Angel Jesus Varela-Vaca

According to our database1, Angel Jesus Varela-Vaca authored at least 27 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Measuring data-centre workflows complexity through process mining: the Google cluster case.
J. Supercomput., 2020

AMADEUS: towards the AutoMAteD secUrity teSting.
Proceedings of the SPLC '20: 24th ACM International Systems and Software Product Line Conference, 2020

2019
A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices.
Entropy, 2019

Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models.
IEEE Access, 2019

Process mining to unleash variability management: discovering configuration workflows using logs.
Proceedings of the 23rd International Systems and Software Product Line Conference, 2019

CHAMALEON: Framework to improve Data Wrangling with Complex Data.
Proceedings of the 40th International Conference on Information Systems, 2019

Enabling process mining in aircraft manufactures: extracting event logs and discovering processes from complex data.
Proceedings of the Industry Forum at BPM 2019 co-located with 17th International Conference on Business Process Management (BPM 2019), 2019

DMN for Data Quality Measurement and Assessment.
Proceedings of the Business Process Management Workshops, 2019

2017
FABIOLA: Defining the Components for Constraint Optimization Problems in Big Data Environment.
Proceedings of the Information Systems Development: Advances in Methods, Tools and Management, 2017

2016
OPBUS: A framework for improving the dependability of risk-aware business processes.
AI Commun., 2016

Governance Knowledge Management and Decision Support Using Fuzzy Governance Maps.
Proceedings of the Business Process Management Workshops, 2016

Guiding the Creation of Choreographed Processes with Multiple Instances Based on Data Models.
Proceedings of the Business Process Management Workshops, 2016

A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models.
Proceedings of the Business Information Systems - 19th International Conference, 2016

2015
Formalization of security patterns as a means to infer security controls in business processes.
Log. J. IGPL, 2015

2013
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach.
Inf. Softw. Technol., 2013

CombiS-BP editor: Combining declarative and imperative languages in BP modelling: Demonstration paper.
Proceedings of the IEEE 7th International Conference on Research Challenges in Information Science, 2013

2012
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework.
J. Syst. Softw., 2012

A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

2011
OPBUS: Risk-aware Framework for the Conformance of Security-quality Requirements in Business Processes.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A Model-Driven engineering approach with diagnosis of non-conformance of security objectives in business process models.
Proceedings of the Fifth IEEE International Conference on Research Challenges in Information Science, 2011

Contract-based test generation for data flow of business processes using constraint programming.
Proceedings of the Fifth IEEE International Conference on Research Challenges in Information Science, 2011

2010
OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs.
Proceedings of the SECRYPT 2009, 2009

MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT.
Proceedings of the Computational Science and Its Applications, 2009

2008
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets.
Proceedings of the Second International Conference on Emerging Security Information, 2008


  Loading...