Jose M. del Alamo
Jose M. del Alamo
Associate Professor (UPM)
Verified email at - Homepage
Cited by
Cited by
PRIPARE: integrating privacy best practices into a privacy engineering methodology
N Notario, A Crespo, YS Martín, JM Del Alamo, D Le Métayer, T Antignac, ...
2015 IEEE Security and Privacy Workshops, 151-158, 2015
Method for selectively distributing information in a computer or communication network, and physical entities therefor
MAM Llorente, JMDÁ Ramiro, BSM González, RT Burgos, JCY García
US Patent App. 13/809,503, 2013
Programming assignments automatic grading: review of tools and implementations
JC Caiza, JM Álamo Ramiro
Telecomunicacion, 2013
Privacy engineering: Shaping an emerging field of research and practice
S Gürses, JM Del Alamo
IEEE Security & Privacy 14 (2), 40-46, 2016
Method for managing access to protected resources in a computer network, physical entities and computer programs therefor
MAM Llorente, JMDÁ Ramiro, JCY García
US Patent 8,595,494, 2013
A user-centric service creation approach for Next Generation Networks
JC Yelmo, JM Del Alamo, R Trapero, P Falcarin, J Yu, B Carro, ...
Innovations in NGN: Future Network and Services, 2008. K-INGN 2008. First …, 2008
Method for managing access to protected resources and delegating authority in a computer network
MAM Llorente, JMDÁ Ramiro, JCY García
US Patent 8,819,784, 2014
User-driven service lifecycle management–adopting internet paradigms in telecom services
JC Yelmo, R Trapero, JM Álamo, J Sienel, M Drewniok, I Ordás, ...
International conference on service-oriented computing, 342-352, 2007
A user-centric approach to service creation and delivery over next generation networks
JC Yelmo, JM del Álamo, R Trapero, YS Martín
Computer Communications 34 (2), 209-222, 2011
A system of privacy patterns for user control
M Colesky, JC Caiza, JM Del Alamo, JH Hoepman, YS Martín
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1150-1156, 2018
Engineering privacy requirements valuable lessons from another realm
YS Martin, JM Del Alamo, JC Yelmo
2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014
Organizing design patterns for privacy: a taxonomy of types of relationships
JC Caiza, YS Martín, JM Del Alamo, DS Guamán
Proceedings of the 22nd European Conference on Pattern Languages of Programs …, 2017
A metamodel for privacy engineering methods
YS Martín García, JM Álamo Ramiro
CEUR Workshop Proceedings 1873, 41-48, 2017
Reusable elements for the systematic design of privacy-friendly information systems: A mapping study
JC Caiza, YS Martín, DS Guamán, JM Del Alamo, JC Yelmo
IEEE Access 7, 66512-66535, 2019
PRIPARE: a new vision on engineering privacy and security by design
N Notario, A Crespo, A Kung, I Kroener, DL Métayer, C Troncoso, ...
Cyber Security and Privacy Forum, 65-76, 2014
A privacy-considerate framework for identity management in mobile services
JM Del Álamo, AM Fernández, R Trapero, JC Yelmo, MA Monjas
Mobile Networks and Applications 16 (4), 446-459, 2011
Identity management and web services as service ecosystem drivers in converged networks
JC Yelmo, R Trapero, JM Del Alamo
IEEE Communications Magazine 47 (3), 174-180, 2009
A proposal for enhancing the motivation in students of computer programming
B San Miguel, S Aguirre, JM del Álamo, M Cortés
ICERI2012 Proceedings, 1157-1164, 2012
Self-service privacy: User-centric privacy for network-centric identity
JM Alamo, MA Monjas, JC Yelmo, BS Miguel, R Trapero, AM Fernandez
IFIP International Conference on Trust Management, 17-31, 2010
A systematic mapping study on software quality control techniques for assessing privacy in information systems
DS Guaman, JM Del Alamo, JC Caiza
IEEE access 8, 74808-74833, 2020
The system can't perform the operation now. Try again later.
Articles 1–20