Ángel Jesús Varela Vaca

Profesor Contratado Doctor
ajvarela@us.es
Área de conocimiento: Lenguajes y Sistemas Informáticos
Departamento: Lenguajes y Sistemas Informáticos
Grupo: Data-centric Computing Research Hub (TIC-258)
Instituto de Inv.: I3US
Tipo Año Título Fuente
Artículo2022 A domain-specific language for the specification of UCON policies Journal of Information Security and Applications
Capítulo2021 A NLP-oriented methodology to enhance event log quality Enterprise, Business-Process and Information Systems Modeling
Artículo2021 Blockchain-based federation of wireless sensor nodes JOURNAL OF SUPERCOMPUTING
Artículo2021 CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems COMPUTERS IN INDUSTRY
Ponencia2021 CC4Spark: distributing event logs and big complex conformance checking problems CEUR Workshop Proceedings
Artículo2021 Data curation in the Internet of things: a decision model approach Computational and Mathematical Methods
Artículo2021 Discovering configuration workflows from existing logs using process mining EMPIRICAL SOFTWARE ENGINEERING
Artículo2021 DMN4DQ: when data quality meets DMN DECISION SUPPORT SYSTEMS
Artículo2021 Empowering conformance checking using Big Data through horizontal decomposition INFORMATION SYSTEMS
Artículo2021 Smart contract languages: a multivocal mapping study ACM COMPUTING SURVEYS
Ponencia2020 AMADEUS: Towards the AutoMAteD secUrity teSting ACM International Conference Proceeding Series
Artículo2020 Blockchain from the perspective of privacy and anonymisation: a systematic literature review SENSORS
Ponencia2020 Chamaleon: Framework to improve data wrangling with complex data 40th International Conference on Information Systems, ICIS 2019
Ponencia2020 Definition and verification of security configurations of cyber-physical systems Lecture Notes in Computer Science
Artículo2020 Measuring data-centre workflows complexity through process mining: the Google cluster case JOURNAL OF SUPERCOMPUTING
Artículo2020 Unleashing constraint optimisation problem solving in Big Data environments JOURNAL OF COMPUTATIONAL SCIENCE
Artículo2019 A framework to secure the development and auditing of SSL pinning in mobile applications: the case of Android devices ENTROPY
Artículo2019 Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models IEEE ACCESS
Artículo2019 CyberSPL: A framework for the verification of cybersecurity policy compliance of system configurations using software product lines APPLIED SCIENCES-BASEL
Ponencia2019 CyberSPL: Plataforma para la verificación del cumplimiento de políticas de ciberseguridad en configuraciones de sistemas usando modelos de características Actas de las V Jornadas Nacionales de Ciberseguridad Junio 5-7, 2019, Cáceres
Ponencia2019 DMN for Data Quality Measurement and Assessment Lecture Notes in Business Information Processing
Ponencia2019 Enabling process mining in aircraft manufactures: Extracting event logs and discovering processes from complex data CEUR Workshop Proceedings
Ponencia2019 Guidelines towards secure SSL pinning in mobile applications Actas de las V Jornadas Nacionales de Ciberseguridad Junio 5-7, 2019, Cáceres
Ponencia2019 Process mining to unleash variability management: discovering configuration workflows using logs SPLC'19: PROCEEDINGS OF THE 23RD INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, VOL A
Artículo2018 Business Process Configuration According to Data Dependency Specification APPLIED SCIENCES-BASEL
Capítulo2018 FABIOLA: Towards the resolution of constraint optimization problems in big data environment Lecture Notes in Information Systems and Organisation
Ponencia2017 FABIOLA: Defining the components for constraint optimization problems in big data environment Information Systems Development: Advances in Methods, Tools and Management - Proceedings of the 26th International Conference on Information Systems Development, ISD 2017
Ponencia2017 FABIOLA: Herramienta para la Optimización de Problemas en entornos de Big Data Actas de las 22nd Jornadas de Ingenier�a del Software y Bases de Datos, JISBD 2017
Ponencia2017 Governance knowledge management and decision support using fuzzy governance maps Lecture Notes in Business Information Processing
Ponencia2017 Guiding the creation of choreographed processes with multiple instances based on data models Lecture Notes in Business Information Processing
Ponencia2016 A usage control model extension for the verification of security policies in artifact-centric business process models BUSINESS INFORMATION SYSTEMS (BIS 2016)
Ponencia2016 OPBUS: A framework for improving the dependability of risk-aware business processes AI COMMUNICATIONS
Ponencia2015 An open-source proactive security infrastructure for Business Process Management Proceedings of the 26th International Business Information Management Association Conference - Innovation Management and Sustainable Economic Competitive Advantage: From Regional Development to Global Growth, IBIMA 2015
Artículo2015 Formalization of security patterns as a means to infer security controls in business processes Logic Journal of the IGPL
Ponencia2015 Towards Automatic Integration of Information Security Governance and Management using a BPMS approach Actas de las primeras Jornadas Nacionales de Investigación en Ciberseguridad: León, 14, 15, 16 de septiembre de 2015: I JNIC2015
Ponencia2013 A security pattern-driven approach toward the automation of risk treatment in business processes INTERNATIONAL JOINT CONFERENCE CISIS'12 - ICEUTE'12 - SOCO'12 SPECIAL SESSIONS
Ponencia2013 CombiS-BP Editor: Combining Declarative and Imperative Languages in BP Modelling 2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS)
Ponencia2013 CombiS-BP editor: Combining declarative and imperative languages in BP modelling: Demonstration paper 2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS)
Artículo2013 Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach INFORMATION AND SOFTWARE TECHNOLOGY
Artículo2012 CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework JOURNAL OF SYSTEMS AND SOFTWARE
Artículo2012 Improvement of Optimization Agreements in Business Processes involving Web Services IBIMA Communications
Ponencia2011 A Model-Driven engineering approach with diagnosis of non-conformance of security objectives in business process models 2011 fifth international conference on research challenges in information science
Ponencia2011 An Approach For Optimization Agreements In Business Processes Based On Web Services CREATING GLOBAL COMPETITIVE ECONOMIES: A 360-DEGREE APPROACH, VOLS 1-4
Ponencia2011 Contract-based test generation for data flow of business processes using constraint programming 2011 fifth international conference on research challenges in information science
Ponencia2011 OPBUS: RISK-AWARE FRAMEWORK FOR THE CONFORMANCE OF SECURITY-QUALITY REQUIREMENTS IN BUSINESS PROCESSES SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
Ponencia2010 A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA)
Ponencia2010 OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS 2010
Ponencia2010 Towards dependable business processes with fault-tolerance approach Proceedings - 3rd International Conference on Dependability, DEPEND 2010
Ponencia2009 AFPL2, An Abstract Language for Firewall ACLs with NAT support DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY
Ponencia2009 EFFICIENT ALGORITHMS AND ABSTRACT DATA TYPES FOR LOCAL INCONSISTENCY ISOLATION IN FIREWALL ACLS SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
Ponencia2009 MDA-based framework for automatic generation of consistent firewall ACLs with NAT COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II
Ponencia2008 Fast algorithms for local inconsistency detection in firewall ACL updates Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.
Ponencia2008 Polynomial heuristic algorithms for inconsistency characterization in firewall rule sets Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.

Proyectos de Investigación

Fecha de inicio Fecha de fin Rol Denominación Agencia financiadora
01/01/2010 31/12/2014 Investigador/a Técnicas para la diagnosis, confiabilidad y optimización en los sistemas de gestión de procesos de negocio (TIN2009-13714) Ministerio de Ciencia e Innovación (Nacional)
01/09/2021 31/08/2025 Responsable Aether-US:Una aproximación holística de smart data para el análisis de datos guiado por el contexto: procesos de negocio inteligentes (PID2020-112540RB-C44) Ministerio de Ciencia e Innovación (Nacional)
01/10/2006 30/09/2009 Investigador/a Automatización de la detección, diagnosis y tolerancia a fallos en sistemas con incertidumbre y en sistemas distribuidos (DPI2006-15476-C02-01) Ministerio de Educación y Ciencia (Nacional)
05/10/2021 31/12/2022 Investigador/a COPERNICA: Colaboración en procesos de negocio para el buen gobierno de servicios y datos compartidos (P20_01224) Consejería de Economía, Conocimiento, Empresas y Universidad (Autonómico)
01/01/2019 30/06/2021 Investigador/a Eclipse - Mejora de la Calidad de Datos y la Seguridad en Sistemas Ciberfísicos para Enriquecer los Procesos de Negocio y las Decisiones Estratégicas (RTI2018-094283-B-C33) Ministerio de Ciencia, Innovación y Universidades (Nacional)
01/01/2016 31/12/2018 Investigador/a Sequoia-US: Support Intelligent Decisions for Business Processes Requirements Based on Big Data and Multiple Instances (TIN2015-63502-C3-2-R) Ministerio de Economía y Competitividad (Nacional)

Contratos

Fecha de inicio Fecha de fin Rol Denominación Agencia financiadora
09/09/2019 31/12/2020 Investigador/a Clean Sky 2: A-24 One Step Beyond Onautomated Testing Technologies (P036-19/E08) Airbus Defence and Space S.A. (Local)
07/03/2018 31/12/2018 Investigador/a Clean Sky 2: A-24 ONE STEP BEYOND ON AUTOMATED TESTING TECHNOLOGIES (P011-18/E08) Airbus Defence and Space S.A. (Local)
01/02/2016 01/04/2016 Responsable Extensión de Wonder: Módulo para la generación de etiquetas virtuales de manera segura. (P084-16/E08) On Time Transporte Y Logistica, S.L. (Nacional)
02/01/2015 30/07/2015 Responsable WONDER: Diseño y Desarrollo de Plataforma ciega intermodal de reposición de incidencias y reasignación de envíos para el sector logístico. (P001-15/E08) On Time Transporte Y Logistica, S.L. (Nacional)
31/05/2019 31/03/2021 Investigador/a Troubleshooting para Sistemas Ciberfísicos (P033-19/E08) Airtificial Aerospace & Defense Engineering, SAU (Local)
El investigador no tiene ningún resultado de investigación asociado