Por favor, use este identificador para citar o enlazar este ítem:
http://repositoriodspace.unipamplona.edu.co/jspui/handle/20.500.12744/4635
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Rodriguez Leal, Jose Dario. | - |
dc.date.accessioned | 2022-11-21T21:14:05Z | - |
dc.date.available | 2018-07-19 | - |
dc.date.available | 2022-11-21T21:14:05Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Rodriguez Leal, J. D. (2018). Estrategia de diseño de aplicaciones Web enfocada a prevenir vulnerabilidades de seguridad para el departamento de Sistemas de la Universidad Simón Bolívar sede Cúcuta [Trabajo de Grado Maestría, Universidad de Pamplona]. Repositorio Hulago Universidad de Pamplona. http://repositoriodspace.unipamplona.edu.co/jspui/handle/20.500.12744/4635 | es_CO |
dc.identifier.uri | http://repositoriodspace.unipamplona.edu.co/jspui/handle/20.500.12744/4635 | - |
dc.description | Este trabajo diseña un conjunto de prácticas y lineamientos como estrategia para reducir el riesgo de los aplicativos web desarrollados en el Departamento de Sistemas de la Universidad Simón Bolívar sede Cúcuta, a partir de un diagnóstico del estado actual de la política de seguridad en la institución frente a otras instituciones de la región, un análisis de la normativa y el estado del arte de la seguridad en aplicaciones web como objeto de estudio. Esta estrategia fue validada mediante el juicio de expertos en el desarrollo de aplicaciones web y logro reflejar la importancia de aplicar dichas políticas para prevenir las vulnerabilidades en el software web institucional. | es_CO |
dc.description.abstract | This work design a set of practices and guidelines as a strategy to reduce the risk of web applications developed in the Systems Department of the Simon Bolivar University from Cucuta, based on a diagnosis of the current state of the security policy in the institution in front of other institutions in the region, an analysis of the regulations and the state of the art of security in web applications as an object of study. This strategy was validated through the judgment of experts in the development of web applications and it was possible to reflect the importance of applying these policies to prevent vulnerabilities in the institutional web software. | es_CO |
dc.format.extent | 187 | es_CO |
dc.format.mimetype | application/pdf | es_CO |
dc.language.iso | es | es_CO |
dc.publisher | Universidad de Pamplona – Facultad de Ingenierías y Arquitectura. | es_CO |
dc.subject | Aplicación web, | es_CO |
dc.subject | Estrategia desarrollo seguro, | es_CO |
dc.subject | Política de desarrollo web, | es_CO |
dc.subject | Seguridad informática, | es_CO |
dc.subject | Vulnerabilidades de software. | es_CO |
dc.title | Estrategia de diseño de aplicaciones Web enfocada a prevenir vulnerabilidades de seguridad para el departamento de Sistemas de la Universidad Simón Bolívar sede Cúcuta. | es_CO |
dc.type | http://purl.org/coar/resource_type/c_bdcc | es_CO |
dc.date.accepted | 2018-04-19 | - |
dc.relation.references | OWASP. (2017). OWASP Top 10 2017. Open Web Application Security Project. Retrieved from https://www.owasp.org/index.php/Top_10_2017-Top_10 | es_CO |
dc.relation.references | IETF. (1999). Site Security Handbook. R F C 2196. IETF. Retrieved from http://www.ietf.org/rfc/rfc2196.txt | es_CO |
dc.relation.references | Howard M, L. D. (2003). Writing Secure Code. 2nd ed. Microsoft Press. ISBN 0-7356-1722-8. | es_CO |
dc.relation.references | Garrett, J. J. (2005). Ajax: A New Approach to Web Applications. Retrieved from http://adaptivepath.org/ideas/ajax-new-approach-web-applications/ | es_CO |
dc.relation.references | SWEBOK. (2014). Guide to the Software Engineering Body of Knowledge Version 3.0 - SWEBOK®. (É. de technologie supérieure (ÉTS) Pierre Bourque, S. Richard E. (Dick) Fairley, & S. E. A. (S2EA), Eds.). Copyright © 2014 IEEE. All rights reserved. ISBN-10: 0-7695-5166-1. | es_CO |
dc.relation.references | wcreator. (2017). Qué es MVC y por que es tan usado en el desarrollo Web. Retrieved from http://www.wcreator.com.ve/noticias/item/32-que-es-mvc-y-por-que-es-tan-usado-en-el desarrollo-we | es_CO |
dc.relation.references | OWASP. (2005). Una Guía para Construir Aplicaciones y Servicios Web Seguros Edición 2.0 Black Hat. https://www.owasp.org/. Retrieved from https://www.owasp.org/images/b/b2/OWASP_Development_Guide_2.0.1_Spanish.pdf | es_CO |
dc.relation.references | ISO17799. (2005). ISO/IEC 17799. International Standards Organization. Retrieved from https://www.iso.org/standard/39612.html | es_CO |
dc.relation.references | ISO27001. (2005). ISO/IEC 27001. International Standards Organization. Retrieved from https://www.iso.org/standard/54534.html | es_CO |
dc.relation.references | ISACA. (2012). COBIT 5 for Information Security ISBN 978-1-60420-255-7. Retrieved from www.isaca.org/cobit5info-sec | es_CO |
dc.relation.references | Systems, W. R. (2015). THE CWE/SANS TOP 25 SECURITY VULNERABILITIES. | es_CO |
dc.relation.references | ISO27002. (2007). ISO/IEC 27002. International Organization for Standardization. Retrieved from https://www.iso.org/standard/54533.html | es_CO |
dc.relation.references | WASC. (2011). The WASC Threat Classification v2.0. WASC. Retrieved from http://projects.webappsec.org/w/page/13246978/Threat Classification | es_CO |
dc.relation.references | OASIS. (2006). OASIS Web Services Security (WSS) TC. Organization for the Advancement of Structured Information Standards. Retrieved from https://www.oasis open.org/committees/tc_home.php?wg_abbrev=w | es_CO |
dc.relation.references | W3C. (2007). Web Services Policy 1.5 - Framework. W3C. Retrieved from https://www.w3.org/TR/ws-policy/ | es_CO |
dc.relation.references | Criteria. (2017). Common Criteria for Information Technology Security Evaluation. Common Criteria. Retrieved from https://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf | es_CO |
dc.relation.references | Hinrichs, T. L., Rossetti, D., Petronella, G., Venkatakrishnan, V. N., Sistla, A. P., & Zuck, L. D. (2013). WEBLOG: A Declarative Language for Secure Web Development. In Proceedings of the Eighth ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (pp. 59–70). New York, NY, USA: ACM. https://doi.org/10.1145/2465106.2465119 | es_CO |
dc.relation.references | Ge, X., Paige, R. F., Polack, F. A. C., Chivers, H., & Brooke, P. J. (2006). Agile Development of Secure Web Applications. In Proceedings of the 6th International Conference on Web Engineering (pp. 305–312). New York, NY, USA: ACM. https://doi.org/10.1145/1145581.1145641 | es_CO |
dc.relation.references | Reischuk, R. M., Schröder, F., & Gehrke, J. (2013). DEMO: Secure and customizable web development in the safe activation framework. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (pp. 1341–1344). New York, NY, USA: ACM. https://doi.org/10.1145/2508859.2512495 | es_CO |
dc.relation.references | Li, X., & Xue, Y. (2014). A Survey on Server-side Approaches to Securing Web Applications. ACM Comput. Surv., 46(4), 54:1--54:29. https://doi.org/10.1145/2541315 | es_CO |
dc.relation.references | Li, R., Dong, M., Liu, B., Lu, J., Ma, X., & Li, K. (2010). SecTag: A Multi-policy Supported Secure Web Tag Framework. In Proceedings of the 17th ACM Conference on Computer and Communications Security (pp. 633–635). New York, NY, USA: ACM. https://doi.org/10.1145/1866307.1866379 | es_CO |
dc.relation.references | Xie, J., Chu, B., Lipford, H. R., & Melton, J. T. (2011). ASIDE: IDE Support for Web Application Security. In Proceedings of the 27th Annual Computer Security Applications Conference (pp. 267–276). New York, NY, USA: ACM. https://doi.org/10.1145/2076732.2076770 | es_CO |
dc.relation.references | Rahman, S., Nguyen, T. A., & Yang, T. A. (2006). Developing Certificate-based Projects for Web Security Classes. J. Comput. Sci. Coll., 21(5), 28–37. Retrieved from http://dl.acm.org/citation.cfm?id=1127351.1127359 | es_CO |
dc.relation.references | Walden, J., & Frank, C. E. (2007). Web Application Security Tutorial. J. Comput. Sci. Coll., 23(1), 77–78. Retrieved from http://dl.acm.org/citation.cfm?id=1289280.1289294 | es_CO |
dc.relation.references | Scott, D., & Sharp, R. (2002). Abstracting Application-level Web Security. In Proceedings of the 11th International Conference on World Wide Web (pp. 396–407). New York, NY, USA: ACM. https://doi.org/10.1145/511446.511498 | es_CO |
dc.relation.references | Yao, D., Koglin, Y., Bertino, E., & Tamassia, R. (2007). Decentralized Authorization and Data Security in Web Content Delivery. In Proceedings of the 2007 ACM Symposium on Applied Computing (pp. 1654–1661). New York, NY, USA: ACM. https://doi.org/10.1145/1244002.1244353 | es_CO |
dc.relation.references | Okubo, T., & Tanaka, H. (2008). Web Security Patterns for Analysis and Design. In Proceedings of the 15th Conference on Pattern Languages of Programs (p. 25:1--25:13). New York, NY, USA: ACM. https://doi.org/10.1145/1753196.1753226 | es_CO |
dc.relation.references | Whitson, G. (2008). Security for Service Oriented Architectures. J. Comput. Sci. Coll., 23(4), 8–9. Retrieved from http://dl.acm.org/citation.cfm?id=1352079.1352083 | es_CO |
dc.relation.references | Walden, J., & Frank, C. E. (2006). Secure Software Engineering Teaching Modules. In Proceedings of the 3rd Annual Conference on Information Security Curriculum Development (pp. 19–23). New York, NY, USA: ACM. https://doi.org/10.1145/1231047.1231052 | es_CO |
dc.relation.references | Sathiaseelan, J. G. R., Rabara, S. A., & Martin, J. R. (2009). Multi-Level Secure Framework (MLSF) for Composite Web Services. In Proceedings of the 2Nd International Conference on Interaction Sciences: Information Technology, Culture and Human (pp. 580–585). New York, NY, USA: ACM. https://doi.org/10.1145/1655925.1656030 | es_CO |
dc.relation.references | Kazmierski, T., & Yang, X. Q. (2003). A Secure Web-Based Framework for Electronic System Level Design. In Proceedings of the Conference on Design, Automation and Test in Europe - Volume 1 (p. 11140--). Washington, DC, USA: IEEE Computer Society. Retrieved from http://dl.acm.org/citation.cfm?id=789083.1022891 | es_CO |
dc.relation.references | Zhu, J., Lipford, H. R., & Chu, B. (2013). Interactive Support for Secure Programming Education. In Proceeding of the 44th ACM Technical Symposium on Computer Science Education (pp. 687–692). New York, NY, USA: ACM. https://doi.org/10.1145/2445196.2445396 | es_CO |
dc.relation.references | Chan, A. T. S. (2004). Cookies On-the-move: Managing Cookies on a Smart Card. In Proceedings of the 2004 ACM Symposium on Applied Computing (pp. 1693–1697). New York, NY, USA: ACM. https://doi.org/10.1145/967900.968236 | es_CO |
dc.relation.references | Sirer, E. G., & Wang, K. (2002). An Access Control Language for Web Services. In Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (pp. 23–30). New York, NY, USA: ACM. https://doi.org/10.1145/507711.507715 | es_CO |
dc.relation.references | Salminen, A., Mikkonen, T., Nyrhinen, F., & Taivalsaari, A. (2010). Developing Client-side Mashups: Experiences, Guidelines and the Road Ahead. In Proceedings of the 14th International Academic MindTrek Conference: Envisioning Future Media Environments (pp. 161–168). New York, NY, USA: ACM. https://doi.org/10.1145/1930488.1930523 | es_CO |
dc.relation.references | Du, W., Jayaraman, K., Tan, X., Luo, T., & Chapin, S. (2011). Position Paper: Why Are There So Many Vulnerabilities in Web Applications? In Proceedings of the 2011 Workshop on New Security Paradigms Workshop (pp. 83–94). New York, NY, USA: ACM. https://doi.org/10.1145/2073276.2073285 | es_CO |
dc.relation.references | Smith, M., & Dehlinger, J. (2014). Enabling Static Security Vulnerability Analysis in PHP Applications for Novice Developers with SSVChecker. In Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems (pp. 278–283). New York, NY, USA: ACM. https://doi.org/10.1145/2663761.2664213 | es_CO |
dc.relation.references | Cao, Y., Li, Z., Rastogi, V., Chen, Y., & Wen, X. (2012). Virtual Browser: A Virtualized Browser to Sandbox Third-party JavaScripts with Enhanced Security. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (pp. 8– 9). New York, NY, USA: ACM. https://doi.org/10.1145/2414456.2414460 | es_CO |
dc.relation.references | Mundada, Y., Feamster, N., & Krishnamurthy, B. (2016). Half-Baked Cookies: Hardening Cookie-Based Authentication for the Modern Web. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (pp. 675–685). New York, NY, USA: ACM. https://doi.org/10.1145/2897845.2897889 | es_CO |
dc.relation.references | Simpkins, L., Yuan, X., Modi, J., Zhan, J., & Yang, L. (2015). A Course Module on Web Tracking and Privacy. In Proceedings of the 2015 Information Security Curriculum Development Conference (p. 10:1--10:7). New York, NY, USA: ACM. https://doi.org/10.1145/2885990.2886000 | es_CO |
dc.relation.references | Grubbs, P., McPherson, R., Naveed, M., Ristenpart, T., & Shmatikov, V. (2016). Breaking Web Applications Built On Top of Encrypted Data. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1353–1364). New York, NY, USA: ACM. https://doi.org/10.1145/2976749.2978351 | es_CO |
dc.relation.references | Bhargavan, K., Corin, R., Fournet, C., & Gordon, A. D. (2007). Secure Sessions for Web Services. ACM Trans. Inf. Syst. Secur., 10(2). https://doi.org/10.1145/1237500.1237504 | es_CO |
dc.relation.references | Adida, B. (2008). Sessionlock: Securing Web Sessions Against Eavesdropping. In Proceedings of the 17th International Conference on World Wide Web (pp. 517–524). New York, NY, USA: ACM. https://doi.org/10.1145/1367497.1367568 | es_CO |
dc.relation.references | Mavromoustakos, S., Patel, A., Chaudhary, K., Chokshi, P., & Patel, S. (2016). Causes and Prevention of SQL Injection Attacks in Web Applications. In Proceedings of the 4th International Conference on Information and Network Security (pp. 55–59). New York, NY, USA: ACM. https://doi.org/10.1145/3026724.3026742 | es_CO |
dc.relation.references | Gutierrez, C., Fernandez-Medina, E., & Piattini, M. (2005). Web Services Enterprise Security Architecture: A Case Study. In Proceedings of the 2005 Workshop on Secure Web Services (pp. 10–19). New York, NY, USA: ACM. https://doi.org/10.1145/1103022.1103025 | es_CO |
dc.relation.references | Oliveira, R. A., Laranjeiro, N., & Vieira, M. (2012). WSFAggressor: An Extensible Web Service Framework Attacking Tool. In Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference (p. 2:1--2:6). New York, NY, USA: ACM. https://doi.org/10.1145/2405146.2405148 | es_CO |
dc.relation.references | Bates, A., Hassan, W. U., Butler, K., Dobra, A., Reaves, B., Cable, P., … Schear, N. (2017). Transparent Web Service Auditing via Network Provenance Functions. In Proceedings of the 26th International Conference on World Wide Web (pp. 887–895). Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee. https://doi.org/10.1145/3038912.3052640 | es_CO |
dc.relation.references | Neville-Neil, G. V. (2007). Building Secure Web Applications. Queue, 5(5), 22–26. https://doi.org/10.1145/1281881.1281889 | es_CO |
dc.relation.references | Near, J. P., & Jackson, D. (2016). Finding Security Bugs in Web Applications Using a Catalog of Access Control Patterns. In Proceedings of the 38th International Conference on Software Engineering (pp. 947–958). New York, NY, USA: ACM. https://doi.org/10.1145/2884781.2884836 | es_CO |
dc.relation.references | Busch, M., Koch, N., Masi, M., Pugliese, R., & Tiezzi, F. (2012). Towards Model-driven Development of Access Control Policies for Web Applications. In Proceedings of the Workshop on Model-Driven Security (p. 4:1--4:6). New York, NY, USA: ACM. https://doi.org/10.1145/2422498.2422502 | es_CO |
dc.relation.references | Ikram, M., Asghar, H., Kaafar, M. A., & Mahanti, A. (2014). On the Intrusiveness of JavaScript on the Web. In Proceedings of the 2014 CoNEXT on Student Workshop (pp. 31–33). New York, NY, USA: ACM. https://doi.org/10.1145/2680821.2680837 | es_CO |
dc.relation.references | Miller, C. S., & Connolly, R. (2015). Introduction to the Special Issue on Web Development. Trans. Comput. Educ., 15(1), 1:1--1:5. https://doi.org/10.1145/2724759 | es_CO |
dc.relation.references | Whitney, M., Lipford-Richter, H., Chu, B., & Zhu, J. (2015). Embedding Secure Coding Instruction into the IDE: A Field Study in an Advanced CS Course. In Proceedings of the 46th ACM Technical Symposium on Computer Science Education (pp. 60–65). New York, NY, USA: ACM. https://doi.org/10.1145/2676723.2677280 | es_CO |
dc.relation.references | Calzavara, S., Tolomei, G., Bugliesi, M., & Orlando, S. (2014). Quite a Mess in My Cookie Jar!: Leveraging Machine Learning to Protect Web Authentication. In Proceedings of the 23rd International Conference on World Wide Web (pp. 189–200). New York, NY, USA: ACM. https://doi.org/10.1145/2566486.2568047 | es_CO |
dc.relation.references | Witschey, J., Zielinska, O., Welk, A., Murphy-Hill, E., Mayhorn, C., & Zimmermann, T. (2015). Quantifying Developers’ Adoption of Security Tools. In Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering (pp. 260–271). New York, NY, USA: ACM. https://doi.org/10.1145/2786805.2786816 | es_CO |
dc.relation.references | De Groef, W., Massacci, F., & Piessens, F. (2014). NodeSentry: Least-privilege Library Integration for Server-side JavaScript. In Proceedings of the 30th Annual Computer Security Applications Conference (pp. 446–455). New York, NY, USA: ACM. https://doi.org/10.1145/2664243.2664276 | es_CO |
dc.relation.references | Basilico, N., Gatti, N., & Amigoni, F. (2009). Developing a Deterministic Patrolling Strategy for Security Agents. In Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02 (pp. 565– 572). Washington, DC, USA: IEEE Computer Society. https://doi.org/10.1109/WI IAT.2009.212 | es_CO |
dc.relation.references | López, M. D. R., Botero, D. M. S., & Durango, C. N. M. (2011). Firma digital: instrumento de transmisión de información a entidades financieras. Avances En Sistemas E Informática; Vol. 8, Núm. 1 (2011); 7-14 Avances En Sistemas E Informática; Vol. 8, Núm. 1 (2011); 7-14 1909-0056 1657-7663. Retrieved from http://www.bdigital.unal.edu.co/28822/ | es_CO |
dc.relation.references | Chamorro López, J. A. (2011). Modelo para la evaluación en seguridad informática a productos software, basado en el estándar ISO/IEC 15408 Common Criteria. Universidad Icesi. Retrieved from http://hdl.handle.net/10906/67925 | es_CO |
dc.relation.references | Velasco Burbano, G. A. (2011). Modelo para la evaluación y selección de un software de seguridad para controlar el ciclo de vida de la identidad digital. Santiago de Cali: Universidad Icesi. Retrieved from http://hdl.handle.net/10906/68006 | es_CO |
dc.relation.references | Mogollon Mantilla, J. A. (2012). Análisis de viabilidad de la aplicación de métodos de cifrado al Framework EFI. Universidad de Pamplona, Pamplona , Colombia. | es_CO |
dc.relation.references | Cacua Velandia, Y. F. (2012). Implementación de Mecanismos para el Manejo de Errores, Auditoría y Generación de Logs al Framework EFI. Universidad de Pamplona, Colombia | es_CO |
dc.relation.references | Bolaños Rodríguez, H. A. (2013). Método para Evaluar la Madurez en la Implementación de Principios y Patrones SOA en un Contexto Empresarial:MeMSOA. Universidad de San Buenaventura Cali. Retrieved from http://hdl.handle.net/10819/3171 | es_CO |
dc.relation.references | Pabón, F. O. M., Guerrero, J. C., Cuenca, R. H., Rendón, O. M. C., & Guaca, J. A. H. (2010). Seguridad basada en parámetros SIM para entornos de comercio electrónico móvil. Ingeniería E Investigación; Vol. 27, Núm. 2 (2007); 56-64 Ingeniería E Investigación; Vol. 27, Núm. 2 (2007); 56-64 2248-8723 0120-5609. Retrieved from http://www.bdigital.unal.edu.co/18890/ | es_CO |
dc.relation.references | Rosero, B. E. P., & Luna, J. A. G. (2011). Arquitectura de aprendizaje para el manejo de riesgo de falla en ambientes de composición de servicios web. Avances En Sistemas E Informática; Vol. 6, Núm. 2 (2009); 143-148 Avances En Sistemas E Informática; Vol. 6, Núm. 2 (2009); 143-148 1909-0056 1657-7663. Retrieved from http://www.bdigital.unal.edu.co/23458/ | es_CO |
dc.relation.references | ARCINIEGAS, J. L., FERNÁNDEZ, V., HORMIGA, A., TULANDE, A., URBANO, F. A., & COLLAZOS, C. A. (2011). Proceso de requerimiento y análisis para la definición de la arquitectura desde la perspectiva de usabilidad para el desarrollo de aplicaciones en la web. Avances En Sistemas E Informática; Vol. 6, Núm. 2 (2009); 205-210 Avances En Sistemas E Informática; Vol. 6, Núm. 2 (2009); 205-210 1909-0056 1657-7663. Retrieved from http://www.bdigital.unal.edu.co/23465/ | es_CO |
dc.relation.references | Jaramillo, C. M. Z., & Chaverra, J. J. (2012). An environment based on pre-conceptual schemas for automatically generating source code under the mvc pattern. Dyna; Vol. 79, Núm. 176 (2012); 56-63 DYNA; Vol. 79, N{ú}m. 176 (2012); 56-63 2346-2183 0012-7353. Retrieved from http://www.bdigital.unal.edu.co/26919/ | es_CO |
dc.relation.references | Serna, M. D. A., Salazar, J. E. L., & Cortés, J. A. Z. (2011). Arquitectura orientada a servicios en el contexto de la arquitectura empresarial. Avances En Sistemas E Informática; Vol. 7, Núm. 2 (2010); 74-88 Avances En Sistemas E Informática; Vol. 7, Núm. 2 (2010); 74-88 1909-0056 1657-7663. Retrieved from http://www.bdigital.unal.edu.co/28772/ | es_CO |
dc.relation.references | YEPEZ, W. L. P., COLLAZOS, C. A., & PENICHET, V. M. R. (2013). Entorno colaborativo de apoyo a la mejora de procesos de software en pequeñas organizaciones de software. Dyna; Vol. 80, Núm. 177 (2013); 40-48 DYNA; Vol. 80, Núm. 177 (2013); 40-48 2346- 2183 0012-7353. Retrieved from http://www.bdigital.unal.edu.co/29622/ | es_CO |
dc.relation.references | Castilla, W. J. V. (2013). Herramienta prototipo para generación automática de Servicios Web Semánticos a través del desarrollo de software dirigido por modelos. Retrieved from http://www.bdigital.unal.edu.co/45825/ | es_CO |
dc.relation.references | de Jesús Martínez Acosta, D. (2014). Herramienta para la generación automática del código fuente para aplicaciones con arquitectura modelo vista controlador (MVC) bajo desarrollo dirigido por modelos textuales (MDD). Retrieved from http://www.bdigital.unal.edu.co/45826/ | es_CO |
dc.relation.references | Arias, F. G. (2012). El Proyecto de Investigación Introducción a la metodología científica 6a Edición, ISBN:980-07-8529-9, pag. 85. EDITORIAL EPISTEME, C.A , Caracas - República Bolivariana de Venezuela | es_CO |
dc.relation.references | de Barrera, J. H. (2010). Metodología de la Investigación, guia para la comprensíon holística de la ciencia, ISBN:978-980-6306-66-0, pag.43 , 212. Quiron Ediciones. | es_CO |
dc.relation.references | Gurdián-Fernández, A. (2007). El Paradigma Cualitativo en la Investigación Socio-Educativa, ISBN:978-9968-818-32-2 pag. 152. Colección : Investigación y Desarrollo Educativo Regional (IDER). | es_CO |
dc.relation.references | Miguelez, M. M. (2009). Ciencia y arte de la metodología cualitativa , ISBN:978-968-24-7568- 9 pag. 100 , 137. trillas. | es_CO |
dc.relation.references | Morales, J. T. (2011). Fenomenología y Hermenéutica Como Epistemología de la Investigación. Departamento de Filosofía, Facultad de Educación. Universidad de Carabobo. | es_CO |
dc.relation.references | Noguero, F. L. (2002). El análisis de contenido como método de investigación. XXI, Revista de Educación, 4 (2002): 167-179. Universidad de Huelva. | es_CO |
dc.relation.references | Roberto Hernández Sampieri, C. F. C. y M. del P. B. L. (2010). Metodología de la investigación Quinta edición, ISBN:978-607-15-0291-9, pag. 364. McGRAW-HILL. | es_CO |
dc.relation.references | Mark Dowd John McDonald, J. S. (2006). The Art of Software Security Assessment - Identifying and Preventing Software Vulnerabilities ISBN-10: 0-321-44442-6 , ISBN-13: 978-0-321- 44442-4. Addison Wesley Professional. | es_CO |
dc.relation.references | Daud, M. I. (2010). Secure Software Development Model: A Guide for Secure Software Life Cycle. In Proceedings of the International MultiConference of Engineers and Computer Scientists 2010 Vol I, IMECS 2010, March 17-19,2010, Hong Kong | es_CO |
dc.relation.references | Hope, P., & White, P. (2007). Software Security Requirements the foundation for security,Cigital Inc. Retrieved from http://www.cigital.com | es_CO |
dc.relation.references | Criteria, C. (2005). Part 2: Security functional requirements August 2005 Version 2.3. Retrieved from https://www.commoncriteriaportal.org/files/ccfiles/ccpart2v2.3.pdf | es_CO |
dc.relation.references | Mead, J. H. A. S. J. B. R. J. E. G. M. N. R. (2008). Software Security Engineering: A Guide for Project Managers. ISBN 10: 032150917X ISBN 13: 9780321509178. Addison-Wesley Professional. | es_CO |
dc.relation.references | McGraw, G. R. (2006). Software Security: Building Security In. ISBN-13: 978-0321356703 - ISBN-10: 0321356705. Addison-Wesley Professional. | es_CO |
dc.relation.references | Grady Booch, I. J. y J. R. (2000). El Proceso Unificado De Desarrollo De Software. ISBN 84- 7829-036-2. The Addison Wesley, Pearson Educación S.A. | es_CO |
dc.relation.references | Higuera, J. R. B. (2014). Assessment methodology of web applications automatic security analysis tools for adaptation in the development life cycle. Universidad Nacional de Educación a Distancia, España. | es_CO |
dc.relation.references | Goseva-Popstojanova, K., & Perhinschi, A. (2015). On the capability of static code analysis to detect security vulnerabilities. Information and Software Technology, 68, 18–33. https://doi.org/http://dx.doi.org/10.1016/j.infsof.2015.08.002 | es_CO |
dc.relation.references | 2014, S. C. M. A. (2014). 2014 SC Awards U.S. Retrieved from https://media.scmagazine.com/documents/64/botn2014sm_15794.pdf | es_CO |
dc.relation.references | JURGENSOSN, J. L. A. Y. G. (2003). COMO HACER INVESTIGACION CUALITATIVA: FUNDAMENTOS Y METODOLOGIA - ISBN: 9789688535165. PAIDOS IBERICA. | es_CO |
dc.relation.references | Taylor, Steven y Bodgan, R. (1992). Introducción a los métodos Cualitativos de investigación. (E. Paidós, Ed.). Barcelona, España: Ediciones Paidós. | es_CO |
dc.relation.references | Ruiz, R. (2006). Historia y evolución del pensamiento científico. México: Juan Carlos Martínez Coll. Retrieved from https://books.google.com.co/books?id=HVs87wEe3ZsC | es_CO |
dc.relation.references | García Valdés, M., & Suárez Marín, M. (2013). El método Delphi para la consulta a expertos en la investigación científica . Revista Cubana de Salud Pública . scielocu . | es_CO |
dc.rights.accessrights | http://purl.org/coar/access_right/c_abf2 | es_CO |
dc.type.coarversion | http://purl.org/coar/resource_type/c_2df8fbb1 | es_CO |
Aparece en las colecciones: | Maestría en Gestión de Proyectos Informáticos |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
Rodriguez_2018_TG.pdf | Rodriguez_2018_TG.pdf | 11,1 MB | Adobe PDF | Visualizar/Abrir |
Los ítems de DSpace están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.