Jose Fran. Ruiz
Jose Fran. Ruiz
Verified email at
TitleCited byYear
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components
JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin
2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012
Privacy requirements: findings and lessons learned in developing a privacy platform
M Gharib, M Salnitri, E Paja, P Giorgini, H Mouratidis, M Pavlidis, JF Ruiz, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 256-265, 2016
Towards computer-oriented security patterns
A Maña, EB Fernandez, JF Ruiz, C Rudolph
Proceedings of the 20th Conference on Pattern Languages of Programs, 13, 2013
A lifecycle for data sharing agreements: how it works out
JF Ruiz, M Petrocchi, I Matteucci, G Costantino, C Gambardella, M Manea, ...
Annual Privacy Forum, 3-20, 2016
Secure engineering and modelling of a metering devices system
JF Ruiz, M Arjona, A Maña, N Carstens
2013 International Conference on Availability, Reliability and Security, 418-427, 2013
Development of applications based on security patterns
D Serrano, JF Ruiz, A Munoz, A Mana, A Armenteros, BGN Crespo
2009 Second International Conference on Dependability, 111-116, 2009
Security engineering and modelling of set-top boxes
JF Ruiz, A Rein, M Arjona, A Maña, A Monsifrot, M Morvan
2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom …, 2012
Security knowledge representation artifacts for creating secure IT systems
JF Ruiz, M Arjona, A Maña, C Rudolph
Computers & Security 64, 69-91, 2017
Security Patterns for Local Assurance in Cloud Applications
M Arjona, J Fran, A Maña
Academy of Science and Engineering (ASE), USA,© ASE 2014, 2014
A security engineering process for systems of systems using security patterns
JF Ruiz, C Rudolph, A Maña, M Arjona
2014 IEEE International Systems Conference Proceedings, 8-11, 2014
Emergency systems modelling using a security engineering process
JF Ruiz, A Mana, M Arjona, J Paatero
3rd International Conference on Simulation and Modeling Methodologies …, 2013
El Libellus de Medicinalibus Indorum Herbis, un legado farmacéutico del colegio de la Santa Cruz de Tlatelolco
JFS Ruiz, VI Pérez, MET Rosales, W Koch, JLAM Guevara, VH Abad, ...
Revista Mexicana de Ciencias Farmacéuticas 38 (4), 30-36, 2007
Executive summary: consensus document of GEHEP of the Spanish Society of Infectious Diseases and Clinical Microbiology (SEIMC), along with SOCIDROGALCOHOL, SEPD and SOMAPA on …
JA Pineda, B Climent, F García, MG Deltoro, R Granados, F Gómez, ...
Enfermedades infecciosas y microbiologia clinica, 2018
An integrated security and systems engineering process and modelling framework
JF Ruiz, A Maña, C Rudolph
The Computer Journal 58 (10), 2328-2350, 2015
Introducing security building block models
A Rein, C Rudolph, JF Ruiz, M Arjona
2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom …, 2012
Progressive multifocal leukoencephalopathy in a patient with acute myeloid leukaemia after allogeneic hematopoietic-cell transplantation
M Fernandez-Ruiz, J Ruiz, F López-Medrano
Enfermedades infecciosas y microbiologia clinica 29 (8), 636-637, 2011
Concurrent progressive multifocal leukoencephalopathy and central nervous system infiltration by multiple myeloma: A case report
Y Ruiz-Heredia, B Sanchez-Vega, S Barrio, M Linares, I Rapado, ...
Journal of Oncology Pharmacy Practice 25 (4), 998-1002, 2019
A holistic approach for privacy protection in E-government
K Angelopoulos, V Diamantopoulou, H Mouratidis, M Pavlidis, M Salnitri, ...
Proceedings of the 12th International Conference on Availability …, 2017
A security modelling framework for systems of embedded components
A Mana, JF Ruiz
2011 IEEE 13th International Symposium on High-Assurance Systems Engineering …, 2011
A security-focused engineering process for systems of embedded components
JF Ruiz, R Harjani, A Maña
Proceedings of the International Workshop on Security and Dependability for …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20