Jose M. del Alamo
Jose M. del Alamo
Associate Professor (UPM)
Verified email at upm.es - Homepage
Title
Cited by
Cited by
Year
PRIPARE: integrating privacy best practices into a privacy engineering methodology
N Notario, A Crespo, YS Martín, JM Del Alamo, D Le Métayer, T Antignac, ...
2015 IEEE Security and Privacy Workshops, 151-158, 2015
872015
Method for selectively distributing information in a computer or communication network, and physical entities therefor
MAM Llorente, JMDÁ Ramiro, BSM González, RT Burgos, JCY García
US Patent App. 13/809,503, 2013
862013
Programming assignments automatic grading: review of tools and implementations
JC Caiza, JM Del Alamo
7th international technology, education and development conference …, 2013
852013
Privacy engineering: Shaping an emerging field of research and practice
S Gürses, JM Del Alamo
IEEE Security & Privacy 14 (2), 40-46, 2016
742016
A user-centric service creation approach for Next Generation Networks
JC Yelmo, JM Del Alamo, R Trapero, P Falcarin, J Yu, B Carro, ...
Innovations in NGN: Future Network and Services, 2008. K-INGN 2008. First …, 2008
382008
Method for managing access to protected resources in a computer network, physical entities and computer programs therefor
MAM Llorente, JMDÁ Ramiro, JCY García
US Patent 8,595,494, 2013
372013
Method for managing access to protected resources and delegating authority in a computer network
MAM Llorente, JMDÁ Ramiro, JCY García
US Patent 8,819,784, 2014
352014
A user-centric approach to service creation and delivery over next generation networks
JC Yelmo, JM del Álamo, R Trapero, YS Martín
Computer Communications 34 (2), 209-222, 2011
292011
User-driven service lifecycle management–adopting internet paradigms in telecom services
JC Yelmo, R Trapero, JM del Álamo, J Sienel, M Drewniok, I Ordás, ...
International conference on service-oriented computing, 342-352, 2007
282007
A system of privacy patterns for user control
M Colesky, JC Caiza, JM Del Alamo, JH Hoepman, YS Martín
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1150-1156, 2018
222018
Engineering privacy requirements valuable lessons from another realm
YS Martín, JM Del Alamo, JC Yelmo
2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014
222014
Organizing design patterns for privacy: a taxonomy of types of relationships
JC Caiza, YS Martín, JM Del Alamo, DS Guamán
Proceedings of the 22nd European Conference on Pattern Languages of Programs …, 2017
142017
Pripare: a new vision on engineering privacy and security by design
N Notario, A Crespo, A Kung, I Kroener, D Le Métayer, C Troncoso, ...
Cyber Security and Privacy Forum, 65-76, 2014
142014
A Metamodel for Privacy Engineering Methods.
YS Martin, JM Del Alamo
IWPE@ SP, 41-48, 2017
132017
Reusable elements for the systematic design of privacy-friendly information systems: A mapping study
JC Caiza, YS Martín, DS Guamán, JM Del Alamo, JC Yelmo
IEEE Access 7, 66512-66535, 2019
122019
Identity management and web services as service ecosystem drivers in converged networks
JC Yelmo, R Trapero, JM Del Alamo
IEEE Communications Magazine 47 (3), 174-180, 2009
122009
A privacy-considerate framework for identity management in mobile services
JM Del Álamo, AM Fernández, R Trapero, JC Yelmo, MA Monjas
Mobile Networks and Applications 16 (4), 446-459, 2011
112011
A proposal for enhancing the motivation in students of computer programming
B San Miguel, S Aguirre, J del Alamo, M Cortés
ICERI2012 Proceedings, 1157-1164, 2012
102012
A User-centric mobile service creation approach converging telco and IT services
J Yu, P Falcarin, JM Del Álamo, J Sienel, QZ Sheng, JF Mejia
2009 Eighth International Conference on Mobile Business, 238-242, 2009
102009
Self-service privacy: User-centric privacy for network-centric identity
JM del Alamo, MA Monjas, JC Yelmo, B San Miguel, R Trapero, ...
IFIP International Conference on Trust Management, 17-31, 2010
92010
The system can't perform the operation now. Try again later.
Articles 1–20