Alfonso Rodríguez

Orcid: 0000-0002-1236-9388

Affiliations:
  • University of Bio-Bio, Computer Science and Information Technologies Department, Chillán, Chile


According to our database1, Alfonso Rodríguez authored at least 33 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Obtaining secure business process models from an enterprise architecture considering security requirements.
Bus. Process. Manag. J., 2022

2020
Systematic literature review of implementations of precision agriculture.
Comput. Electron. Agric., 2020

2018
Towards Obtaining UML Class Diagrams from Secure Business Processes Using Security Patterns.
J. Univers. Comput. Sci., 2018

Kontun: A Framework for recommendation of authentication schemes and methods.
Inf. Softw. Technol., 2018

Authentication schemes and methods: A systematic literature review.
Inf. Softw. Technol., 2018

2015
Identifying the data quality terminology used by business people.
Proceedings of the 34th International Conference of the Chilean Computer Science Society, 2015

2013
An Approach To Design Business Processes Addressing Data Quality Issues.
Proceedings of the 21st European Conference on Information Systems, 2013

2012
Designing Business Processes Able to Satisfy Data Quality Requirements.
Proceedings of the 17th International Conference on Information Quality, 2012

A BPMN Extension for Including Data Quality Requirements in Business Process Modeling.
Proceedings of the Business Process Model and Notation - 4th International Workshop, 2012

2011
Secure business process model specification through a UML 2.0 activity diagram profile.
Decis. Support Syst., 2011

2010
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach.
Inf. Softw. Technol., 2010

2009
Security in Information Systems: New Advances and Tendencies.
J. Univers. Comput. Sci., 2009

Guest Editorial.
J. Res. Pract. Inf. Technol., 2009

LIS2BP: Una propuesta para obtener Procesos de Negocio a partir de los Sistemas Heredados.
Proceedings of the Memorias de la XII Conferencia Iberoamericana de Software Engineering (CIbSE 2009), 2009

2008
Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models.
Proceedings of the Advances in Conceptual Modeling - Challenges and Opportunities, 2008

Hacia la Obtención de Procesos de Negocio desde Sistemas de Información Heredados.
Proceedings of the Actas 2do Encuentro Informática y Gestión, 2008

2007
A BPMN Extension for the Modeling of Security Requirements in Business Processes.
IEICE Trans. Inf. Syst., 2007

An MDA. appproach to develop secure business processes through a UML 2.0 extension.
Comput. Syst. Sci. Eng., 2007

Analysis-Level Classes from Secure Business Processes Through Model Transformations.
Proceedings of the Trust, 2007

Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA Approach.
Proceedings of the Security in Information Systems, 2007

Transformaciones QVT para la obtención de Clases de Análisis a partir de un Modelo de Proceso de Negocio Seguro.
Proceedings of the XII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2007), 2007

Especificación de Procesos de Negocio Seguros a través de una extensión de UML 2.0.
Proceedings of the XII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2007), 2007

CIM to PIM Transformation: A Reality.
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007

M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification.
Proceedings of the Advances in Conceptual Modeling - Foundations and Applications, 2007

Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases.
Proceedings of the Business Process Management, 5th International Conference, 2007

2006
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams.
Proceedings of the Security in Information Systems, 2006

Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio.
Proceedings of the XI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2006), 2006

Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile.
Proceedings of the Advances in Conceptual Modeling - Theory and Practice, 2006

Extensión de UML 2.0 para especificar Requisitos de Seguridad en Procesos de Negocios.
Proceedings of the Memorias de la IX Conferenci a Iberoamericana de Software Engineering (CIbSE 2006), 2006

Security Requirement with a UML 2.0 Profile.
Proceedings of the The First International Conference on Availability, 2006

2005
Towards an integration of Security Requirements into Business Process Modeling.
Proceedings of the Security in Information Systems, 2005

Representación de Requisitos de Seguridad en el Modelado de Procesos de Negocios.
Proceedings of the Memorias de la VIII Conferencia Iberoamericana de Software Engineering (CIbSE 2005), 2005


  Loading...