Francisco A Moyano | UTN (original) (raw)
Papers by Francisco A Moyano
Resumen. El hospital Joseph Líster es el primer hospital público de la provincia de Entre Ríos en... more Resumen. El hospital Joseph Líster es el primer hospital público de la provincia de Entre Ríos en informatizar las historias clínicas de sus pacientes empleando el sistema de gestión hospitalaria GNU Health. Objetivo: presentar las adecuaciones del sistema para adaptarlo a las necesidades del hospital y evolución de los registro sanitarios a los 32 meses de la implementación. Metodología: se describen las adaptaciones realizadas para adecuarlo a los procesos de la institución. Se presenta la evolución del registro de los pacientes hospitalarios al sistema informático y el grado de adhesión de los profesionales en el uso del sistema. Resultados: El sistema después de 32 meses de implementación tiene registrado 5542 usuarios de los servicios brindado por el hospital. En los primeros 16 meses se crearon 2470 HCE (el 73% del total) y durante el último año se crearon en promedio 89 nuevas HCE por mes. En la actualidad pueden registrar sus prácticas sanitarias en el sistema alrededor de 5...
Universidad de Malaga. Campus de Excelencia Internacional Andalucia Tech. Supported by FIS-PI15/0... more Universidad de Malaga. Campus de Excelencia Internacional Andalucia Tech. Supported by FIS-PI15/00796 (AG), FIS-PI15/00957(JV) and co-financed by FEDER funds from European Union.
Laboratorio de Arte, 1991
la ampliación posterior de 1782, y finalmente la restauración de 1945. Asimismo se dan a conocer ... more la ampliación posterior de 1782, y finalmente la restauración de 1945. Asimismo se dan a conocer las marcas de la obra, los patronos que la pagaron, y los artistas que la realizaron. Junto con los esquemas ideales y reales de la pieza se aporta la documentación correspondiente a ella. New information is presented concerning the Baena processional custodial, analysing the initial work of 1737, the further additions of 1782 and, finally, the 1945 restoration. An account is also given of the hallmarks, the patrons who financed the work and the artists who carried it out. The corresponding documentation is provided, together with the original and the final sketches of the piece.
Future Internet (FI) applications are the result of composing services and data from different pa... more Future Internet (FI) applications are the result of composing services and data from different parties. The development of such kind of applications often involves multiple stakeholders, whose requirements might partially conflict with others'. This raises the need of new techniques to identify all stakeholders and their high-level requirements, as well as potential conflicts. Moreover, since these parties do not necessarily fully trust each other, it is also important to identify potential threats within FI applications. In this deliverable we present a framework including the modelling and analyses which support the requirements engineers: (1) in the elicitation of stakeholders and their requirements, (2) in the identification of potential conflicts among their requirements, and (3) in the identification of potential risks associated with stakeholders' assets. The framework employs and extends the Si* modelling language and UML profile with trust and reputation constructs. These modelling languages are used as basis to produce a catalogue of patterns that provides support to the security requirements engineers in identifying possible conflicts and threats. We also present a systematic methodology to apply these patterns to elicit and analyse security requirements for FI applications. We further address the system sustainability by taking into account the evolutionary aspect of the development process. We use change scenarios to express the co-evolution of requirements and architectures. We model these scenarios by using the extended version of the Si* modelling language. By prioritizing change scenario instances, software architects can be able to select a suitable solution (i.e., an implementation choice) that will enable the co-evolution happens while limiting the impact on the system.
2013 International Conference on Availability, Reliability and Security, 2013
The number of insider threats hitting organizations and big enterprises is rapidly growing. Insid... more The number of insider threats hitting organizations and big enterprises is rapidly growing. Insider threats occur when trusted employees misuse their permissions on organizational assets. Since insider threats know the organization and its processes, very often they end up undetected. Therefore, there is a pressing need for organizations to adopt preventive mechanisms to defend against insider threats. In this paper, we propose a framework for insiders identification during the early requirement analysis of organizational settings and of its IT systems. The framework supports security engineers in the detection of insider threats and in the prioritization of them based on the risk they represent to the organization. To enable the automatic detection of insider threats, we extend the SI* requirement modeling language with an asset model and a trust model. The asset model allows associating security properties and sensitivity levels to assets. The trust model allows specifying the trust level that a user places in another user with respect to a given permission on an asset. The insider threats identification leverages the trust levels associated with the permissions assigned to users, as well as the sensitivity of the assets to which access is granted. We illustrate the approach based on a patient monitoring scenario.
Information Sciences, 2017
The Internet of Things (IoT) is a paradigm based on the interconnection of everyday objects. It i... more The Internet of Things (IoT) is a paradigm based on the interconnection of everyday objects. It is expected that the 'things' involved in the IoT paradigm will have to interact with each other, often in uncertain conditions. It is therefore of paramount importance for the success of IoT that there are mechanisms in place that help overcome the lack of certainty. Trust can help achieve this goal. In this paper, we introduce a framework that assists developers in including trust in IoT scenarios. This framework takes into account trust, privacy and identity requirements as well as other functional requirements derived from IoT scenarios to provide the different services that allow the inclusion of trust in the IoT.
International Journal of Intelligent Systems and Applications, 2013
Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific ... more Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The epassport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris). A passport contains the important personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic passport is not only to expedite processing at border crossings, but also to increase security. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.
Cambio 16, 2007
Todo esta listo ya en Cordoba para acoger la cita internacional por excelencia de la guitarra, po... more Todo esta listo ya en Cordoba para acoger la cita internacional por excelencia de la guitarra, por donde pasaran durante la primera quincena de julio artistas de la talla de Paco de Lucia, Pat Metheny o Serrat y Sabina
Cambio 16, 2012
Todo esta listo en Jerez para que el 24 de febrero de comienzo una nueva edicion de un certamen q... more Todo esta listo en Jerez para que el 24 de febrero de comienzo una nueva edicion de un certamen que, por meritos propios, es referente universal del flamenco.
Cambio 16, 2014
Todo esta preparado un ano mas para que la ciudad andaluza se convierta en el punto de referencia... more Todo esta preparado un ano mas para que la ciudad andaluza se convierta en el punto de referencia mundial para los amantes del baile flamenco. Del 21 de febrero al 8 de marzo, los artistas mas importantes del panorama internacional presentan sus ultimos trabajos, entre la tradicion y lo mas rompedor.
Revista De Historia Militar, 2008
Cambio 16, 2011
El Teatro Villamarta de Jerez recibe estos dias sus ultimos retoques para acoger una de las citas... more El Teatro Villamarta de Jerez recibe estos dias sus ultimos retoques para acoger una de las citas mas importantes a nivel mundial del baile flamenco. El XV Festival de Jerez echara a andar el proximo 25 de febrero con un cartel envidiable. Los mejores artistas del momento se daran cita aqui hasta el 12 de marzo para presentar sus nuevos espectaculos en una ciudad que ha hecho de este certamen un icono de identidad muh particular. Antonio El Pipa, La Farruca, Javier Latorre, Miguel Poveda... La lista de primeras figuras se hace interminable.
Cambio 16, 2005
El presidente andaluz entrega a Fosforito la llave de Oro del Cante, la segunda que la Junta conc... more El presidente andaluz entrega a Fosforito la llave de Oro del Cante, la segunda que la Junta concede en 20 anos tras la de Camaron.
Cambio 16, 2010
El ayuntamiento cordobes de Palma del Rio ha reconocido la decisiva labor de la Pena Flamenca La ... more El ayuntamiento cordobes de Palma del Rio ha reconocido la decisiva labor de la Pena Flamenca La Solea en defensa del flamenco durante su treinta aniversario a traves de la Semana Cultural, que ha servido para que estudiosos como Felix Grande ensalcen el papel jugado por esta entidad en la promocion de este arte patrimonio de todos.
Ejercito De Tierra Espanol, 2006
Cambio 16, 2002
En su sexta edicion, el Festival de la ciudad andaluza aspira a ser el maximo acontecimiento inte... more En su sexta edicion, el Festival de la ciudad andaluza aspira a ser el maximo acontecimiento internacional dedicado al baile flamenco y a la danza espanola.
Cambio 16, 2007
Todo esta listo para que el proximo 23 de abril el Gran Teatro de Cordoba levante, como cada tres... more Todo esta listo para que el proximo 23 de abril el Gran Teatro de Cordoba levante, como cada tres anos, el telon de la cita mas importante para impulsar la esencia del flamenco y descubrir nuevos valores emergentes
Boletin Das Ciencias, 2003
Resumen. El hospital Joseph Líster es el primer hospital público de la provincia de Entre Ríos en... more Resumen. El hospital Joseph Líster es el primer hospital público de la provincia de Entre Ríos en informatizar las historias clínicas de sus pacientes empleando el sistema de gestión hospitalaria GNU Health. Objetivo: presentar las adecuaciones del sistema para adaptarlo a las necesidades del hospital y evolución de los registro sanitarios a los 32 meses de la implementación. Metodología: se describen las adaptaciones realizadas para adecuarlo a los procesos de la institución. Se presenta la evolución del registro de los pacientes hospitalarios al sistema informático y el grado de adhesión de los profesionales en el uso del sistema. Resultados: El sistema después de 32 meses de implementación tiene registrado 5542 usuarios de los servicios brindado por el hospital. En los primeros 16 meses se crearon 2470 HCE (el 73% del total) y durante el último año se crearon en promedio 89 nuevas HCE por mes. En la actualidad pueden registrar sus prácticas sanitarias en el sistema alrededor de 5...
Universidad de Malaga. Campus de Excelencia Internacional Andalucia Tech. Supported by FIS-PI15/0... more Universidad de Malaga. Campus de Excelencia Internacional Andalucia Tech. Supported by FIS-PI15/00796 (AG), FIS-PI15/00957(JV) and co-financed by FEDER funds from European Union.
Laboratorio de Arte, 1991
la ampliación posterior de 1782, y finalmente la restauración de 1945. Asimismo se dan a conocer ... more la ampliación posterior de 1782, y finalmente la restauración de 1945. Asimismo se dan a conocer las marcas de la obra, los patronos que la pagaron, y los artistas que la realizaron. Junto con los esquemas ideales y reales de la pieza se aporta la documentación correspondiente a ella. New information is presented concerning the Baena processional custodial, analysing the initial work of 1737, the further additions of 1782 and, finally, the 1945 restoration. An account is also given of the hallmarks, the patrons who financed the work and the artists who carried it out. The corresponding documentation is provided, together with the original and the final sketches of the piece.
Future Internet (FI) applications are the result of composing services and data from different pa... more Future Internet (FI) applications are the result of composing services and data from different parties. The development of such kind of applications often involves multiple stakeholders, whose requirements might partially conflict with others'. This raises the need of new techniques to identify all stakeholders and their high-level requirements, as well as potential conflicts. Moreover, since these parties do not necessarily fully trust each other, it is also important to identify potential threats within FI applications. In this deliverable we present a framework including the modelling and analyses which support the requirements engineers: (1) in the elicitation of stakeholders and their requirements, (2) in the identification of potential conflicts among their requirements, and (3) in the identification of potential risks associated with stakeholders' assets. The framework employs and extends the Si* modelling language and UML profile with trust and reputation constructs. These modelling languages are used as basis to produce a catalogue of patterns that provides support to the security requirements engineers in identifying possible conflicts and threats. We also present a systematic methodology to apply these patterns to elicit and analyse security requirements for FI applications. We further address the system sustainability by taking into account the evolutionary aspect of the development process. We use change scenarios to express the co-evolution of requirements and architectures. We model these scenarios by using the extended version of the Si* modelling language. By prioritizing change scenario instances, software architects can be able to select a suitable solution (i.e., an implementation choice) that will enable the co-evolution happens while limiting the impact on the system.
2013 International Conference on Availability, Reliability and Security, 2013
The number of insider threats hitting organizations and big enterprises is rapidly growing. Insid... more The number of insider threats hitting organizations and big enterprises is rapidly growing. Insider threats occur when trusted employees misuse their permissions on organizational assets. Since insider threats know the organization and its processes, very often they end up undetected. Therefore, there is a pressing need for organizations to adopt preventive mechanisms to defend against insider threats. In this paper, we propose a framework for insiders identification during the early requirement analysis of organizational settings and of its IT systems. The framework supports security engineers in the detection of insider threats and in the prioritization of them based on the risk they represent to the organization. To enable the automatic detection of insider threats, we extend the SI* requirement modeling language with an asset model and a trust model. The asset model allows associating security properties and sensitivity levels to assets. The trust model allows specifying the trust level that a user places in another user with respect to a given permission on an asset. The insider threats identification leverages the trust levels associated with the permissions assigned to users, as well as the sensitivity of the assets to which access is granted. We illustrate the approach based on a patient monitoring scenario.
Information Sciences, 2017
The Internet of Things (IoT) is a paradigm based on the interconnection of everyday objects. It i... more The Internet of Things (IoT) is a paradigm based on the interconnection of everyday objects. It is expected that the 'things' involved in the IoT paradigm will have to interact with each other, often in uncertain conditions. It is therefore of paramount importance for the success of IoT that there are mechanisms in place that help overcome the lack of certainty. Trust can help achieve this goal. In this paper, we introduce a framework that assists developers in including trust in IoT scenarios. This framework takes into account trust, privacy and identity requirements as well as other functional requirements derived from IoT scenarios to provide the different services that allow the inclusion of trust in the IoT.
International Journal of Intelligent Systems and Applications, 2013
Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific ... more Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The epassport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris). A passport contains the important personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic passport is not only to expedite processing at border crossings, but also to increase security. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.
Cambio 16, 2007
Todo esta listo ya en Cordoba para acoger la cita internacional por excelencia de la guitarra, po... more Todo esta listo ya en Cordoba para acoger la cita internacional por excelencia de la guitarra, por donde pasaran durante la primera quincena de julio artistas de la talla de Paco de Lucia, Pat Metheny o Serrat y Sabina
Cambio 16, 2012
Todo esta listo en Jerez para que el 24 de febrero de comienzo una nueva edicion de un certamen q... more Todo esta listo en Jerez para que el 24 de febrero de comienzo una nueva edicion de un certamen que, por meritos propios, es referente universal del flamenco.
Cambio 16, 2014
Todo esta preparado un ano mas para que la ciudad andaluza se convierta en el punto de referencia... more Todo esta preparado un ano mas para que la ciudad andaluza se convierta en el punto de referencia mundial para los amantes del baile flamenco. Del 21 de febrero al 8 de marzo, los artistas mas importantes del panorama internacional presentan sus ultimos trabajos, entre la tradicion y lo mas rompedor.
Revista De Historia Militar, 2008
Cambio 16, 2011
El Teatro Villamarta de Jerez recibe estos dias sus ultimos retoques para acoger una de las citas... more El Teatro Villamarta de Jerez recibe estos dias sus ultimos retoques para acoger una de las citas mas importantes a nivel mundial del baile flamenco. El XV Festival de Jerez echara a andar el proximo 25 de febrero con un cartel envidiable. Los mejores artistas del momento se daran cita aqui hasta el 12 de marzo para presentar sus nuevos espectaculos en una ciudad que ha hecho de este certamen un icono de identidad muh particular. Antonio El Pipa, La Farruca, Javier Latorre, Miguel Poveda... La lista de primeras figuras se hace interminable.
Cambio 16, 2005
El presidente andaluz entrega a Fosforito la llave de Oro del Cante, la segunda que la Junta conc... more El presidente andaluz entrega a Fosforito la llave de Oro del Cante, la segunda que la Junta concede en 20 anos tras la de Camaron.
Cambio 16, 2010
El ayuntamiento cordobes de Palma del Rio ha reconocido la decisiva labor de la Pena Flamenca La ... more El ayuntamiento cordobes de Palma del Rio ha reconocido la decisiva labor de la Pena Flamenca La Solea en defensa del flamenco durante su treinta aniversario a traves de la Semana Cultural, que ha servido para que estudiosos como Felix Grande ensalcen el papel jugado por esta entidad en la promocion de este arte patrimonio de todos.
Ejercito De Tierra Espanol, 2006
Cambio 16, 2002
En su sexta edicion, el Festival de la ciudad andaluza aspira a ser el maximo acontecimiento inte... more En su sexta edicion, el Festival de la ciudad andaluza aspira a ser el maximo acontecimiento internacional dedicado al baile flamenco y a la danza espanola.
Cambio 16, 2007
Todo esta listo para que el proximo 23 de abril el Gran Teatro de Cordoba levante, como cada tres... more Todo esta listo para que el proximo 23 de abril el Gran Teatro de Cordoba levante, como cada tres anos, el telon de la cita mas importante para impulsar la esencia del flamenco y descubrir nuevos valores emergentes
Boletin Das Ciencias, 2003