Beatriz Gallego-Nicasio

According to our database1, Beatriz Gallego-Nicasio authored at least 16 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform.
Inf. Comput. Secur., 2020

DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

2019
Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019


Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2017
Network Resilience in Virtualized Architectures.
Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017

2016
TREDISEC: Towards Realizing a Truly Secure and Trustworthy Cloud.
ERCIM News, 2016

2015
TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

2014
Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMs.
Proceedings of the Ninth International Conference on Availability, 2014

2013
User Interface Harmonization for IT Security Management: User-Centered Design in the PoSecCo Project.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2010
Trust and Compliance Management Models in Emerging Outsourcing Environments.
Proceedings of the Software Services for e-World, 2010

2009
SERENITY Aware System Development Process.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

SERENITY Aware Development of Security and Dependability Solutions.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

The SERENITY Runtime Framework.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Security Patterns, Towards a Further Level.
Proceedings of the SECRYPT 2009, 2009


  Loading...