default search action
Beatriz Gallego-Nicasio
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j1]Aggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform. Inf. Comput. Secur. 28(4): 531-553 (2020) - [c10]Luca Piras, Mohammed Ghazi Al-Obeidallah, Michalis Pavlidis, Haralambos Mouratidis, Aggeliki Tsohou, Emmanouil Magkos, Andrea Praitano, Annarita Iodice, Beatriz Gallego-Nicasio Crespo:
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance. TrustBus 2020: 186-201
2010 – 2019
- 2019
- [c9]Aggeliki Tsohou, Manos Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 204-223 - [c8]Luca Piras, Mohammed Ghazi Al-Obeidallah, Andrea Praitano, Aggeliki Tsohou, Haralambos Mouratidis, Beatriz Gallego-Nicasio Crespo, Jean Baptiste Bernard, Marco Fiorani, Emmanouil Magkos, Andrès Castillo Sanz, Michalis Pavlidis, Roberto D'Addario, Giuseppe Giovanni Zorzino:
DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance. TrustBus 2019: 78-93 - [c7]Dimitrios Schinianakis, Rubén Trapero, Diomidis S. Michalopoulos, Beatriz Gallego-Nicasio Crespo:
Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach. WCNC 2019: 1-8 - 2017
- [c6]Diomidis S. Michalopoulos, Borislava Gajic, Beatriz Gallego-Nicasio Crespo, Aravinthan Gopalasingham, Jakob Belschner:
Network Resilience in Virtualized Architectures. IMCL 2017: 824-839 - 2016
- [i1]Beatriz Gallego-Nicasio Crespo, Melek Önen, Ghassan Karame:
TREDISEC: Towards Realizing a Truly Secure and Trustworthy Cloud. ERCIM News 2016(104) (2016) - 2015
- [c5]Julien Bringer, Beatriz Gallego-Nicasio, Ghassan Karame, Mathias Kohler, Panos Louridas, Melek Önen, Hubert Ritzdorf, Alessandro Sorniotti, David Vallejo:
TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud. e-Democracy 2015: 193-197 - 2014
- [c4]Beatriz Gallego-Nicasio Crespo, Alan Garwood:
Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMs. ARES 2014: 192-198 - 2013
- [c3]Beatriz Gallego-Nicasio Crespo:
User Interface Harmonization for IT Security Management: User-Centered Design in the PoSecCo Project. ARES 2013: 829-835 - 2010
- [c2]Aljosa Pasic, Juan Bareño, Beatriz Gallego-Nicasio, Rubén Torres, Daniel Fernandez:
Trust and Compliance Management Models in Emerging Outsourcing Environments. I3E 2010: 237-248
2000 – 2009
- 2009
- [c1]Beatriz Gallego-Nicasio, Antonio Muñoz, Antonio Maña, Daniel Serrano:
Security Patterns, Towards a Further Level. SECRYPT 2009: 349-356 - [p4]Daniel Serrano, Antonio Maña, Rafael Llarena, Beatriz Gallego-Nicasio Crespo, Keqin Li:
SERENITY Aware Development of Security and Dependability Solutions. Security and Dependability for Ambient Intelligence 2009: 127-141 - [p3]Daniel Serrano, Antonio Maña, Rafael Llarena, Beatriz Gallego-Nicasio Crespo, Keqin Li:
SERENITY Aware System Development Process. Security and Dependability for Ambient Intelligence 2009: 165-179 - [p2]Beatriz Gallego-Nicasio Crespo, Ana Piñuela, Pedro Soria-Rodriguez, Daniel Serrano, Antonio Maña:
The SERENITY Runtime Framework. Security and Dependability for Ambient Intelligence 2009: 183-198 - [p1]Beatriz Gallego-Nicasio Crespo, Ana Piñuela, Pedro Soria-Rodriguez, Daniel Serrano, Antonio Maña:
Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime. Security and Dependability for Ambient Intelligence 2009: 199-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint