Jose M. del Alamo
Jose M. del Alamo
Associate Professor (UPM)
Dirección de correo verificada de - Página principal
Citado por
Citado por
PRIPARE: integrating privacy best practices into a privacy engineering methodology
N Notario, A Crespo, YS Martín, JM Del Alamo, D Le Métayer, T Antignac, ...
2015 IEEE Security and Privacy Workshops, 151-158, 2015
Programming assignments automatic grading: review of tools and implementations
JC Caiza, JM Del Alamo
7th international technology, education and development conference …, 2013
Method for selectively distributing information in a computer or communication network, and physical entities therefor
MAM Llorente, JMDÁ Ramiro, BSM González, RT Burgos, JCY García
US Patent App. 13/809,503, 2013
Privacy engineering: Shaping an emerging field of research and practice
S Gürses, JM Del Alamo
IEEE Security & Privacy 14 (2), 40-46, 2016
Method for managing access to protected resources in a computer network, physical entities and computer programs therefor
MAM Llorente, JMDÁ Ramiro, JCY García
US Patent 8,595,494, 2013
A user-centric service creation approach for Next Generation Networks
JC Yelmo, JM Del Alamo, R Trapero, P Falcarin, J Yu, B Carro, ...
Innovations in NGN: Future Network and Services, 2008. K-INGN 2008. First …, 2008
Method for managing access to protected resources and delegating authority in a computer network
MAM Llorente, JMDÁ Ramiro, JCY García
US Patent 8,819,784, 2014
A user-centric approach to service creation and delivery over next generation networks
JC Yelmo, JM del Álamo, R Trapero, YS Martín
Computer Communications 34 (2), 209-222, 2011
User-driven service lifecycle management–adopting internet paradigms in telecom services
JC Yelmo, R Trapero, JM del Álamo, J Sienel, M Drewniok, I Ordás, ...
International conference on service-oriented computing, 342-352, 2007
A system of privacy patterns for user control
M Colesky, JC Caiza, JM Del Alamo, JH Hoepman, YS Martín
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1150-1156, 2018
Engineering privacy requirements valuable lessons from another realm
YS Martín, JM Del Alamo, JC Yelmo
2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014
Reusable elements for the systematic design of privacy-friendly information systems: A mapping study
JC Caiza, YS Martín, DS Guamán, JM Del Alamo, JC Yelmo
IEEE Access 7, 66512-66535, 2019
Organizing design patterns for privacy: a taxonomy of types of relationships
JC Caiza, YS Martín, JM Del Alamo, DS Guamán
Proceedings of the 22nd European Conference on Pattern Languages of Programs …, 2017
A Metamodel for Privacy Engineering Methods.
YS Martin, JM Del Alamo
IWPE@ SP, 41-48, 2017
Pripare: a new vision on engineering privacy and security by design
N Notario, A Crespo, A Kung, I Kroener, D Le Métayer, C Troncoso, ...
Cyber Security and Privacy Forum, 65-76, 2014
Identity management and web services as service ecosystem drivers in converged networks
JC Yelmo, R Trapero, JM Del Alamo
IEEE Communications Magazine 47 (3), 174-180, 2009
A privacy-considerate framework for identity management in mobile services
JM Del Álamo, AM Fernández, R Trapero, JC Yelmo, MA Monjas
Mobile Networks and Applications 16 (4), 446-459, 2011
A proposal for enhancing the motivation in students of computer programming
B San Miguel González, S Aguirre Herrera, JM Álamo Ramiro, ...
IATED, 2012
A User-centric mobile service creation approach converging telco and IT services
J Yu, P Falcarin, JM Del Álamo, J Sienel, QZ Sheng, JF Mejia
2009 Eighth International Conference on Mobile Business, 238-242, 2009
Self-service privacy: User-centric privacy for network-centric identity
JM del Alamo, MA Monjas, JC Yelmo, B San Miguel, R Trapero, ...
IFIP International Conference on Trust Management, 17-31, 2010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20