Luis Enrique Sánchez Crespo

Luis Enrique Sánchez Crespo
University of Castilla-La Mancha · Departamento de Sistemas Informáticos

PhD.

About

105
Publications
61,771
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
476
Citations
Additional affiliations
September 2006 - present
University of Castilla-La Mancha
Position
  • Senior Researcher

Publications

Publications (105)
Article
Cyber-physical systems (CPSs) are smart systems that include engineered interacting networks of physical and computational components. CPSs have an increasingly presence on critical infrastructures and an impact in almost every aspect of our daily life, including transportation, healthcare, electric power, and advanced manufacturing. However, CPSs...
Article
In the last years, cyber-physical systems (CPS) are receiving substantial mainstream attention especially in industrial environments, but this popularity has been accompanied by serious security challenges. A CPS is a complex system that includes hardware and software components, with different suppliers and connection protocols, forcing complex da...
Article
Full-text available
Cyber-physical systems (CPS) are the next generation of engineered systems into which computing, communication, and control technologies are now being closely integrated. They play an increasingly important role in critical infrastructures, governments and everyday life. Security is crucial in CPS, but they were not, unfortunately, initially concei...
Conference Paper
Full-text available
The proliferation of Cyber-Physical Systems (CPSs) is raising serious security challenges. These are complex systems, integrating physical elements into automated networked systems, often containing a variety of devices, such as sensors and actuators, and requiring complex management and data storage. This makes the construction of secure CPSs a ch...
Preprint
Full-text available
Initiatives based on improving urban mobility have been traditionally a high priority. The introduction of the electric vehicle to solve the problems of congestion and pollution within cities has made it possible to solve some of these shortcomings in combustion vehicles. Nevertheless, the needs of dynamic and complex environments that need decentr...
Article
Data is one of the most important assets for all types of companies, which have undoubtedly grown their quantity and the ways of exploiting them. Big Data appears in this context as a set of technologies that manage data to obtain information that supports decision-making. These systems were not conceived to be secure, resulting in significant risk...
Article
Full-text available
Initiatives based on improving urban mobility have been traditionally a high priority. The introduction of the electric vehicle to solve the problems of congestion and pollution within cities has made it possible to solve some of these shortcomings in combustion vehicles. Nevertheless, the needs of dynamic and complex environments that need decentr...
Book
Full-text available
Este libro reúne aportes originales iberoamericanos alrededor de la Seguridad Informática. Su objetivo principal es promover y desarrollar dicha área del conocimiento, generando un escenario permanente de aprendizaje e intercambio de experiencias significativas.
Article
Full-text available
One of the most important aspects for the development of information systems is that they were interoperable, so many initiatives consider that ontologies as useful tools for their development, especially when the application is in complex and dynamic domains as the case of health. In this article, a systematic review (SR) of the existing literatur...
Article
Full-text available
Society is increasingly dependent on Information Security Management Systems (ISMS), and having these kind of systems has become vital for the development of Small and Medium-Sized Enterprises (SMEs). However, these companies require ISMS that have been adapted to their special features and have been optimized as regards the resources needed to dep...
Article
Full-text available
The information society is increasingly more dependent on Information Security Management Systems (ISMSs), and the availability of these kinds of systems is now vital for the development of Small and Medium-Sized Enterprises (SMEs). However, these companies require ISMSs that have been adapted to their special features, and which are optimized as r...
Article
During the reform of computer engineering degrees, the emergence of the concept of competence has not helped students better understand the extent to achieve the objectives of the different subjects, or to make better decisions about next steps in their careers. This article is intended to show the results obtained during the investigation, which h...
Article
Full-text available
The information society is increasingly dependent Information Systems Security Management (ISMS) and knowledge of the security risks associated with its assets value. However, very few risk analysis methodologies have been raised as to create systems to analyze risks in a quick and economical, and which in turn can leave this system dynamically upd...
Article
Full-text available
The concept of competence, which emerged during the reform of computer engineering degrees, has not brought benefits to companies when attempting to select the most suitable candidates for their jobs. This article aims to show some of the research that has been conducted to determine why companies have not found these skills useful and how both can...
Article
Companies and professionals are currently demanding increasingly more specialized profiles, and it is therefore desirable for future graduates to have obtained one or more international professional certificates in computing security and auditing, or to at least to have received the preparation required to obtain them. It is therefore of the utmost...
Conference Paper
Full-text available
One of the most common concerns in the atten-tion of patients with Parkinson's disease is an objectively eval-uation of the illness progress and the efficacy of treatments, in terms of the intensity and frequency of tremors. This symptom is produced by gradual degradation of the pigmented neurons located at the substantia nigra in the brain, in ord...
Conference Paper
Full-text available
Parkinson's Disease (PD) is a degenerative process of the central nervous system. Its main body symptoms are tremors, rigidity, bradykinesia and walking difficulty. These symptoms may increase and so it is necessary to have a constant and successful evaluation, so the PD patient may receive the appropriate treatment. There are systems that enable t...
Conference Paper
Full-text available
En una sociedad gobernada por la información, las empresas y en particular las PYMES, dependen cada vez más de la capacidad de poder asegurar la información, no sólo internamente, sino a través de terceros que estén dispuestos a establecer pólizas de seguros sobre dicha información. Pero cuando estamos hablando de activos intangibles, las asegurado...
Conference Paper
Full-text available
Desarrollando una metodología de análisis de riesgos para que el sector asegurador pueda tasar los riesgos en las PYMES Resumen—En una sociedad gobernada por la información , las empresas y en particular las PYMES, dependen cada vez más de la capacidad de poder asegurar la información , no solo internamente, sino con terceros que estén dispuestos a...
Article
Full-text available
Las empresas y los profesionales están demandando perfiles cada vez más especializados, por lo que es deseable que los futuros graduados cuenten con una o varias certificaciones profesionales internacionales en seguridad y auditoría informática, o al menos que tengan el camino preparado para conseguirlas. Por lo tanto es muy importante que los nuev...
Conference Paper
Full-text available
Free software has gained importance over the last few years, and can be found in almost any sphere in which ‘software processes’ are important. However, even when universities and higher education establishments include subjects concerning free programming and technologies in their curriculums, their graduates tend to attain limited technological,...
Conference Paper
Full-text available
Foreword The Eleventh International Workshop on Security in Information Systems – WOSIS 2014 was organized in conjunction with ICEIS 2014 in Lisbon, Portugal. As in previous years, this workshop is primarily focused on high quality and innovative research papers from different fields related to the most recent developments in Security in Informatio...
Conference Paper
Full-text available
In some sectors, where common business processes are run, quality and security of data play a paramount role. In order to better estimate if levels of quality and security of data are properly achieved, some process-focused methodological artifacts are required. Given the very nature of each sector, such artifacts should be conveniently adapted and...
Conference Paper
Full-text available
En una sociedad basada en la información, los Sistemas de Gestión de Seguridad (SGSIs) son cada vez más críticos para las empresas, pero no sólo estos sistemas, sino también la posibilidad de poder conocer con exactitud los riesgos a los que están sometidos los activos de información y el valor objetivo que tienen estos activos. El presente artícul...
Conference Paper
Full-text available
Las empresas y los profesionales están demandando perfiles cada vez más especializados, por lo que es deseable que los futuros graduados cuenten con una o varias certificaciones profesionales internacionales en seguridad y auditoría informática, o al menos que tengan el camino preparado para conseguirlas. Por lo tanto es muy importante que los nuev...
Article
Full-text available
In a globalised and competitive business environment like that of the present, companies are increasingly more dependent upon their information systems, since these systems have proved to be a highly important factor in increasing their level of competitiveness. Companies have therefore become aware that the information and the processes that suppo...
Article
We describe a data management solution and associated key management approaches to provide accountability within service provision networks, in particular addressing privacy issues in cloud computing applications. Our solution involves machine readable ...
Conference Paper
Full-text available
Foreword The Tenth International Workshop on Security in Information Systems – WOSIS 2013 was organized in conjunction with ICEIS 2013 in Angers, France. As in previous years, this workshop is primarily focused on high quality and innovative research papers from different fields related to the most recent developments in Security in Information Sys...
Chapter
The information society is increasingly more dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has become crucial to the evolution of Small and Medium-size Enterprises (SMEs). However, this type of companies requires ISMSs which have been adapted to their specific characteristics, and these system...
Chapter
Detecting malicious software or malware is one of the major concerns in information security governance as malware authors pose a major challenge to digital forensics by using a variety of highly sophisticated stealth techniques to hide malicious code in computing systems, including smartphones. The current detection techniques are futile, as foren...
Chapter
Nowadays, there is an increasing dependence on information and on the systems that provide such information. So, for many organizations, the information and technology that supports them represent the most valuable assets of the company. Research on Information Technology (IT) management practices in many organizations around the world has revealed...
Article
Full-text available
There is currently a need to optimize the levels of perceived quality in most public services. Some of the most critical services are those related to Health, since health and welfare are fundamental to the population as a whole. Both public and private Health organizations are therefore interested in quantifying how good their services are, and to...
Book
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding of the risks and prospects of IT sec...
Conference Paper
Full-text available
La sociedad de la información cada vez depende más de los Sistemas de Gestión y Análisis del Riesgo al que se encuentran sometidos sus principales activos de información, y poder disponer de estos sistemas ha llegado a ser vital para la evolución de las PYMES. Sin embargo, este tipo de compañías requiere que estos sistemas estén adaptados a sus esp...
Conference Paper
Full-text available
The process of writing honours theses is based on a set of general and specific competences which, in the majority of cases, entail a high level of abstraction and ambiguity. What is more, the apparition of these competences has not helped students towards a better understanding of the extent to which they attain the objectives of their various sub...
Conference Paper
Full-text available
As a result of the growing dependence of information society on ICTs, the need to know the risks that can affect information is enormously increasing with the purpose of protecting it. This article shows advances in the identification and management of risks in ICTs, particularly in the case of SMEs, along with the first proposal of a methodology f...
Article
Full-text available
In a society based on information, the Safety Management Systems (ISMS) are increasingly critical for businesses. Within the Management of Information Security issues are very critical in certain sectors, such as the processing of personal data for the Health Sector, where a bad use of them can mean irreparable damage to their owners and organizati...
Article
Full-text available
Since their beginning companies establish procedures to observe their competitors. Methods for obtaining this kind of information have evolved with the internet era; a plethora of tools is nowadays available for this job. As a consequence, a new problem has risen: documentary noise, keeping companies from being able to process and benefit from the...
Article
Full-text available
Information Systems Security is one of the most pressing challenges facing all kinds of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in maintaining their information secure, avoiding unauthorized access, preventing intru...
Article
Full-text available
La sociedad de la información cada vez depende más de los Sistemas de Gestión de la Seguridad de la Información (SGSI), y poder disponer de estos sistemas ha llegado a ser vital para la evolución de las PYMES. Sin embargo, este tipo de compañías requiere de SGSIs adaptados a sus especiales características, y que estén optimizados desde el punto de...
Conference Paper
Full-text available
Foreword The Ninth International Workshop on Security in Information Systems – WOSIS 2012 was organized in conjunction with ICEIS 2012 in Wroclaw, Poland. As in previous years, this workshop is primarily focused on high quality and innovative research papers from different fields related to the most recent developments in Security in Information Sy...
Conference Paper
Full-text available
Actualmente cientos de negocios clásicos se están reconvirtiendo a negocio de internet, pero la rapidez con la que esta transformación se ha producido, ha dado lugar a que muchos de estos negocios carezcan de las medidas de seguridad necesarias para proteger esos nuevos negocios. El problema se ve agravado, ya que mientras que es fácil conocer como...
Conference Paper
Full-text available
The information society is ever-increasingly dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has come to be vital to the evolution of SMEs. However, this type of companies requires ISMSs which have been adapted to their particular characteristics, and which are optimised from the point of view o...
Conference Paper
Full-text available
In a society based on information, the Information Security Management Systems (ISMSs) are increasingly critical for businesses. Within the Management of Information Security issues are very critical in certain sectors, such as processing of personal data for the Health Sector where the misuse of them can mean irreparable damage to their owners and...
Conference Paper
Full-text available
El proceso de elaboración de las memorias de grado (en concreto en el caso del Grado en Ingeniería Informática), se ha basado en un conjunto de competencias generales y específicas, que en la mayoría de los casos entrañan un alto nivel de abstracción y ambigüedad. Este hecho ha dificultado considerablemente la forma de asociar asignaturas con compe...
Conference Paper
Full-text available
Con la implantación del Grado en Ingeniería Informática, se ha elaborado una memoria donde se recogen, entre otras cosas, información sobre su organización en módulos, que a su vez contiene materias, y que éstas están formadas por asignaturas, que son definidas en términos de unos descriptores generales. Para estas asignaturas, se incluye también i...
Conference Paper
Full-text available
Security awareness has spread inside many organizations leading them to tackle information security not just as a technical matter, but from a corporate point of view. Information Security Governance (ISG) provides enterprises with means of dealing with the security of their information assets in a comprehensive manner, involving every stakeholder...
Conference Paper
Full-text available
The information society is ever-increasingly dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has come to be vital to the evolution of SMEs. However, this type of companies requires ISMSs which have been adapted to their particular characteristics, and which are optimised from the point of view o...
Chapter
The information society is increasingly more dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has become crucial to the evolution of Small and Medium-size Enterprises (SMEs). However, this type of companies requires ISMSs which have been adapted to their specific characteristics, and these system...
Article
Full-text available
A menudo, la llamada a los pacientes para consulta, en los hospitales o centros sanitarios, se realiza de viva voz (Difusión de datos). Sin embargo, tanto la difusión como la publicación de los nombres de los pacientes que acuden a una consulta vulnera el artículo 10 de la actual Ley Orgánica de Protección de Datos (LOPD), lo cual, constituye una f...
Conference Paper
Full-text available
Information Society depends more and more on Information Security Management Systems (ISMSs) and the availability of these systems has become vital for SMEs’ evolution. However, this kind of companies need that ISMSs are adapted to their special characteristics as well as optimized from the viewpoint of the necessary resources to implement and main...
Article
Full-text available
La sociedad de la información cada vez depende más de los Sistemas de Gestión de la Seguridad de la Información (SGSI), y poder disponer de estos sistemas ha llegado a ser vital para la evolución de las PYMES. Sin embargo, este tipo de compañías requiere de SGSIs adaptados a sus especiales características, y que estén optimizados desde el punto de...
Conference Paper
Full-text available
The information society depends ever-increasingly on Information Security Management Systems (ISMSs), and these systems have become vital to SMEs. However, ISMSs must be adapted to SME’s specific characteristics, and they must be optimised from the point of view of the resources which are necessary to install and maintain them. Furthermore, when in...
Article
Full-text available
The software industry needs highly qualified professionals who, in addition to a sound university education, also require professional qualifications which are difficult to attain in university lecture rooms. These professional qualifications, which are so highly regarded by businesses, are more specifically professional certification which groups...
Conference Paper
Full-text available
La sociedad de la información cada vez depende más de los Sistemas de Gestión y Análisis del Riesgo al que se encuentran sometidos sus principales activos de información, y poder disponer de estos sistemas ha llegado a ser vital para la evolución de las PYMES. Sin embargo, este tipo de compañías requiere que estos sistemas estén adaptados a sus esp...
Conference Paper
Full-text available
La sociedad de la información cada vez depende más de los Sistemas de Gestión de la Seguridad de la Información (SGSI), y poder disponer de estos sistemas ha llegado a ser vital para la evolución de las PYMES. Sin embargo, este tipo de compañías requiere de SGSIs adaptados a sus especiales características, y que estén optimizados desde el punto de...
Conference Paper
Full-text available
La importancia de tener en cuenta la seguridad como requisito no funcional en el éxito de un producto software (PS) es un hecho cada día más notable. Existen varios estándares y aproximaciones en la comunidad científica a la definición de la seguridad como elemento de calidad de un PS, sin embargo existen diferencias y falta de cohesión entre ellas...
Conference Paper
Full-text available
The information society is increasingly more dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has become crucial to the evolution of Small and Medium-size Enterprises (SMEs). However, this type of Companies requires ISMSs which have been adapted to their specific characteristics. In this paper we...