apellidos" => "García-Valls" ] 2 => array:2 [ "nombre" => "Pablo" "apellidos" => "Basanta-Val" ] ] ] ] ] "idiomaDefecto" => "es" "EPUB" => "https://multimedia.elsevier.es/PublicationsMultimediaV1/item/epub/S1697791213000952?idApp=UINPBA00004N" "url" => "/16977912/0000001100000001/v1_201401040117/S1697791213000952/v1_201401040117/es/main.assets" ] "itemAnterior" => array:19 [ "pii" => "S1697791213000939" "issn" => "16977912" "doi" => "10.1016/j.riai.2013.11.005" "estado" => "S300" "fechaPublicacion" => "2014-01-01" "aid" => "154" "copyright" => "EA" "documento" => "article" "crossmark" => 0 "licencia" => "http://creativecommons.org/licenses/by-nc-nd/3.0/" "subdocumento" => "fla" "cita" => "Revista Iberoamericana de Automática e Informática industrial. 2014;11:80-5" "abierto" => array:3 [ "ES" => true "ES2" => true "LATM" => true ] "gratuito" => true "lecturas" => array:2 [ "total" => 2099 "formatos" => array:3 [ "EPUB" => 24 "HTML" => 1259 "PDF" => 816 ] ] "es" => array:11 [ "idiomaDefecto" => true "titulo" => "Un enfoque probabilístico en la autorreparación de redes G-PON" "tienePdf" => "es" "tieneTextoCompleto" => "es" "tieneResumen" => array:2 [ 0 => "es" 1 => "en" ] "paginas" => array:1 [ 0 => array:2 [ "paginaInicial" => "80" "paginaFinal" => "85" ] ] "titulosAlternativos" => array:1 [ "en" => array:1 [ "titulo" => "A probabilistic approach to G-PON self healing" ] ] "contieneResumen" => array:2 [ "es" => true "en" => true ] "contieneTextoCompleto" => array:1 [ "es" => true ] "contienePdf" => array:1 [ "es" => true ] "autores" => array:1 [ 0 => array:2 [ "autoresLista" => "J. García-Algarra, J. González-Ordás, P. Arozarena, R. Afonso, Á. Carrera" "autores" => array:5 [ 0 => array:2 [ "nombre" => "J." "apellidos" => "García-Algarra" ] 1 => array:2 [ "nombre" => "J." "apellidos" => "González-Ordás" ] 2 => array:2 [ "nombre" => "P." "apellidos" => "Arozarena" ] 3 => array:2 [ "nombre" => "R." "apellidos" => "Afonso" ] 4 => array:2 [ "nombre" => "Á." "apellidos" => "Carrera" ] ] ] ] ] "idiomaDefecto" => "es" "EPUB" => "https://multimedia.elsevier.es/PublicationsMultimediaV1/item/epub/S1697791213000939?idApp=UINPBA00004N" "url" => "/16977912/0000001100000001/v1_201401040117/S1697791213000939/v1_201401040117/es/main.assets" ] "es" => array:16 [ "idiomaDefecto" => true "titulo" => "Estrategia Guiada por Modelos para incluir Aspectos de Seguridad en Sistemas Empotrados Basados en Servicios Web" "tieneTextoCompleto" => true "paginas" => array:1 [ 0 => array:2 [ "paginaInicial" => "86" "paginaFinal" => "97" ] ] "autores" => array:1 [ 0 => array:4 [ "autoresLista" => "Juan Pedro Silva Gallino, Miguel de Miguel, Javier F. Briones, Alejandro Alonso" "autores" => array:4 [ 0 => array:4 [ "nombre" => "Juan Pedro Silva" "apellidos" => "Gallino" "email" => array:1 [ 0 => "psilva@dit.upm.es" ] "referencia" => array:1 [ 0 => array:2 [ "etiqueta" => "<span class="elsevierStyleSup">¿</span>" "identificador" => "cor0005" ] ] ] 1 => array:3 [ "nombre" => "Miguel" "apellidos" => "de Miguel" "email" => array:1 [ 0 => "mmiguel@dit.upm.es" ] ] 2 => array:3 [ "nombre" => "Javier F." "apellidos" => "Briones" "email" => array:1 [ 0 => "jfbriones@dit.upm.es" ] ] 3 => array:3 [ "nombre" => "Alejandro" "apellidos" => "Alonso" "email" => array:1 [ 0 => "aalonso@dit.upm.es" ] ] ] "afiliaciones" => array:1 [ 0 => array:2 [ "entidad" => "ETSI de Telecomunicacio’n, Universidad Polite’cnica de Madrid (UPM), Avenida Complutense s/n, 28040 Madrid, Spain" "identificador" => "aff0005" ] ] "correspondencia" => array:1 [ 0 => array:3 [ "identificador" => "cor0005" "etiqueta" => "⁎" "correspondencia" => "Autor para correspondencia." ] ] ] ] "titulosAlternativos" => array:1 [ "en" => array:1 [ "titulo" => "A Model-Driven Strategy for Including Security Aspects in Web Services-Based Embedded Services" ] ] "textoCompleto" => "<span class="elsevierStyleSections"><span id="sec0005" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0025">Referencias no citadas</span><p id="par0005" class="elsevierStylePara elsevierViewall"><a class="elsevierStyleCrossRef" href="#bib0005">Asnar et al., 2009</a>, <a class="elsevierStyleCrossRef" href="#bib0010">Blet and Simo’n, 2011</a>, <a class="elsevierStyleCrossRef" href="#bib0015">CDTI, 2006</a>, <a class="elsevierStyleCrossRef" href="#bib0020">Chung et al., 2000</a>, <a class="elsevierStyleCrossRef" href="#bib0025">de Miguel et al., 2008</a>, <a class="elsevierStyleCrossRef" href="#bib0030">Didonet del Fabro et al., 2005</a>, <a class="elsevierStyleCrossRef" href="#bib0035">Dodd et al., 2007</a>, <a class="elsevierStyleCrossRef" href="#bib0040">Eby, 2007</a>, <a class="elsevierStyleCrossRef" href="#bib0045">Elrad et al., 2002</a>, <a class="elsevierStyleCrossRef" href="#bib0050">Guinard et al., 2011</a>, <a class="elsevierStyleCrossRef" href="#bib0055">Hernandez et al., 2009</a>, <a class="elsevierStyleCrossRef" href="#bib0060">Illner et al., 2006</a>, <a class="elsevierStyleCrossRef" href="#bib0065">Illner et al., 2005</a>, <a class="elsevierStyleCrossRef" href="#bib0070">ISO/IEC, 2011</a>, <a class="elsevierStyleCrossRef" href="#bib0075">Kim et al., 2007</a>, <a class="elsevierStyleCrossRef" href="#bib0080">Langer et al., 2011</a>, <a class="elsevierStyleCrossRef" href="#bib0085">Meiko Jensen and Sven Feja, 2009</a>, <a class="elsevierStyleCrossRef" href="#bib0090">Menzel and Meinel, 2009</a>, <a class="elsevierStyleCrossRef" href="#bib0095">Microsoft, 2012a</a>, <a class="elsevierStyleCrossRef" href="#bib0100">Microsoft, 2012b</a>, <a class="elsevierStyleCrossRef" href="#bib0105">Mouelhi et al., 2010</a>, <a class="elsevierStyleCrossRef" href="#bib0110">Nabil and Mohamed, 2012</a>, <a class="elsevierStyleCrossRef" href="#bib0115">OASIS, 2006</a>, <a class="elsevierStyleCrossRef" href="#bib0120">OASIS, 2009</a>, <a class="elsevierStyleCrossRef" href="#bib0125">OMG, 2007</a>, <a class="elsevierStyleCrossRef" href="#bib0130">OMG, 2008</a>, <a class="elsevierStyleCrossRef" href="#bib0135">OMG, 2009</a>, <a class="elsevierStyleCrossRef" href="#bib0140">OMG, 2011</a>, <a class="elsevierStyleCrossRef" href="#bib0145">Ortiz and Herna’ndez, 2006</a>, <a class="elsevierStyleCrossRef" href="#bib0150">Satoh et al., 2008</a>, <a class="elsevierStyleCrossRef" href="#bib0155">Shopov et al., 2007</a>, <a class="elsevierStyleCrossRef" href="#bib0160">Silva Gallino et al., 2010</a>, <a class="elsevierStyleCrossRef" href="#bib0165">Silva Gallino et al., 2011b</a>, <a class="elsevierStyleCrossRef" href="#bib0170">Silva Gallino et al., 2011a</a>, <a class="elsevierStyleCrossRef" href="#bib0175">SOA4D, 2007</a>, <a class="elsevierStyleCrossRef" href="#bib0180">Tarr et al., 1999</a>, <a class="elsevierStyleCrossRef" href="#bib0185">Theorin et al., 2012</a>, <a class="elsevierStyleCrossRef" href="#bib0190">Unger et al., 2012</a>, <a class="elsevierStyleCrossRef" href="#bib0195">Wada et al., 2008</a> and <a class="elsevierStyleCrossRef" href="#bib0200">WS4D, 2007</a>.</p></span></span>" "textoCompletoSecciones" => array:1 [ "secciones" => array:6 [ 0 => array:2 [ "identificador" => "xres302431" "titulo" => "Resumen" ] 1 => array:2 [ "identificador" => "xpalclavsec285451" "titulo" => "Palabras clave" ] 2 => array:2 [ "identificador" => "xres302430" "titulo" => "Abstract" ] 3 => array:2 [ "identificador" => "xpalclavsec285452" "titulo" => "Keywords" ] 4 => array:2 [ "identificador" => "sec0005" "titulo" => "Referencias no citadas" ] 5 => array:1 [ "titulo" => "Referencias" ] ] ] "pdfFichero" => "main.pdf" "tienePdf" => true "fechaRecibido" => "2012-09-07" "fechaAceptado" => "2013-11-07" "PalabrasClave" => array:2 [ "es" => array:1 [ 0 => array:4 [ "clase" => "keyword" "titulo" => "Palabras clave" "identificador" => "xpalclavsec285451" "palabras" => array:4 [ 0 => "Desarrollo Guiado por Modelos" 1 => "Perfil de Dispositivos para Servicios Web" 2 => "Pol’ıticas de Servicios Web" 3 => "Seguridad en Servicios Web" ] ] ] "en" => array:1 [ 0 => array:4 [ "clase" => "keyword" "titulo" => "Keywords" "identificador" => "xpalclavsec285452" "palabras" => array:3 [ 0 => "MDD DPWS" 1 => "WS-Policy" 2 => "WS-SecurityPolicy" ] ] ] ] "tieneResumen" => true "resumen" => array:2 [ "es" => array:2 [ "titulo" => "Resumen" "resumen" => "<p id="spar0005" class="elsevierStyleSimplePara elsevierViewall">En los sistemas distribuidos modernos, como la Internet o Web de las Cosas, la seguridad juega un papel preponderante. Debe prestarse especial atencio’n a la consideracio’n de estos aspectos en las primeras etapas de desarrollo. En este contexto, el desarrollo guiado por modelos de requisitos no funcionales (NF) presenta especial intere's, ya que aborda dichas caracter’ısticas NF en la etapa de disen¿o, cuando todav’ıa se pueden realizar ana’lisis, y au’n hay margen para modificaciones antes de que e'stas sean muy costosas. El uso de estas metodolog’ıas guiadas por modelos ofrece beneficios tales como el aumento de la productividad, una mayor reutilizacio’n de los elementos de disen¿o, o una mejor mantenibilidad del sistema. Este art’ıculo presenta una estrategia de desarrollo que permite integrar aspectos NF de seguridad (confidencialidad, integridad, y control de acceso) en los sistemas de software empotrado.</p>" ] "en" => array:2 [ "titulo" => "Abstract" "resumen" => "<p id="spar0010" class="elsevierStyleSimplePara elsevierViewall">In modern distributed systems, such as in the Internet or Web of Things, security plays a fundamental role. Special atention must be placed, then, in considering these aspects in the first stages of development. In this context, the model-driven development of non functional (NF) requirements is of great interest, as it addresses those NF characteristics in the design stage, when analyses can be performed, and there is room for changes while they are still not too costly. The use of modeldriven methodologies brings with them some intrinsic benefits, such as the increase in productivity, a greater reuse of design elements, or an improved maintainability of the system. This paper presents a development strategy that allows integrating non-functional security aspects (such as as confidentiality, integrity, or access control) in embedded systems design.</p>" ] ] "bibliografia" => array:2 [ "titulo" => "Referencias" "seccion" => array:1 [ 0 => array:2 [ "identificador" => "bibs0005" "bibliografiaReferencia" => array:40 [ 0 => array:3 [ "identificador" => "bib0005" "etiqueta" => "Asnar et al., 2009" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Asnar, Y., Felici, M., Kokolakis, S., Li, K., Saidane, A., Yautsiukhin, A. 2009. Serenity Project Deliverable A1.D5.1 - Preliminary version of S&D Metrics." ] ] ] 1 => array:3 [ "identificador" => "bib0010" "etiqueta" => "Blet and Simo’n, 2011" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Blet, N. S., Simo’n, J. L. 2011. SOA en automatizacio’n de pymes manufacture-ras. Iberoamericana de Engenharia Industrial [2175-8018] 3 (2), 190." ] ] ] 2 => array:3 [ "identificador" => "bib0015" "etiqueta" => "CDTI, 2006" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "CDTI, 2006. ITECBAN, Infraestructura Tecnolo’gica y Metodolo’gica de Soporte para un Core Bancario. URL: http://www.daedalus.es/i-d-i/proyectos-nacionales/itecban/." ] ] ] 3 => array:3 [ "identificador" => "bib0020" "etiqueta" => "Chung et al., 2000" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Non-functional re- quirements in software engineering" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:4 [ 0 => "L. Chung" 1 => "B.A. Nixon" 2 => "E. Young" 3 => "J. Mylopoulus" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:3 [ "fecha" => "2000" "editorial" => "Kluwer Academic Publishing" "editorialLocalizacion" => "Norwell, Massachusetts, USA" ] ] ] ] ] ] 4 => array:3 [ "identificador" => "bib0025" "etiqueta" => "de Miguel et al., 2008" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Integration of safety analysis in model-driven software development" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:5 [ 0 => "M.A. de Miguel" 1 => "F. Briones" 2 => "J. Silva Gallino" 3 => "J.P. Alonso" 4 => "A. Jun" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:6 [ "tituloSerie" => "IET Software" "fecha" => "2008" "volumen" => "2" "numero" => "3" "paginaInicial" => "260" "paginaFinal" => "280" ] ] ] ] ] ] 5 => array:3 [ "identificador" => "bib0030" "etiqueta" => "Didonet del Fabro et al., 2005" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "AMW: a generic model weaver" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:3 [ 0 => "M. Didonet del Fabro" 1 => "J. Be’zivin" 2 => "F. Jouault" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:2 [ "tituloSerie" => "En: Proceedings of the Using metamodels to support MDD Works- hop, 10th IEEE International Conference on Engineering of Complex Com- puter Systems." "fecha" => "2005" ] ] ] ] ] ] 6 => array:3 [ "identificador" => "bib0035" "etiqueta" => "Dodd et al., 2007" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Dodd, J., Allen, P., Butler, J., Olding, S., Veryard, R., Wilkes, L., 2007. Cbdi- sae meta model for soa version 2. Tech. rep., Everware-CBDI. URL: http://www.cbdiforum.com/public/meta_model_v2.php." ] ] ] 7 => array:3 [ "identificador" => "bib0040" "etiqueta" => "Eby, 2007" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Eby, M., Apr. 2007. Integrating Security Modeling into Embedded System Design. Masterthesis, Vanderbilt University. URL: http://etd.library.vanderbilt.edu/available/etd-04022007-092035/." ] ] ] 8 => array:3 [ "identificador" => "bib0045" "etiqueta" => "Elrad et al., 2002" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Aspect-Oriented Modeling: Bridging the Gap between Implementation and Design" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:3 [ 0 => "T. Elrad" 1 => "O. Aldawud" 2 => "A. Bader" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:6 [ "editores" => "D.BatoryC.ConselW.Taha" "paginaInicial" => "189" "paginaFinal" => "201" "serieVolumen" => "2487" "serieTitulo" => "Generative Programming and Component Engineering of Lecture Notes in Computer Science" "serieFecha" => "2002" ] ] ] ] ] ] 9 => array:3 [ "identificador" => "bib0050" "etiqueta" => "Guinard et al., 2011" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "In search of an internet of things ser- vice architecture: Rest or ws-*?. a developers’ perspective" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:3 [ 0 => "D. Guinard" 1 => "I. Ion" 2 => "S. Mayer" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:6 [ "editores" => "A.PuiattiT.Gu" "paginaInicial" => "326" "paginaFinal" => "337" "serieVolumen" => "104" "serieTitulo" => "MobiQuitous of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee- ring" "serieFecha" => "2011" ] ] ] ] ] ] 10 => array:3 [ "identificador" => "bib0055" "etiqueta" => "Hernandez et al., 2009" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "SOA en automatizacio’n de pymes manufactureras" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:6 [ 0 => "V. Hernandez" 1 => "L. Lopez" 2 => "O. Prieto" 3 => "J.F. Martinez" 4 => "A.B. Garcia" 5 => "A.D. Silva" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:4 [ "tituloSerie" => "Third Inter- national Conference on Emerging Security Information Systems and Tech- nologies" "fecha" => "2009" "paginaInicial" => "87" "paginaFinal" => "92" ] ] ] ] ] ] 11 => array:3 [ "identificador" => "bib0060" "etiqueta" => "Illner et al., 2006" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Illner, S., Krumm, H., Lu¿ck, I., Pohl, A., Bobek, A., Bohn, H., Golatowski, F. 2006. Model-based management of embedded service systems - an applied approach. En: AINA (2). IEEE Computer Society, pp. 519-523." ] ] ] 12 => array:3 [ "identificador" => "bib0065" "etiqueta" => "Illner et al., 2005" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Illner, S., Pohl, A., Krumm, H., nov. 2005. Model-driven security management of embedded service systems. En: Industrial Electronics Society, 2005. IE- CON 2005. 31st Annual Conference of IEEE. p. 6 pp. DOI: 10.1109/IECON.2005.1569326." ] ] ] 13 => array:3 [ "identificador" => "bib0070" "etiqueta" => "ISO/IEC, 2011" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "ISO/IEC, 2011. ISO/IEC 25010 Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – System and software quality models. ISO, Geneva, Switzerland." ] ] ] 14 => array:3 [ "identificador" => "bib0075" "etiqueta" => "Kim et al., 2007" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Kim, A., Luo, J., Kang, M., 2007. Security Ontology to Facilitate Web Service Description and Discovery. En: Journal on Data Semantics IX. Vol. 4601 of Lecture Notes in Computer Science. Springer Berlin, pp. 167-195." ] ] ] 15 => array:3 [ "identificador" => "bib0080" "etiqueta" => "Langer et al., 2011" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Langer, P., Wieland, K., Wimmer, M., Cabot, J. 2011. From uml profiles to emf profiles and beyond. En: Bishop, J., Vallecillo, A., (Eds.), Objects, Models, Components, Patterns. Vol. 6705 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, pp. 52-67." ] ] ] 16 => array:3 [ "identificador" => "bib0085" "etiqueta" => "Meiko Jensen and Sven Feja, 2009" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "A Security Modeling Approach for Web- Service-Based Business Processes. En: 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, ECBS 2009, San Francisco, California" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "Meiko Jensen" 1 => "Sven Feja" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:4 [ "tituloSerie" => "USA. IEEE Computer Society" "fecha" => "2009" "paginaInicial" => "340" "paginaFinal" => "347" ] ] ] ] ] ] 17 => array:3 [ "identificador" => "bib0090" "etiqueta" => "Menzel and Meinel, 2009" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:1 [ "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "M. Menzel" 1 => "C. Meinel" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:4 [ "tituloSerie" => "A Security Meta-model for Service- Oriented Architectures. En: 2009 IEEE International Conference on Servi- ces Computing. IEEE, Bangalore, India" "fecha" => "Sep 2009" "paginaInicial" => "251" "paginaFinal" => "259" ] ] ] ] ] ] 18 => array:3 [ "identificador" => "bib0095" "etiqueta" => "Microsoft, 2012a" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Microsoft, 2012a. Micro Framework Web Page. URL: http://www.microsoft.com/en-us/netmf/default.aspx." ] ] ] 19 => array:3 [ "identificador" => "bib0100" "etiqueta" => "Microsoft, 2012b" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Microsoft, 2012b. WSDAPI. URL: http://msdn.microsoft.com/en-us/library/windows/desktop/aa826001%28v=vs.85%29.aspx." ] ] ] 20 => array:3 [ "identificador" => "bib0105" "etiqueta" => "Mouelhi et al., 2010" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:1 [ "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:4 [ 0 => "T. Mouelhi" 1 => "F. Fleurey" 2 => "B. Baudry" 3 => "Y. Le Traon" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:4 [ "tituloSerie" => "A model-based frame- work for security policy specification, deployment and testing. Model Dri- ven Engineering Languages and Systems 5301/2010" "fecha" => "2010" "paginaInicial" => "537" "paginaFinal" => "552" ] ] ] ] ] ] 21 => array:3 [ "identificador" => "bib0110" "etiqueta" => "Nabil and Mohamed, 2012" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Nabil, S., Mohamed, B. 2012. Security ontology for semantic scada. En: Malki, M., Benbernou, S., Benslimane, S.M., Lehireche, A., (Eds.), ICWIT. Vol. 867 of CEUR Workshop Proceedings. CEUR-WS.org, pp. 179-192." ] ] ] 22 => array:3 [ "identificador" => "bib0115" "etiqueta" => "OASIS, 2006" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "OASIS, 2006. Web services security: Soap message security 1.1 (ws-security 2004). Security 2003 (February), 76. URL: http://docs.oasis-open.org/wss/v1.1/wss-v1. 1-spec-os-SOAPMessageSecurity.pdf." ] ] ] 23 => array:3 [ "identificador" => "bib0120" "etiqueta" => "OASIS, 2009" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "OASIS, 2009. Devices Profile for Web Services Version 1.1. OASIS (July). URL: http://docs.oasis-open.org/ws-dd/dpws/1.1/pr-01/wsdd-dpws-1.1-spec-pr-01.html." ] ] ] 24 => array:3 [ "identificador" => "bib0125" "etiqueta" => "OMG, 2007" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "OMG, 2007. Specification. A UML Profile for MARTE." ] ] ] 25 => array:3 [ "identificador" => "bib0130" "etiqueta" => "OMG, 2008" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "OMG, 2008. UML Profile for Modeling QoS and Fault Tolerance Characteris- tics and Mechanisms Version 1.1." ] ] ] 26 => array:3 [ "identificador" => "bib0135" "etiqueta" => "OMG, 2009" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "OMG, 2009. Service oriented architecture Modeling Language (SoaML)- Specification for the UML Profile and Metamodel for Services.(UPMS)." ] ] ] 27 => array:3 [ "identificador" => "bib0140" "etiqueta" => "OMG, 2011" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "OMG, 2011. Business Process Model and Notation (BPMN). DOI: 10.1007/s11576-008-0096-z." ] ] ] 28 => array:3 [ "identificador" => "bib0145" "etiqueta" => "Ortiz and Herna’ndez, 2006" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:1 [ "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "G. Ortiz" 1 => "J. Herna’ndez" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:4 [ "tituloSerie" => "Service-oriented model-driven development: Filling the extra-functional property gap. Service-Oriented Computing– ICSOC 2006 4294/2006" "fecha" => "2006" "paginaInicial" => "471" "paginaFinal" => "476" ] ] ] ] ] ] 29 => array:3 [ "identificador" => "bib0150" "etiqueta" => "Satoh et al., 2008" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Satoh, F., Nakamura, Y., Mukhi, N., Tatsubori, M., Ono, K., 2008. Methodo- logy and Tools for End-to-End SOA Security Configurations. En: 2008 IEEE Congress on Services, SERVICES I. IEEE Computer Society, Honolulu, Ha- waii, USA, pp. 307-314." ] ] ] 30 => array:3 [ "identificador" => "bib0155" "etiqueta" => "Shopov et al., 2007" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Shopov, M., Matev, H., Spasov, G., 2007. Evaluation of Web Services Imple- mentation for ARM-based Embedded System. En: Proceedings of ELEC- TRONICS’07. Sozopol, Bulgaria, pp. 79-84." ] ] ] 31 => array:3 [ "identificador" => "bib0160" "etiqueta" => "Silva Gallino et al., 2010" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Silva Gallino, J.P., de Miguel, M.A., Briones, J.F., Alonso, A., 2010. Model-Driven Development of a Web Service-Oriented Architecture and Security Policies. En: 2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing. IEEE Computer Society, Los Alamitos, CA, USA, Carmona, Spain, pp. 92-96." ] ] ] 32 => array:3 [ "identificador" => "bib0165" "etiqueta" => "Silva Gallino et al., 2011b" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Silva Gallino, J.P., de Miguel, M.A., Briones, J.F., Alonso, A., 2011b. Domain-Specific Multi-Modeling of Security Concerns in Service-Oriented Architectures. LNCS - 8th International Workshop on Web Services and For- mal Methods, WS-FM’11." ] ] ] 33 => array:3 [ "identificador" => "bib0170" "etiqueta" => "Silva Gallino et al., 2011a" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Silva Gallino, J.P. and de Miguel, M.A. and Briones, J.F. and Alonso, A., 2011a. Multi Domain-Specific Modeling of the Security Concerns of Service-Oriented Architectures. Services Computing, IEEE International Conference on 0, 761-762. DOI: 10.1109/SCC. 2011.102." ] ] ] 34 => array:3 [ "identificador" => "bib0175" "etiqueta" => "SOA4D, 2007" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "SOA4D, 2007. Web Page. URL: https://forge.soa4d.org/." ] ] ] 35 => array:3 [ "identificador" => "bib0180" "etiqueta" => "Tarr et al., 1999" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Tarr, P., Ossher, H., Harrison, W., Sutton Jr., S.M., 1999. N degrees of separa- tion: multi-dimensional separation of concerns. International Conference on Software Engineering, 107-119." ] ] ] 36 => array:3 [ "identificador" => "bib0185" "etiqueta" => "Theorin et al., 2012" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Theorin, A., Ollinger, L., Johnsson, C., May 2012. Service-oriented process control with grafchart and the devices profile for web services. En: 14th IFAC Symposium on Information Control Problems in Manufacturing (IN- COM). Bucharest, Romania." ] ] ] 37 => array:3 [ "identificador" => "bib0190" "etiqueta" => "Unger et al., 2012" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Unger, S., Pfeiffer, S., Timmermann, D. may 2012. Dethroning transport layer security in the embedded world. En: New Technologies, Mobility and Secu- rity (NTMS), 2012 5th International Conference on. pp. 1-5. DOI: 10.1109/NTMS. 2012.6208685." ] ] ] 38 => array:3 [ "identificador" => "bib0195" "etiqueta" => "Wada et al., 2008" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "Wada, H., Suzuki, J., Oba, K., 2008. Early Aspects for Non-Functional Proper- ties in Service Oriented Business Processes. Services, IEEE Congress on 0, 231-238. DOI: 10.1109/SERVICES-1.2008.76." ] ] ] 39 => array:3 [ "identificador" => "bib0200" "etiqueta" => "WS4D, 2007" "referencia" => array:1 [ 0 => array:1 [ "referenciaCompleta" => "WS4D, 2007. Web Page. URL: http://www.ws4d.org/." ] ] ] ] ] ] ] ] "idiomaDefecto" => "es" "url" => "/16977912/0000001100000001/v1_201401040117/S1697791213000940/v1_201401040117/es/main.assets" "Apartado" => array:4 [ "identificador" => "7980" "tipo" => "SECCION" "es" => array:2 [ "titulo" => "Artículos" "idiomaDefecto" => true ] "idiomaDefecto" => "es" ] "PDF" => "https://static.elsevier.es/multimedia/16977912/0000001100000001/v1_201401040117/S1697791213000940/v1_201401040117/es/main.pdf?idApp=UINPBA00004N&text.app=https://www.elsevier.es/" "EPUB" => "https://multimedia.elsevier.es/PublicationsMultimediaV1/item/epub/S1697791213000940?idApp=UINPBA00004N" ]
año/Mes | Html | Total | |
---|---|---|---|
2024 Noviembre | 2 | 1 | 3 |
2024 Octubre | 7 | 7 | 14 |
2024 Septiembre | 4 | 7 | 11 |
2024 Agosto | 8 | 4 | 12 |
2024 Julio | 4 | 4 | 8 |
2024 Junio | 8 | 7 | 15 |
2024 Mayo | 12 | 8 | 20 |
2024 Abril | 11 | 10 | 21 |
2024 Marzo | 10 | 16 | 26 |
2024 Febrero | 7 | 13 | 20 |
2024 Enero | 7 | 9 | 16 |
2023 Diciembre | 6 | 8 | 14 |
2023 Noviembre | 9 | 6 | 15 |
2023 Octubre | 7 | 11 | 18 |
2023 Septiembre | 9 | 8 | 17 |
2023 Agosto | 10 | 6 | 16 |
2023 Julio | 5 | 9 | 14 |
2023 Junio | 17 | 4 | 21 |
2023 Mayo | 40 | 11 | 51 |
2023 Abril | 13 | 3 | 16 |
2023 Marzo | 18 | 1 | 19 |
2023 Febrero | 12 | 7 | 19 |
2023 Enero | 2 | 9 | 11 |
2022 Diciembre | 10 | 9 | 19 |
2022 Noviembre | 7 | 8 | 15 |
2022 Octubre | 13 | 13 | 26 |
2022 Septiembre | 9 | 7 | 16 |
2022 Agosto | 19 | 7 | 26 |
2022 Julio | 16 | 15 | 31 |
2022 Junio | 15 | 14 | 29 |
2022 Mayo | 13 | 14 | 27 |
2022 Abril | 17 | 12 | 29 |
2022 Marzo | 14 | 9 | 23 |
2022 Febrero | 17 | 9 | 26 |
2022 Enero | 18 | 15 | 33 |
2021 Diciembre | 9 | 15 | 24 |
2021 Noviembre | 16 | 13 | 29 |
2021 Octubre | 13 | 18 | 31 |
2021 Septiembre | 14 | 11 | 25 |
2021 Agosto | 7 | 7 | 14 |
2021 Julio | 10 | 6 | 16 |
2021 Junio | 6 | 6 | 12 |
2021 Mayo | 9 | 8 | 17 |
2021 Abril | 24 | 20 | 44 |
2021 Marzo | 6 | 3 | 9 |
2021 Febrero | 8 | 10 | 18 |
2021 Enero | 8 | 7 | 15 |
2020 Diciembre | 10 | 5 | 15 |
2020 Noviembre | 5 | 7 | 12 |
2020 Octubre | 12 | 3 | 15 |
2020 Septiembre | 8 | 10 | 18 |
2020 Agosto | 13 | 11 | 24 |
2020 Julio | 11 | 9 | 20 |
2020 Junio | 7 | 3 | 10 |
2020 Mayo | 11 | 2 | 13 |
2020 Abril | 9 | 2 | 11 |
2020 Marzo | 14 | 3 | 17 |
2020 Febrero | 7 | 6 | 13 |
2020 Enero | 4 | 5 | 9 |
2019 Diciembre | 7 | 5 | 12 |
2019 Noviembre | 5 | 6 | 11 |
2019 Octubre | 9 | 5 | 14 |
2019 Septiembre | 13 | 6 | 19 |
2019 Agosto | 6 | 2 | 8 |
2019 Julio | 11 | 11 | 22 |
2019 Junio | 24 | 13 | 37 |
2019 Mayo | 23 | 22 | 45 |
2019 Abril | 6 | 13 | 19 |
2019 Marzo | 7 | 3 | 10 |
2019 Febrero | 12 | 7 | 19 |
2019 Enero | 15 | 1 | 16 |
2018 Diciembre | 11 | 4 | 15 |
2018 Noviembre | 24 | 5 | 29 |
2018 Octubre | 15 | 15 | 30 |
2018 Septiembre | 5 | 10 | 15 |
2018 Agosto | 24 | 4 | 28 |
2018 Julio | 16 | 3 | 19 |
2018 Junio | 13 | 4 | 17 |
2018 Mayo | 27 | 5 | 32 |
2018 Abril | 30 | 5 | 35 |
2018 Marzo | 23 | 0 | 23 |
2018 Febrero | 101 | 1 | 102 |
2018 Enero | 65 | 3 | 68 |
2017 Diciembre | 123 | 0 | 123 |
2017 Noviembre | 48 | 7 | 55 |
2017 Octubre | 22 | 15 | 37 |
2017 Septiembre | 17 | 1 | 18 |
2017 Agosto | 26 | 2 | 28 |
2017 Julio | 27 | 4 | 31 |
2017 Junio | 39 | 22 | 61 |
2017 Mayo | 33 | 7 | 40 |
2017 Abril | 23 | 4 | 27 |
2017 Marzo | 25 | 54 | 79 |
2017 Febrero | 25 | 7 | 32 |
2017 Enero | 22 | 3 | 25 |
2016 Diciembre | 12 | 5 | 17 |
2016 Noviembre | 13 | 2 | 15 |
2016 Octubre | 21 | 7 | 28 |
2016 Septiembre | 25 | 7 | 32 |
2016 Agosto | 22 | 2 | 24 |
2016 Julio | 15 | 1 | 16 |
2016 Junio | 7 | 10 | 17 |
2016 Mayo | 8 | 7 | 15 |
2016 Abril | 9 | 0 | 9 |
2016 Marzo | 4 | 4 | 8 |
2016 Febrero | 9 | 5 | 14 |
2016 Enero | 5 | 8 | 13 |
2015 Diciembre | 9 | 2 | 11 |
2015 Noviembre | 9 | 2 | 11 |
2015 Octubre | 18 | 9 | 27 |
2015 Septiembre | 30 | 4 | 34 |
2015 Agosto | 29 | 2 | 31 |
2015 Julio | 24 | 4 | 28 |
2015 Junio | 16 | 1 | 17 |
2015 Mayo | 14 | 3 | 17 |
2015 Abril | 7 | 5 | 12 |
2015 Marzo | 6 | 5 | 11 |
2015 Febrero | 12 | 9 | 21 |
2015 Enero | 6 | 5 | 11 |
2014 Diciembre | 14 | 5 | 19 |
2014 Noviembre | 7 | 4 | 11 |
2014 Octubre | 7 | 5 | 12 |
2014 Septiembre | 8 | 6 | 14 |
2014 Agosto | 7 | 4 | 11 |
2014 Julio | 8 | 6 | 14 |
2014 Junio | 11 | 9 | 20 |
2014 Mayo | 7 | 4 | 11 |
2014 Abril | 47 | 9 | 56 |
2014 Marzo | 97 | 39 | 136 |
2014 Febrero | 53 | 21 | 74 |
2014 Enero | 50 | 24 | 74 |