Perfil del autor: Varela Vaca, Ángel Jesús
Datos institucionales
Nombre | Varela Vaca, Ángel Jesús |
Departamento | Lenguajes y Sistemas Informáticos |
Área de conocimiento | Lenguajes y Sistemas Informáticos |
Categoría profesional | Profesor Titular de Universidad |
Correo electrónico | Solicitar |
Estadísticas
-
Nº publicaciones
68
-
Nº visitas
4123
-
Nº descargas
10754
Publicaciones |
---|
Artículo
BIGOWL4DQ: Ontology-driven approach for Big Data quality meta-modelling, selection and reasoning
(Elsevier B.V., 2024)
Data quality should be at the core of many Artificial Intelligence initiatives from the very first moment in which data ... |
Capítulo de Libro
Introductory Chapter: An Overview to the Internet of Things
(IntechOpen, 2023)
|
Artículo
Feature models to boost the vulnerability management process
(Elsevier Inc., 2023)
Vulnerability management is a critical and very challenging process that allows organisations to design a procedure to ... |
Artículo
ELI: an IoT-aware big data pipeline with data curation and data quality
(PeerJ, 2023)
The complexity of analysing data from IoT sensors requires the use of Big Data technologies, posing challenges such as ... |
Tesis Doctoral
On the enhancement of Big Data Pipelines through Data Preparation, Data Quality, and the distribution of Optimisation Problems
(2022)
Nowadays, data are fundamental for companies, providing operational support by facilitating daily transactions. Data has ... |
Ponencia
Advisory: vulnerability analysis in software development project dependencies
(ACM: Association for Computing Machinery, 2022)
ecurity has become a crucial factor in the development of soft ware systems. The number of dependencies in software ... |
Artículo
Feature models to boost the vulnerability management process
(Elsevier, 2022)
Vulnerability management is a critical and very challenging process that allows organisations to design a procedure to ... |
Ponencia
Dynamic Checks of Evidence Models for Assurance Projects in Eclipse OpenCert
(Springer, 2022)
The modelling of regulatory frameworks and industry stan dards, including their argumentation and expected evidence, are ... |
Artículo
Reasoning on the usage control security policies over data artifact business process models
(ComSIS Consortium, 2022)
The inclusion of security aspects in organizations is a crucial aspect to ensure compliance with both internal and external ... |
Artículo
Smart Contract Languages: A Multivocal Mapping Study
(ACM: Association for Computing Machinery, 2022)
Blockchain is a disruptive technology that has attracted the attention of the scientific community and compa nies, as ... |
Artículo
A domain-specific language for the specification of UCON policies
(Elsevier, 2022)
Security policies constrain the behavior of all users of an information system. In any non-trivial system, these security ... |
Artículo
Blockchain‑based federation of wireless sensor nodes
(Springer, 2021)
Wireless sensor networks (WSNs), as an integral part of most Internet of Things (IoT) devices, are currently proliferating ... |
Ponencia
A NLP-Oriented Methodology to Enhance Event Log Quality
(Springer, 2021)
The quality of event logs is a crucial cornerstone for the feasibility of the application of later process mining techniques. ... |
Artículo
Discovering configuration workflows from existing logs using process mining
(Springer, 2021)
Variability models are used to build configurators, for guiding users through the configuration process to reach the desired ... |
Artículo
DMN4DQ: when data quality meets DMN
(Elsevier, 2021)
To succeed in their business processes, organizations need data that not only attains suitable levels of quality for the ... |
Ponencia
CC4Spark: Distributing Event Logs and big complex Conformance Checking problems
(CEUR Workshop Proceedings (CEUR-WS.org), 2021)
Conformance checking is one of the disciplines that best exposes the power of process mining, since it allows detecting ... |
Artículo
Data curation in the Internet of Things: A decision model approach
(Wiley, 2021)
Current Internet of Things (IoT) scenarios have to deal with many challenges especially when a large amount of heterogeneous ... |
Capítulo de Libro |
Artículo
Empowering conformance checking using Big Data through horizontal decomposition
(Elsevier, 2021)
Conformance checking unleashes the full power of process mining: techniques from this discipline enable the analysis of ... |
Ponencia
Curso de Especialización en Ciberseguridad, ¿están preparados nuestros docentes?
(Universidad de Castilla-La Mancha, 2021)
La aparición del nuevo título de Formación Profesional, Curso de Especialización en “Ciberseguridad en entornos de tecnologías ... |
Artículo
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
(Elsevier, 2021)
In the last years, cyber-physical systems (CPS) are receiving substantial mainstream attention especially in industrial ... |
Ponencia
Definition and Verification of Security Configurations of Cyber-Physical Systems
(Springer, 2020)
The proliferation of Cyber-Physical Systems (CPSs) is rais ing serious security challenges. These are complex systems, ... |
Ponencia
AMADEUS: Towards the AutoMAteD secUrity teSting
(ACM: Association for Computing Machinery, 2020)
The proper configuration of systems has become a fundamental factor to avoid cybersecurity risks. Thereby, the analysis ... |
Artículo
Unleashing Constraint Optimisation Problem solving in Big Data environments
(Elsevier, 2020)
The application of the optimisation problems in the daily decisions of companies is able to be used for finding the best ... |
Artículo
Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review
(MDPI, 2020)
The research presented aims to investigate the relationship between privacy and anonymisation in blockchain technologies ... |
Artículo
Measuring data‑centre workfows complexity through process mining: the Google cluster case
(Springer, 2020)
Data centres have become the backbone of large Cloud services and applica-tions, providing virtually unlimited elastic ... |
Artículo
A framework to secure the development and auditing of SSL pinning in mobile applications: The case of android devices
(MDPI AG, 2019)
The use of mobile devices has undergone rapid growth in recent years. However, on some occasions, security has been neglected ... |
Artículo
CyberSPL: Framework for the verification of cybersecurity policy compliance of system configurations using software product lines
(MDPI, 2019)
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations. Such disadvantages may be due ... |
Ponencia
Enabling Process Mining in Aircraft Manufactures: Extracting Event Logs and Discovering Processes from Complex Data
(CEUR Workshop Proceedings (CEUR-WS.org), 2019)
Process mining is employed by organizations to completely understand and improve their processes and to detect possible ... |
Trabajo Fin de Máster
Analysis of Big Data Architectures and Pipelines: Challenges and Opportunities
(2019)
Los continuos avances tecnológicos están promoviendo cambios en múltiples aspectos de la sociedad. Una de las consecuencias ... |
Ponencia
Guidelines towards secure SSL pinning in mobile applicationsand
(Universidad de Extremadura, 2019)
Security is a major concern in web applications for so long, but it is only recently that the use of mobile applications ... |
Ponencia
Process Mining to Unleash Variability Management: Discovering Configuration Workflows Using Logs
(Association for Computing Machinery (ACM), 2019)
Variability models are used to build configurators. Configurators are programs that guide users through the configuration ... |
Ponencia
DMN for Data Quality Measurement and Assessment
(Springer, 2019)
Data Quality assessment is aimed at evaluating the suitability of a dataset for an intended task. The extensive literature ... |
Artículo
Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
(IEEE Computer Society, 2019)
Organizations execute daily activities to meet their objectives. The performance of these activities can be fundamental ... |
Capítulo de Libro
Model-Based Software Debugging
(Springer, 2019)
The complexity and size of software systems have rapidly increased in recent years, with software engineers facing ... |
Capítulo de Libro
Constraint-Driven Fault Diagnosis
(Springer, 2019)
Constraint-Driven Fault Diagnosis (CDD) is based on the concept of constraint suspension [6], which was proposed as an ... |
Ponencia
CyberSPL: Plataforma para la verificación del cumplimiento de políticas de ciberseguridad en configuraciones de sistemas usando modelos de caracterısticas
(Universidad de Extremadura, 2019)
Los ataques de ciberseguridad se han convertido en un factor muy relevante que pueden contravenir el cumplimiento de las ... |
Ponencia
CHAMALEON: Framework to improve Data Wrangling with Complex Data
(Association for Information Systems (AIS), 2019)
Data transformation and schema conciliation are relevant topics in Industry due to the incorporation of data-intensive ... |
Artículo
Business Process Configuration According to Data Dependency Specification
(MDPI AG, 2018)
Configuration techniques have been used in several fields, such as the design of business process models. Sometimes these ... |
Ponencia
Análisis de los datos y coreografia de múltiples procesos en entornos logísticos
(Sociedad de Ingeniería de Software y Tecnologías de Desarrollo de Software (SISTEDES), 2018)
Los procesos de negocio permiten la descripción de modelos colaborativos donde varios procesos y sus instancias se puedan ... |
Ponencia
FABIOLA: Towards the resolution of constraint optimization problems in big data environment
(Association for Information Systems (AIS), 2017)
The optimization problems can be found in several examples within companies, such as the minimization of the production ... |
Ponencia
FABIOLA: Arquitectura para la Optimización de Problemas en entornos de Big Data
(Sociedad de Ingeniería de Software y Tecnologías de Desarrollo de Software (SISTEDES), 2017)
Dentro de las organizaciones, los problemas de optimización pueden encontrarse en numerosos ejemplos, tales como minimizar ... |
Ponencia
A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models
(Springer, 2016)
Artifact-centric initiatives have been used in business processes whose data management is complex, being the simple ... |
Ponencia
Governance Knowledge Management and Decision Support Using Fuzzy Governance Maps
(Springer, 2016)
Business process management systems incorporate the pos sibility of monitoring the behaviour of a company, by observing ... |
Ponencia
Guiding the Creation of Choreographed Processes with Multiple Instances Based on Data Models
(Springer, 2016)
Choreography in business processes is used as a mechanism to communicate various organizations, by providing a method to ... |
Ponencia
An Open-Source Proactive Security Infrastructure for Business Process Management
(International Business Information Management Association (IBIMA), 2015)
Business Process Management Systems (BPMS) have emerged in the IT arena as cornerstone in the automation and orchestration ... |
Artículo
Formalization of security patterns as a means to infer security controls in business processes
(Oxford University Press, 2015)
The growing trend towards the automation and externalization of business processes by means of Technology Infrastructure (TI), ... |
Ponencia
Towards Automatic Integration of Information Security Governance and Management using a BPMS approach
(Universidad de León, 2015)
The information security management is more and more carried out by means of business processes although disregarding ... |
Ponencia
Embedded Kernel customization to optimize performance and power management. An application to IoT
(Sociedad de Arquitectura y Tecnología de Computadores (SARTECO), 2015)
Embedded systems are nowadays a cor- ner stone in research for areas such as Internet of Things. An interesting aspect ... |
Tesis Doctoral
OPBUS : A Framework for Improving the Dependability of Risk-Aware Business processes
(2013)
Hoy en día existe una creciente tendencia a externalizar y automatizar procesos críticos y complejos mediante el uso de ... |
Artículo
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
(Elsevier, 2013)
Context: The use of Business Process Management Systems (BPMS) has emerged in the IT arena for the automation of business ... |
Ponencia
CombiS-BP Editor: Combining Declarative and Imperative Languages in BP Modelling, Demonstration paper
(IEEE Computer Society, 2013)
Business Process models allow business experts to describe the activities that must be performed to achieve a defined goal. ... |
Artículo |
Ponencia
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes
(Springer, 2012)
Risk management has become an essential mechanism for business and security analysts, since it enable the identification, ... |
Artículo
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework
(Elsevier, 2012)
Design, development, and maintenance of firewall ACLs are very hard and error-prone tasks. Two of the reasons for ... |
Ponencia
OPBUS: Risk-aware framework for the conformance of security-quality requirements in business processes
(IEEE Computer Society, 2011)
Several reports indicate that one of the most important business priorities is the improvement of business and IT management. ... |
Ponencia
A Model-Driven Engineering approach with Diagnosis of Non-Conformance of Security Objectives in Business Process Models
(IEEE Computer Society, 2011)
Several reports indicate that the highest business priorities include: business improvement, security, and IT management. The ... |
Ponencia
Contract-based test generation for data flow of business processes using constraint programming
(IEEE Computer Society, 2011)
The verification of the properties of a business process (BP) has become a significant research topic in recent years. In ... |
Artículo
Fault Tolerance Framework using Model-Based Diagnosis: Towards Dependable Business Processes
(International Academy, Research, and Industry Association (IARIA), 2011)
Several reports indicate that one of the most important business priorities is the improvement of business and IT management. ... |
Ponencia
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
(IEEE Computer Society, 2010)
Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a variety ... |
Ponencia
OPBUS: Automating Structural Fault Diagnosis for Graphical Models in the Design of Business Processes
(The Prognostics and Health Management Society (PHM Society), 2010)
When quality is considered in the design stages of business processes, fault diagnosis must be taken into account. In the ... |
Ponencia
OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes
(Springer, 2010)
Management and automation of business processes have become essential tasks within IT organizations. Nowadays, executable ... |
Ponencia
Towards Dependable Business Processes with Fault-Tolerance Approach
(IEEE Computer Society, 2010)
The management and automation of business processes have become an essential tasks within IT organizations. Companies could ... |
Ponencia
Efficient algorithms and abstract data types for local inconsistency isolation in firewall ACLS
(Institute for Systems and Technologies of Information, Control and Communication (INSTICC), 2009)
Writing and managing firewall ACLs are hard, tedious, time-consuming and error-prone tasks for a wide range of reasons. ... |
Ponencia
AFPL2, An Abstract Language for Firewall ACLs with NAT support
(IEEE Computer Society, 2009)
The design and management of firewall ACLs is a very hard and error-prone task. Part of this complexity comes from the ... |
Ponencia
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT
(Springer, 2009)
The design and management of firewall ACLs is a very hard and er ror-prone task. Part of this complexity comes from the ... |
Ponencia
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
(IEEE Computer Society, 2008)
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of ... |
Ponencia
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets
(IEEE Computer Society, 2008)
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACLs could have ... |