Carlos Blanco

Carlos Blanco
Universidad de Cantabria | UNICAN

PhD

About

52
Publications
8,407
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
556
Citations

Publications

Publications (52)
Article
Cyber-physical systems (CPSs) are smart systems that include engineered interacting networks of physical and computational components. CPSs have an increasingly presence on critical infrastructures and an impact in almost every aspect of our daily life, including transportation, healthcare, electric power, and advanced manufacturing. However, CPSs...
Article
The importance of data security is currently increasing owing to the number of data transactions that are continuously taking place. Large amounts of data are generated, stored, modified and transferred every second, signifying that databases require an appropriate capacity, control and protection that will enable them to maintain a secure environm...
Article
Full-text available
NoSQL technologies have become a common component in many information systems and software applications. These technologies are focused on performance, enabling scalable processing of large volumes of structured and unstructured data. Unfortunately, most developments over NoSQL technologies consider security as an afterthought, putting at risk pers...
Article
In the last decade, several NoSQL systems have emerged as a response to the scalability problems manifested by classical relational databases when used in Big Data contexts. These NoSQL systems appeared first as physical-level solutions, initially lacking any design methodologies. After this initial batch of systems, several design methodologies fo...
Chapter
Big Data is becoming a prominent trend in our society. Ever larger amounts of data, including sensitive and personal information, are being loaded into NoSQL and other Big Data technologies for analysis and processing. However, current security approaches do not take into account the special characteristics of these technologies, leaving sensitive...
Article
Full-text available
Decision makers query enterprise information stored in DataWarehouses (DW) by using tools (such as On-Line Analytical Processing (OLAP) tools) which employ specific views or cubes from the corporate DW or Data Marts, based on multidimensional modelling. Since the information managed is critical, security constraints have to be correctly established...
Article
Decision makers query enterprise information stored in Data Warehouses (DW) by using tools (such as On-Line Analytical Processing (OLAP) tools) which use specific views or cubes from the corporate DW or Data Marts, based on the multidimensional modeling. Since the information managed is critical, security constraints have to be correctly establishe...
Article
The majority of the organizations store their historical business information in data warehouses which are queried to make strategic decisions by using online analytical processing (OLAP) tools. This information has to be correctly assured against unauthorized accesses, but nevertheless there are a great amount of legacy OLAP applications that have...
Article
Data Warehouses (DW) manage enterprise information that is queried for decision making purposes by using On-Line Analytical Processing (OLAP) tools. The establishment of security constraints in all development stages and operations of the DW is highly important since otherwise, unauthorized users may discover vital business information. The final u...
Conference Paper
Full-text available
Foreword The Eleventh International Workshop on Security in Information Systems – WOSIS 2014 was organized in conjunction with ICEIS 2014 in Lisbon, Portugal. As in previous years, this workshop is primarily focused on high quality and innovative research papers from different fields related to the most recent developments in Security in Informatio...
Article
Context: Data warehouses are systems which integrate heterogeneous sources to support the decision making process. Data from the Web is becoming increasingly more important as sources for these systems, which has motivated the extensive use of XML to facilitate data and metadata interchange among heterogeneous data sources from the Web and the data...
Article
We describe a data management solution and associated key management approaches to provide accountability within service provision networks, in particular addressing privacy issues in cloud computing applications. Our solution involves machine readable ...
Conference Paper
Full-text available
Foreword The Tenth International Workshop on Security in Information Systems – WOSIS 2013 was organized in conjunction with ICEIS 2013 in Angers, France. As in previous years, this workshop is primarily focused on high quality and innovative research papers from different fields related to the most recent developments in Security in Information Sys...
Article
Data warehouses are systems that provide useful information to support the decision making process, thus improving organizations' business processes. These systems integrate heterogeneous sources which are not only limited to their internal business data but also include data from the Web, the latter of which have become increasingly more important...
Conference Paper
Full-text available
Foreword The Ninth International Workshop on Security in Information Systems – WOSIS 2012 was organized in conjunction with ICEIS 2012 in Wroclaw, Poland. As in previous years, this workshop is primarily focused on high quality and innovative research papers from different fields related to the most recent developments in Security in Information Sy...
Article
The use of ontologies to represent knowledge provides us with organization, communication and reusability. The concepts and relations managed by any scientific community need to be formally defined. Since security in information technologies has evolved as a critical aspect and many related topics have been developed, this paper applies the method...
Article
Full-text available
The software industry needs highly qualified professionals who, in addition to a sound university education, also require professional qualifications which are difficult to attain in university lecture rooms. These professional qualifications, which are so highly regarded by businesses, are more specifically professional certification which groups...
Conference Paper
Full-text available
Information Security is a crucial aspect for organizations, and must be considered during the development of Information Systems. The data in Data Warehouses (DWs) are highly sensitive since they manage historical information which is used to make strategic decisions, and security constraints should therefore be included in DW modelling within its...
Conference Paper
Full-text available
La seguridad informática ha venido cobrando mayor importancia para las organizaciones dado el marcado crecimiento de las nuevas tecnologías de la información, servicios Web, comercio electrónico, etc. Es por ello que existe la necesidad de contar con nuevos profesionales en este entorno. Para ello, es necesario contar con asignaturas de Seguridad e...
Conference Paper
Full-text available
The software industry needs highly qualified professionals who, in addition to a sound university education, also require professional qualifications which are difficult to attain in university lecture rooms. These professional qualifications, which are so highly regarded by businesses, are more specifically professional certification which groups...
Article
One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased manner, that is, none of them perform a systematic review of security requirements engineering...
Article
Full-text available
Data Warehouses (DWs) store historical information which support the decision-making process. Since this information is crucial, it has to be protected from unauthorised accesses by defining security constraints in all stages of the DW development process. In previous works, we applied the Model-Driven (MDA) philosophy to define secure DWs using se...
Conference Paper
Full-text available
Data Warehouses (DWs) are currently considered to be the cornerstone of Business Intelligence (BI) systems. Security is a key issue in DWs since the business information that they manage is crucial and highly sensitive, and should be carefully protected. However, the increasing amount of data available on the Web signifies that more and more DW sys...
Chapter
Information security is currently considered to be a crucial aspect of systems development. However it has traditionally been considered during the final stages of development, once the main components of the system have been developed and therefore provides solutions which are inappropriate for security integration. Software engineering has tradit...
Conference Paper
Full-text available
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints are not properly integrated in the complete DWs’ development process, being traditionally considered in the last stages. Furthermore, legacy systems need a reverse engine...
Article
Full-text available
Data Warehouses manage historical information for the decision making process, and this information could be discovered by unauthorized users if security constraints are not established. It is therefore highly important for OLAP tools to consider the security rules defined at early stages of the development lifecycle. By following the MDA approach...
Article
Full-text available
The Data Warehouse (DW) design is based on multidimensional (MD) modeling which structures information into facts and dimensions. Due to the confi- dentiality of the data that it stores, it is crucial to specify security and audit mea- sures from the early stages of design and to enforce them throughout the lifecycle. Moreover, the standard framewo...
Conference Paper
Information security is a crucial aspect for enterprises that has to be considered as a strong requirement from the early stages of the development process and data warehouses (DWs) manage highly important information used to make strategic decisions which has to be protected from unauthorized users. In order to develop secure DWs we have proposed...
Conference Paper
Data warehouses (DWs) manage crucial information for enterprises which must be protected from unauthorized accesses. The question of which security issues are present in all stages of the DW design is therefore of great importance when considering these security constraints in design decisions. We have used the model driven architecture (MDA) appro...
Conference Paper
Data Warehouses (DW) manage enterprise information for the decision making process, and the establishment of security measures at all stages of the DW development process is also highly important as unauthorized users may discover vital business information. Model Driven Architecture (MDA) based approaches allow us to define models at different abs...
Article
Full-text available
The use of ontologies for representing knowledge provides us with organization, communication and reusability. Information security is a serious requirement which must be carefully considered. Concepts and relations managed by any scientific community need to be formally defined and ontological engineering supports their definition. In this paper,...
Conference Paper
Data Warehouses (DW) manage historical information for the decision making process and for enterprises, it is vitally important to consider security requirements from the earliest stages of the development process. OLAP tools are the most used tools for implementing and consulting DWs and it is necessary to define security measures to avoid that us...
Article
Data Warehouses (DWs) manage historical information for the decision-making process and for enterprises. Online Analytical Processing Applications (OLAP) tools are the most used tools for implementing and consulting DWs and it is necessary to define security measures to avoid the accessing of unauthorised information by users by executing queries....
Chapter
Information security is currently considered to be a crucial aspect of systems development. However it has traditionally been considered during the final stages of development, once the main components of the system have been developed and therefore provides solutions which are inappropriate for security integration. Software engineering has tradit...
Article
Full-text available
Data Warehouses manage vital information for the decision making process, which may be discovered by unauthorized users if we do not establish security measures in all the stages of the development process. We have proposed an MDA architecture to develop secure Data Warehouses which allows them to be modeled at different abstraction levels (busines...

Network

Cited By