Francisco A Moyano | UTN (original) (raw)

Papers by Francisco A Moyano

Research paper thumbnail of Historia clínica electrónica con GNU Health en un hospital público de la provincia de Entre Ríos

Resumen. El hospital Joseph Líster es el primer hospital público de la provincia de Entre Ríos en... more Resumen. El hospital Joseph Líster es el primer hospital público de la provincia de Entre Ríos en informatizar las historias clínicas de sus pacientes empleando el sistema de gestión hospitalaria GNU Health. Objetivo: presentar las adecuaciones del sistema para adaptarlo a las necesidades del hospital y evolución de los registro sanitarios a los 32 meses de la implementación. Metodología: se describen las adaptaciones realizadas para adecuarlo a los procesos de la institución. Se presenta la evolución del registro de los pacientes hospitalarios al sistema informático y el grado de adhesión de los profesionales en el uso del sistema. Resultados: El sistema después de 32 meses de implementación tiene registrado 5542 usuarios de los servicios brindado por el hospital. En los primeros 16 meses se crearon 2470 HCE (el 73% del total) y durante el último año se crearon en promedio 89 nuevas HCE por mes. En la actualidad pueden registrar sus prácticas sanitarias en el sistema alrededor de 5...

Research paper thumbnail of Systemic Administration of Epothylone-D Recues Memory and Ameliorates Alzheimer’s Disease-Like Pathology in APP/PS1 Mice

Universidad de Malaga. Campus de Excelencia Internacional Andalucia Tech. Supported by FIS-PI15/0... more Universidad de Malaga. Campus de Excelencia Internacional Andalucia Tech. Supported by FIS-PI15/00796 (AG), FIS-PI15/00957(JV) and co-financed by FEDER funds from European Union.

Research paper thumbnail of Aportaciones al estudio de la custodia de Baena

Laboratorio de Arte, 1991

la ampliación posterior de 1782, y finalmente la restauración de 1945. Asimismo se dan a conocer ... more la ampliación posterior de 1782, y finalmente la restauración de 1945. Asimismo se dan a conocer las marcas de la obra, los patronos que la pagaron, y los artistas que la realizaron. Junto con los esquemas ideales y reales de la pieza se aporta la documentación correspondiente a ella. New information is presented concerning the Baena processional custodial, analysing the initial work of 1737, the further additions of 1782 and, finally, the 1945 restoration. An account is also given of the hallmarks, the patrons who financed the work and the artists who carried it out. The corresponding documentation is provided, together with the original and the final sketches of the piece.

Research paper thumbnail of Security requirement patterns for Future Internet applications, and improved modelling of the scenarios

Future Internet (FI) applications are the result of composing services and data from different pa... more Future Internet (FI) applications are the result of composing services and data from different parties. The development of such kind of applications often involves multiple stakeholders, whose requirements might partially conflict with others'. This raises the need of new techniques to identify all stakeholders and their high-level requirements, as well as potential conflicts. Moreover, since these parties do not necessarily fully trust each other, it is also important to identify potential threats within FI applications. In this deliverable we present a framework including the modelling and analyses which support the requirements engineers: (1) in the elicitation of stakeholders and their requirements, (2) in the identification of potential conflicts among their requirements, and (3) in the identification of potential risks associated with stakeholders' assets. The framework employs and extends the Si* modelling language and UML profile with trust and reputation constructs. These modelling languages are used as basis to produce a catalogue of patterns that provides support to the security requirements engineers in identifying possible conflicts and threats. We also present a systematic methodology to apply these patterns to elicit and analyse security requirements for FI applications. We further address the system sustainability by taking into account the evolutionary aspect of the development process. We use change scenarios to express the co-evolution of requirements and architectures. We model these scenarios by using the extended version of the Si* modelling language. By prioritizing change scenario instances, software architects can be able to select a suitable solution (i.e., an implementation choice) that will enable the co-evolution happens while limiting the impact on the system.

Research paper thumbnail of Detecting Insider Threats: A Trust-Aware Framework

2013 International Conference on Availability, Reliability and Security, 2013

The number of insider threats hitting organizations and big enterprises is rapidly growing. Insid... more The number of insider threats hitting organizations and big enterprises is rapidly growing. Insider threats occur when trusted employees misuse their permissions on organizational assets. Since insider threats know the organization and its processes, very often they end up undetected. Therefore, there is a pressing need for organizations to adopt preventive mechanisms to defend against insider threats. In this paper, we propose a framework for insiders identification during the early requirement analysis of organizational settings and of its IT systems. The framework supports security engineers in the detection of insider threats and in the prioritization of them based on the risk they represent to the organization. To enable the automatic detection of insider threats, we extend the SI* requirement modeling language with an asset model and a trust model. The asset model allows associating security properties and sensitivity levels to assets. The trust model allows specifying the trust level that a user places in another user with respect to a given permission on an asset. The insider threats identification leverages the trust levels associated with the permissions assigned to users, as well as the sensitivity of the assets to which access is granted. We illustrate the approach based on a patient monitoring scenario.

Research paper thumbnail of Modelling trust dynamics in the Internet of Things

Information Sciences, 2017

The Internet of Things (IoT) is a paradigm based on the interconnection of everyday objects. It i... more The Internet of Things (IoT) is a paradigm based on the interconnection of everyday objects. It is expected that the 'things' involved in the IoT paradigm will have to interact with each other, often in uncertain conditions. It is therefore of paramount importance for the success of IoT that there are mechanisms in place that help overcome the lack of certainty. Trust can help achieve this goal. In this paper, we introduce a framework that assists developers in including trust in IoT scenarios. This framework takes into account trust, privacy and identity requirements as well as other functional requirements derived from IoT scenarios to provide the different services that allow the inclusion of trust in the IoT.

Research paper thumbnail of Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols

International Journal of Intelligent Systems and Applications, 2013

Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific ... more Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The epassport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris). A passport contains the important personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic passport is not only to expedite processing at border crossings, but also to increase security. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.

Research paper thumbnail of Tecnología Cloud en las rondas sociosanitarias en el primer nivel de atención de la salud

Research paper thumbnail of Córdoba: XVII Festival Internacional de la Guitarra. Guitarras con duende y embrujo

Cambio 16, 2007

Todo esta listo ya en Cordoba para acoger la cita internacional por excelencia de la guitarra, po... more Todo esta listo ya en Cordoba para acoger la cita internacional por excelencia de la guitarra, por donde pasaran durante la primera quincena de julio artistas de la talla de Paco de Lucia, Pat Metheny o Serrat y Sabina

Research paper thumbnail of XVI Festival Flamenco de Jerez: El baile, santo y seña

Cambio 16, 2012

Todo esta listo en Jerez para que el 24 de febrero de comienzo una nueva edicion de un certamen q... more Todo esta listo en Jerez para que el 24 de febrero de comienzo una nueva edicion de un certamen que, por meritos propios, es referente universal del flamenco.

Research paper thumbnail of Materiales educativos en la comarca jerezana

Research paper thumbnail of JEREZ La suprema exaltación del baile

Cambio 16, 2014

Todo esta preparado un ano mas para que la ciudad andaluza se convierta en el punto de referencia... more Todo esta preparado un ano mas para que la ciudad andaluza se convierta en el punto de referencia mundial para los amantes del baile flamenco. Del 21 de febrero al 8 de marzo, los artistas mas importantes del panorama internacional presentan sus ultimos trabajos, entre la tradicion y lo mas rompedor.

Research paper thumbnail of La Batalla del Monte Curriechos

Revista De Historia Militar, 2008

Research paper thumbnail of XV Festival de Jerez. Pasión por el baile

Cambio 16, 2011

El Teatro Villamarta de Jerez recibe estos dias sus ultimos retoques para acoger una de las citas... more El Teatro Villamarta de Jerez recibe estos dias sus ultimos retoques para acoger una de las citas mas importantes a nivel mundial del baile flamenco. El XV Festival de Jerez echara a andar el proximo 25 de febrero con un cartel envidiable. Los mejores artistas del momento se daran cita aqui hasta el 12 de marzo para presentar sus nuevos espectaculos en una ciudad que ha hecho de este certamen un icono de identidad muh particular. Antonio El Pipa, La Farruca, Javier Latorre, Miguel Poveda... La lista de primeras figuras se hace interminable.

Research paper thumbnail of Gloria y honor al dios del cante

Cambio 16, 2005

El presidente andaluz entrega a Fosforito la llave de Oro del Cante, la segunda que la Junta conc... more El presidente andaluz entrega a Fosforito la llave de Oro del Cante, la segunda que la Junta concede en 20 anos tras la de Camaron.

Research paper thumbnail of Flamenco. Honor y gloria a La Soleá

Cambio 16, 2010

El ayuntamiento cordobes de Palma del Rio ha reconocido la decisiva labor de la Pena Flamenca La ... more El ayuntamiento cordobes de Palma del Rio ha reconocido la decisiva labor de la Pena Flamenca La Solea en defensa del flamenco durante su treinta aniversario a traves de la Semana Cultural, que ha servido para que estudiosos como Felix Grande ensalcen el papel jugado por esta entidad en la promocion de este arte patrimonio de todos.

Research paper thumbnail of ¿Es Iraq el centro de gravedad del terrorismo internacional?

Ejercito De Tierra Espanol, 2006

Research paper thumbnail of Jerez, capital del baile

Cambio 16, 2002

En su sexta edicion, el Festival de la ciudad andaluza aspira a ser el maximo acontecimiento inte... more En su sexta edicion, el Festival de la ciudad andaluza aspira a ser el maximo acontecimiento internacional dedicado al baile flamenco y a la danza espanola.

Research paper thumbnail of XVIII Concurso Nacional de Arte Flamenco de Córdoba. Supremacía del baile

Cambio 16, 2007

Todo esta listo para que el proximo 23 de abril el Gran Teatro de Cordoba levante, como cada tres... more Todo esta listo para que el proximo 23 de abril el Gran Teatro de Cordoba levante, como cada tres anos, el telon de la cita mas importante para impulsar la esencia del flamenco y descubrir nuevos valores emergentes

Research paper thumbnail of La energía solar: una energía del presente

Boletin Das Ciencias, 2003

Research paper thumbnail of Historia clínica electrónica con GNU Health en un hospital público de la provincia de Entre Ríos

Resumen. El hospital Joseph Líster es el primer hospital público de la provincia de Entre Ríos en... more Resumen. El hospital Joseph Líster es el primer hospital público de la provincia de Entre Ríos en informatizar las historias clínicas de sus pacientes empleando el sistema de gestión hospitalaria GNU Health. Objetivo: presentar las adecuaciones del sistema para adaptarlo a las necesidades del hospital y evolución de los registro sanitarios a los 32 meses de la implementación. Metodología: se describen las adaptaciones realizadas para adecuarlo a los procesos de la institución. Se presenta la evolución del registro de los pacientes hospitalarios al sistema informático y el grado de adhesión de los profesionales en el uso del sistema. Resultados: El sistema después de 32 meses de implementación tiene registrado 5542 usuarios de los servicios brindado por el hospital. En los primeros 16 meses se crearon 2470 HCE (el 73% del total) y durante el último año se crearon en promedio 89 nuevas HCE por mes. En la actualidad pueden registrar sus prácticas sanitarias en el sistema alrededor de 5...

Research paper thumbnail of Systemic Administration of Epothylone-D Recues Memory and Ameliorates Alzheimer’s Disease-Like Pathology in APP/PS1 Mice

Universidad de Malaga. Campus de Excelencia Internacional Andalucia Tech. Supported by FIS-PI15/0... more Universidad de Malaga. Campus de Excelencia Internacional Andalucia Tech. Supported by FIS-PI15/00796 (AG), FIS-PI15/00957(JV) and co-financed by FEDER funds from European Union.

Research paper thumbnail of Aportaciones al estudio de la custodia de Baena

Laboratorio de Arte, 1991

la ampliación posterior de 1782, y finalmente la restauración de 1945. Asimismo se dan a conocer ... more la ampliación posterior de 1782, y finalmente la restauración de 1945. Asimismo se dan a conocer las marcas de la obra, los patronos que la pagaron, y los artistas que la realizaron. Junto con los esquemas ideales y reales de la pieza se aporta la documentación correspondiente a ella. New information is presented concerning the Baena processional custodial, analysing the initial work of 1737, the further additions of 1782 and, finally, the 1945 restoration. An account is also given of the hallmarks, the patrons who financed the work and the artists who carried it out. The corresponding documentation is provided, together with the original and the final sketches of the piece.

Research paper thumbnail of Security requirement patterns for Future Internet applications, and improved modelling of the scenarios

Future Internet (FI) applications are the result of composing services and data from different pa... more Future Internet (FI) applications are the result of composing services and data from different parties. The development of such kind of applications often involves multiple stakeholders, whose requirements might partially conflict with others'. This raises the need of new techniques to identify all stakeholders and their high-level requirements, as well as potential conflicts. Moreover, since these parties do not necessarily fully trust each other, it is also important to identify potential threats within FI applications. In this deliverable we present a framework including the modelling and analyses which support the requirements engineers: (1) in the elicitation of stakeholders and their requirements, (2) in the identification of potential conflicts among their requirements, and (3) in the identification of potential risks associated with stakeholders' assets. The framework employs and extends the Si* modelling language and UML profile with trust and reputation constructs. These modelling languages are used as basis to produce a catalogue of patterns that provides support to the security requirements engineers in identifying possible conflicts and threats. We also present a systematic methodology to apply these patterns to elicit and analyse security requirements for FI applications. We further address the system sustainability by taking into account the evolutionary aspect of the development process. We use change scenarios to express the co-evolution of requirements and architectures. We model these scenarios by using the extended version of the Si* modelling language. By prioritizing change scenario instances, software architects can be able to select a suitable solution (i.e., an implementation choice) that will enable the co-evolution happens while limiting the impact on the system.

Research paper thumbnail of Detecting Insider Threats: A Trust-Aware Framework

2013 International Conference on Availability, Reliability and Security, 2013

The number of insider threats hitting organizations and big enterprises is rapidly growing. Insid... more The number of insider threats hitting organizations and big enterprises is rapidly growing. Insider threats occur when trusted employees misuse their permissions on organizational assets. Since insider threats know the organization and its processes, very often they end up undetected. Therefore, there is a pressing need for organizations to adopt preventive mechanisms to defend against insider threats. In this paper, we propose a framework for insiders identification during the early requirement analysis of organizational settings and of its IT systems. The framework supports security engineers in the detection of insider threats and in the prioritization of them based on the risk they represent to the organization. To enable the automatic detection of insider threats, we extend the SI* requirement modeling language with an asset model and a trust model. The asset model allows associating security properties and sensitivity levels to assets. The trust model allows specifying the trust level that a user places in another user with respect to a given permission on an asset. The insider threats identification leverages the trust levels associated with the permissions assigned to users, as well as the sensitivity of the assets to which access is granted. We illustrate the approach based on a patient monitoring scenario.

Research paper thumbnail of Modelling trust dynamics in the Internet of Things

Information Sciences, 2017

The Internet of Things (IoT) is a paradigm based on the interconnection of everyday objects. It i... more The Internet of Things (IoT) is a paradigm based on the interconnection of everyday objects. It is expected that the 'things' involved in the IoT paradigm will have to interact with each other, often in uncertain conditions. It is therefore of paramount importance for the success of IoT that there are mechanisms in place that help overcome the lack of certainty. Trust can help achieve this goal. In this paper, we introduce a framework that assists developers in including trust in IoT scenarios. This framework takes into account trust, privacy and identity requirements as well as other functional requirements derived from IoT scenarios to provide the different services that allow the inclusion of trust in the IoT.

Research paper thumbnail of Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols

International Journal of Intelligent Systems and Applications, 2013

Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific ... more Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The epassport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris). A passport contains the important personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic passport is not only to expedite processing at border crossings, but also to increase security. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.

Research paper thumbnail of Tecnología Cloud en las rondas sociosanitarias en el primer nivel de atención de la salud

Research paper thumbnail of Córdoba: XVII Festival Internacional de la Guitarra. Guitarras con duende y embrujo

Cambio 16, 2007

Todo esta listo ya en Cordoba para acoger la cita internacional por excelencia de la guitarra, po... more Todo esta listo ya en Cordoba para acoger la cita internacional por excelencia de la guitarra, por donde pasaran durante la primera quincena de julio artistas de la talla de Paco de Lucia, Pat Metheny o Serrat y Sabina

Research paper thumbnail of XVI Festival Flamenco de Jerez: El baile, santo y seña

Cambio 16, 2012

Todo esta listo en Jerez para que el 24 de febrero de comienzo una nueva edicion de un certamen q... more Todo esta listo en Jerez para que el 24 de febrero de comienzo una nueva edicion de un certamen que, por meritos propios, es referente universal del flamenco.

Research paper thumbnail of Materiales educativos en la comarca jerezana

Research paper thumbnail of JEREZ La suprema exaltación del baile

Cambio 16, 2014

Todo esta preparado un ano mas para que la ciudad andaluza se convierta en el punto de referencia... more Todo esta preparado un ano mas para que la ciudad andaluza se convierta en el punto de referencia mundial para los amantes del baile flamenco. Del 21 de febrero al 8 de marzo, los artistas mas importantes del panorama internacional presentan sus ultimos trabajos, entre la tradicion y lo mas rompedor.

Research paper thumbnail of La Batalla del Monte Curriechos

Revista De Historia Militar, 2008

Research paper thumbnail of XV Festival de Jerez. Pasión por el baile

Cambio 16, 2011

El Teatro Villamarta de Jerez recibe estos dias sus ultimos retoques para acoger una de las citas... more El Teatro Villamarta de Jerez recibe estos dias sus ultimos retoques para acoger una de las citas mas importantes a nivel mundial del baile flamenco. El XV Festival de Jerez echara a andar el proximo 25 de febrero con un cartel envidiable. Los mejores artistas del momento se daran cita aqui hasta el 12 de marzo para presentar sus nuevos espectaculos en una ciudad que ha hecho de este certamen un icono de identidad muh particular. Antonio El Pipa, La Farruca, Javier Latorre, Miguel Poveda... La lista de primeras figuras se hace interminable.

Research paper thumbnail of Gloria y honor al dios del cante

Cambio 16, 2005

El presidente andaluz entrega a Fosforito la llave de Oro del Cante, la segunda que la Junta conc... more El presidente andaluz entrega a Fosforito la llave de Oro del Cante, la segunda que la Junta concede en 20 anos tras la de Camaron.

Research paper thumbnail of Flamenco. Honor y gloria a La Soleá

Cambio 16, 2010

El ayuntamiento cordobes de Palma del Rio ha reconocido la decisiva labor de la Pena Flamenca La ... more El ayuntamiento cordobes de Palma del Rio ha reconocido la decisiva labor de la Pena Flamenca La Solea en defensa del flamenco durante su treinta aniversario a traves de la Semana Cultural, que ha servido para que estudiosos como Felix Grande ensalcen el papel jugado por esta entidad en la promocion de este arte patrimonio de todos.

Research paper thumbnail of ¿Es Iraq el centro de gravedad del terrorismo internacional?

Ejercito De Tierra Espanol, 2006

Research paper thumbnail of Jerez, capital del baile

Cambio 16, 2002

En su sexta edicion, el Festival de la ciudad andaluza aspira a ser el maximo acontecimiento inte... more En su sexta edicion, el Festival de la ciudad andaluza aspira a ser el maximo acontecimiento internacional dedicado al baile flamenco y a la danza espanola.

Research paper thumbnail of XVIII Concurso Nacional de Arte Flamenco de Córdoba. Supremacía del baile

Cambio 16, 2007

Todo esta listo para que el proximo 23 de abril el Gran Teatro de Cordoba levante, como cada tres... more Todo esta listo para que el proximo 23 de abril el Gran Teatro de Cordoba levante, como cada tres anos, el telon de la cita mas importante para impulsar la esencia del flamenco y descubrir nuevos valores emergentes

Research paper thumbnail of La energía solar: una energía del presente

Boletin Das Ciencias, 2003