José Luis Vivas

Learn More
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is common that customers and end users are able to express their security needs at the business process level. Furthermore, systems are often developed by(More)
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is common at the business process level that customers and end users are able to express their security needs. Among the security needs of Internet(More)
Statement of the Problem. Fit of prosthodontic frameworks is linked to the lifetime survival of dental implants and maintenance of surrounding bone. Purpose. The purpose of this study was to evaluate and compare the precision of fit of milled one-piece Titanium fixed complete denture frameworks to that of conventional cast frameworks. Material and Methods.(More)
Keywords: Grid Security framework Security services Virtual organizations This paper describes the security framework that is to be developed for the generic grid platform created for the project GREDIA. This platform is composed of several components that need to be secured. The platform uses the OGSA standards, so that the security framework will follow(More)
STATEMENT OF PROBLEM For patients with limited interocclusal space, standard height implant abutments may not be usable. Shorter abutments may be desirable. PURPOSE The purpose of this study was to determine the effect of the height of titanium abutments on the tensile strength required to dislodge zirconia copings. MATERIAL AND METHODS Two experimental(More)
— In order to study security systems, we have developed a methodology for application of formal analysis techniques commonly used in communication protocols to the analysis of cryptographic protocols. In particular, we have extended the design and analysis phases of protocol design with security properties. Our proposal uses a specification notation based(More)