José Luis Vivas

Learn More
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is common that customers and end users are able to express their security needs at the business process level. Furthermore, systems are often developed by(More)
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is common at the business process level that customers and end users are able to express their security needs. Among the security needs of Internet(More)
STATEMENT OF PROBLEM For patients with limited interocclusal space, standard height implant abutments may not be usable. Shorter abutments may be desirable. PURPOSE The purpose of this study was to determine the effect of the height of titanium abutments on the tensile strength required to dislodge zirconia copings. MATERIAL AND METHODS Two experimental(More)
Keywords: Grid Security framework Security services Virtual organizations This paper describes the security framework that is to be developed for the generic grid platform created for the project GREDIA. This platform is composed of several components that need to be secured. The platform uses the OGSA standards, so that the security framework will follow(More)
Statement of the Problem. Fit of prosthodontic frameworks is linked to the lifetime survival of dental implants and maintenance of surrounding bone. Purpose. The purpose of this study was to evaluate and compare the precision of fit of milled one-piece Titanium fixed complete denture frameworks to that of conventional cast frameworks. Material and Methods.(More)
The main objective of this paper is to introduce and show some results concerning a novel form of indirect reciprocity, called transitive reciprocity, extending an incentive mechanism for cooperation in P2P systems based exclusively on direct reciprocity, called the Network of Favors. We define transitive indirect reciprocity and show with the aid of(More)
Assurance has been a major topic for critical systems. Assurance is usually associated with safety conditions but has also an important role for checking security requirements. Security is best assured if it is addressed holistically, systematically, and from the very beginning in the software's development process. We propose to integrate assurance and(More)