Contenido principal del artículo

Ángela Atienza López
Universidad de La Rioja
España
Vol. 40 Núm. 1 (2018): Los límites de la obediencia en el mundo Hispánico de la Edad Moderna: discursos y prácticas, Artículos, Páginas 125-157
DOI: https://doi.org/10.14201/shhmo2018401125173
Cómo citar

Resumen

Este trabajo estudia las polémicas y controversias que se vivieron en los conventos femeninos de la Corona de Aragón frente a los decretos emitidos a finales del reinado de Felipe IV que pretendían imponer un respeto estricto de la clausura, limitando las visitas que recibían las monjas y sus contactos con el exterior. Se completará con ello nuestros conocimientos sobre las polémicas de clausura vividas en la España Moderna. El estudio de estas tensiones permite además ahondar en el análisis de las dinámicas sociales y culturales de la obediencia en ese mundo religioso femenino durante el Antiguo Régimen y los marcos en los que se establecieron límites. 

Descargas

La descarga de datos todavía no está disponible.

Detalles del artículo

Citas

M. Yun, W. Hubei, “Research on the Architecture and Key Technology of Internet of Things (loT) Applied on Smart Grid”, International Conference on Advances in Energy Engineering, 978-1-4244-7830-9/10 IEEE, 2010.

X. Jia, Q. Feng, T. Fan and Q. Lei, “RFID Technology and its applications in Internet of Things (IOT)”, 978-1-4577-1415-3/12 IEEE, 2010.

R. S. H. Istepanian, A. Sungoor, A. Faisal and N. Philip, “INTERNET OF M-HEALTH THINGS “m-IOT””, IET Seminar on Assisted Living, IEEE, 2011.

V. M. Rohokale, N. R. Prasad and R. Prasad, “A Cooperative Internet of Things (IoT) for Rural Healthcare Monitoring and Control”, 978-1-4577-0787-2/11 IEEE, 2011.

G. Yang, M. Mäntysalo, X. Zhou, Z. Pang, L. D. Xu, S. Kao-Water, Q. Chen and L. Zheng, “A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor and Intelligent Medicine Box”, DOI 10.1109/TII.2014.2307795, IEEE Transactions on Industrial Informatics, 2013.

Q. Chi, H. Yan, C. Zhang, Z. Pang and L. D. Xu, “A Reconfigurable Smart Sensor Interface for Industrial WSN in IoT Environment”, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 2, MAY 2014.

T. Yashiro, S. Kobayashi, N. Koshizuka and K. Sakamura, “An Internet of Things (IoT) Architecture for Embedded Appliances”, IEEE R10- HTC2013, Aug. 2013.

F. Xia, L. T. Yang, L. Wang and A. Vinel, “Internet of Things”, Int. J. Commun. Syst.; 25:1101–1102, published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/dac.2417, 2012.

Q. Zhu, R. Wang, Q. Chen, Y. Liu and W. Qin, “IOT Gateway: BridgingWireless Sensor Networks into Internet of Things”, 978-0- 7695-4322-2/10, DOI 10.1109/EUC.2010.58, IEEE, 2010.

F. Tao, Y. Zuo, L. D. Xu and L. Zhang, “IoT-Based Intelligent Perception and Access of Manufacturing Resource Toward Cloud Manufacturing”, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 2, MAY 2014.

Y. J. Fan, Y. H. Yin, L. D. Xu, Y. Zeng and F. Wu, “IoT-Based Smart Rehabilitation System”, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 2, MAY 2014.

S. Babar, P. Mahalle, A. Stango, N. Prasad and R. Prasaad, “Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)”, N. Meghanathan et al. (Eds.): CNSA 2010, CCIS 89, pp. 420–429, 2010, Springer-Verlag Berlin Heidelberg 2010.

M. Yun and B. Yuxin, “Research on the Architecture and Key Technology of Internet of Things (loT) Applied on Smart Grid”, 978-1- 4244-7830-9/10, IEEE, 2010.

A. Iera, C. Floerkemeier, J. Mitsugi and G. Morabito, “THE INTERNET OF THINGS”, IEEE Wireless Communications (editorial), 2010.

R. S. H. Istepian, H. Hu, N. Y. Philip and A. Sungoor, “The Potential of Internet of m-health Things “m-IoT” for Non-Invasive Glucose level Sensing”, 978-1-4244-4122-8/11, IEEE, 2011.

S. D. T. Kelly, N. K. Suryadevara and S. C. Mukhopadhyay, “Towards the Implementation of IoT for Environmental Condition Monitoring in Homes”, IEEE SENSORS JOURNAL, VOL. 13, NO. 10, OCT. 2013.

D. Chen, G. Chang, D. Sun, J. Li, J. Jia and X. Wang, “TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things”, ComSIS Vol. 8, No. 4, DOI: 10.2298/CSIS110303056C, Oct. 2011.

H. Sundmaeker, P. Guillemin, P. Friess, S. Woelffle, “Vision and Challenges for Realizing the Internet of Things”. Luxembourg, Germany: European Union, 2010, ISBN 9789279150883.

“Internet 3.0: The Internet of Things”, Analysys Mason, Singapore, 2010. Available on http://www.theinternetofthings.eu/content/internet-30-internet-things-new-report-analysys-mason. Referred on Nov. 8, 2016.

A. T. Gupta, “Development of Cryptographic Schemes using Quasigroups”, SAG, DRDO and Ramanujan College (University of Delhi), 2015.

D. Gligoroski, S. Markovski and S. J. Knapskog, “The Stream Cipher Edon80”. Conference paper DOI: 10.1007/978-3-540-68351-3_12, New Stream Cipher Designs, LNCS 4986, pp. 152–169, Springer-Verlag Berlin Heidelberg, 2008.

“NIST.gov - Computer Security Division - Computer Security Resource Center”. Available on http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html.

“Communication Network requirements”. Available on http://belden.picturepark.com/Website/Download.aspx?DownloadToken=63b8a52b-be50-4429-9a67-c283470e40f7&Purpose=AssetManager&mime-type=application/pdf.

I. Bose and R. Pal, ”Auto-ID: managing anything, anywhere, anytime in the supply chain”, Communications of the ACM, Vol. 48, No. 8, pp. 100-106, Aug. 2005.

ITU, “ITU Internet Reports 2005: The Internet of Things”, The Internet of Things, Nov. 2005.

Q. Liu, L. Cui, HM. Chen”, Key technologies and applications of Internet of Things”, Computer Science, Vol. 37, No. 6, 2010.

W. He, G. Yan and L. D. Xa, “Developing Vehicular Data Cloud Services in the IoT Environment”.

https://www.nist.gov/