David Fernández González's research while affiliated with Universidad de León and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (4)
Current Continuous Integration (CI) processes face significant intrinsic cybersecurity challenges. The idea is not only to solve and test formal or regulatory security requirements of source code but also to adhere to the same principles to the CI pipeline itself. This paper presents an overview of current security issues in CI workflow. It designs...
Virtual desktops in cloud scenarios play a significant role in higher education. Nowadays, the idea of moving laboratories to the cloud seems mandatory and it is necessary to maintain students’ commitment in this new scenario. This paper aims at two targets, customizing a Virtual Desktop platform for delivering the laboratories of a programming cou...
Current Continuous Integration processes face significant intrinsic cybersecurity challenges. The idea is not only to solve and test formal or regulatory security requirements of source code but also to adhere to the same principles to the CI pipeline itself. This paper presents an overview of current security issues in CI workflow. It designs, dev...
Containerization solutions have spread widely in the industry due to their ease of deployment, agility, and portability. However, its adoption is not without challenges and difficulties in the field of security. This paper presents an overview of the vulnerabilities present in the application containerization solutions, paying special attention to...
Citations
... Afterward, the Horizon Client establishes a protocol session with Horizon Agent in a Remote Desktop Service Host (RDSH) server via the gateway service on the UAG. External access goes into greater depth on this procedure [25], [12], and [19]. ...