![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Eduardo B. Fernández
Person information
- affiliation: Florida Atlantic University, Boca Raton, Florida, USA
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j63]Eduardo B. Fernández
, Andrei Brazhuk:
A critical analysis of Zero Trust Architecture (ZTA). Comput. Stand. Interfaces 89: 103832 (2024) - 2023
- [j62]Bijayita Thapa, Eduardo B. Fernández
, Ionut Cardei, Maria M. Larrondo-Petrie
:
Abstract Entity Patterns for Sensors and Actuators. Comput. 12(5): 93 (2023) - [j61]Ingrid A. Buckley
, Eduardo B. Fernández
:
Dependability Patterns: A Survey. Comput. 12(10): 214 (2023) - [j60]Virginia M. Romero, Eduardo B. Fernández
:
Towards a Reference Architecture for Cargo Ports. Future Internet 15(4): 139 (2023) - 2022
- [j59]Eduardo B. Fernández
, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns and the design of secure systems. Cybersecur. 5(1): 7 (2022) - [j58]Abdulrahman Khalid Alnaim
, Ahmed Mahmoud Alwakeel
, Eduardo B. Fernández
:
Towards a Security Reference Architecture for NFV. Sensors 22(10): 3750 (2022) - 2021
- [j57]Anelis Pereira Vale
, Eduardo B. Fernández
, Raúl Monge, Hernán Astudillo
, Gastón Márquez
:
Security in microservice-based systems: A Multivocal literature review. Comput. Secur. 103: 102200 (2021) - [j56]Tian Xia, Hironori Washizaki, Yoshiaki Fukazawa, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández
, Takehisa Kato, Hideyuki Kanuka, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development. Int. J. Syst. Softw. Secur. Prot. 12(2): 68-85 (2021) - [j55]Eduardo B. Fernández
, Hironori Washizaki, Nobukazu Yoshioka, Takao Okubo:
The design of secure IoT applications using patterns: State of the art and directions for research. Internet Things 15: 100408 (2021) - [c138]Eduardo B. Fernández
, Hernán Astudillo, Cristian Orellana
:
A pattern for a Secure IoT Thing. EuroPLoP 2021: 16:1-16:6 - [c137]Cristian Orellana
, Hernán Astudillo, Eduardo B. Fernández
:
A Pattern for a Secure Actuator Node. EuroPLoP 2021: 29:1-29:6 - [e1]Nobukazu Yoshioka, Hironori Washizaki, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto, Fuyuki Ishikawa, Foutse Khomh, Giuliano Antoniol:
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), Nara, Japan, December 4, 2018. CEUR Workshop Proceedings 2809, CEUR-WS.org 2021 [contents] - 2020
- [j54]Hironori Washizaki
, Shinpei Ogata
, Atsuo Hazeyama, Takao Okubo, Eduardo B. Fernández
, Nobukazu Yoshioka
:
Landscape of Architecture and Design Patterns for IoT Systems. IEEE Internet Things J. 7(10): 10091-10101 (2020) - [j53]Julio Moreno
, Javier Gómez, Manuel A. Serrano
, Eduardo B. Fernández, Eduardo Fernández-Medina:
Application of security reference architecture to Big Data ecosystems in an industrial scenario. Softw. Pract. Exp. 50(8): 1520-1538 (2020) - [c136]Olga Villagrán-Velasco, Eduardo B. Fernández
, Jorge L. Ortega-Arjona:
Refining the evaluation of the degree of security of a system built using security patterns. ARES 2020: 36:1-36:7 - [c135]Antonio Muñoz
, Eduardo B. Fernández
:
TPM, a pattern for an architecture for trusted computing. EuroPLoP 2020: 14:1-14:8 - [c134]Raghdah Saemaldahr, Bijayita Thapa, Kristopher Maikoo, Eduardo B. Fernández:
Reference Architectures for the IoT: A Survey. IRICT 2020: 635-646
2010 – 2019
- 2019
- [j52]Julio Moreno
, Eduardo B. Fernández, Manuel A. Serrano
, Eduardo Fernández-Medina
:
Secure Development of Big Data Ecosystems. IEEE Access 7: 96604-96619 (2019) - [c133]Ahmed Mahmoud Alwakeel
, Abdulrahman Khalid Alnaim, Eduardo B. Fernández
:
A Pattern for a Virtual Network Function (VNF). ARES 2019: 31:1-31:7 - [c132]Abdulrahman Khalid Alnaim, Ahmed Mahmoud Alwakeel
, Eduardo B. Fernández
:
A Misuse Pattern for Compromising VMs via Virtual Machine Escape in NFV. ARES 2019: 77:1-77:6 - [c131]Anelis Pereira Vale
, Gastón Márquez, Hernán Astudillo
, Eduardo B. Fernández
:
Security Mechanisms Used in Microservices-Based Systems: A Systematic Mapping. CLEI 2019: 1-10 - [c130]Julio Moreno, Eduardo B. Fernández, Eduardo Fernández-Medina, Manuel A. Serrano
:
BlockBD: a security pattern to incorporate blockchain in big data ecosystems. EuroPLoP 2019: 17:1-17:8 - [c129]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata
, Takao Okubo, Eduardo B. Fernández
:
Landscape of IoT patterns. SERP4IoT@ICSE 2019: 57-60 - [c128]Anelis Pereira Vale
, Eduardo B. Fernández
:
An Ontology for Security Patterns. SCCC 2019: 1-8 - [c127]Abdulrahman Khalid Alnaim, Ahmed Mahmoud Alwakeel, Eduardo B. Fernández
:
A Pattern for an NFV Virtual Machine Environment. SysCon 2019: 1-6 - [c126]Ahmed Mahmoud Alwakeel
, Abdulrahman Khalid Alnaim, Eduardo B. Fernández
:
Analysis of threats and countermeasures in NFV use cases. SysCon 2019: 1-6 - [i3]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT Patterns. CoRR abs/1902.09718 (2019) - 2018
- [j51]Eduardo B. Fernández
, Hironori Washizaki, Nobukazu Yoshioka:
Using Security Patterns to Develop Secure Systems - Ten Years Later. Int. J. Syst. Softw. Secur. Prot. 9(4): 46-57 (2018) - [j50]Matías Zapata-Barra, Alfonso Rodríguez, Angélica Caro, Eduardo B. Fernández:
Towards Obtaining UML Class Diagrams from Secure Business Processes Using Security Patterns. J. Univers. Comput. Sci. 24(10): 1472-1492 (2018) - [j49]Anton V. Uzunov
, Eduardo B. Fernández
, Katrina Falkner:
Assessing and improving the quality of security methodologies for distributed systems. J. Softw. Evol. Process. 30(11) (2018) - [c125]Madiha H. Syed, Eduardo B. Fernández
:
A reference architecture for the container ecosystem. ARES 2018: 31:1-31:6 - [c124]Eduardo B. Fernández
, Nobukazu Yoshioka, Hironori Washizaki:
Evaluating the degree of security of a system built using security patterns. ARES 2018: 43:1-43:8 - [c123]Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto:
Report of WESPr-18: the International Workshop on Evidence-based Security and Privacy in the Wild. WESPr-iMLSE@APSEC 2018: 1-2 - [c122]Eduardo B. Fernández, Nobukazu Yoshioka:
Using a variety of patterns in a secure software development methodology. WESPr-iMLSE@APSEC 2018: 26-32 - [c121]Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina, Eduardo B. Fernández:
Towards a Security Reference Architecture for Big Data. DOLAP 2018 - [c120]Julio Moreno, Eduardo B. Fernández, Eduardo Fernández-Medina
, Manuel A. Serrano
:
A Security Pattern for Key-Value NoSQL Database Authorization. EuroPLoP 2018: 12:1-12:4 - [c119]Madiha H. Syed, Eduardo B. Fernández
, Julio Moreno:
A misuse Pattern for DDoS in the IoT. EuroPLoP 2018: 34:1-34:5 - [c118]Tian Xia, Hironori Washizaki, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata
, Eduardo B. Fernández
, Hideyuki Kanuka, Masayuki Yoshino, Dan Yamamoto
, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services. MODELSWARD 2018: 379-386 - [r2]Jan Jürjens, Eduardo B. Fernández:
Secure Database Development. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [c117]Madiha H. Syed, Eduardo B. Fernández
:
The Container Manager Pattern. EuroPLoP 2017: 28:1-28:9 - [c116]Eduardo B. Fernández
, Brahim Hamid
:
Two safety patterns: Safety Assertion and Safety Assertion Enforcer. EuroPLoP 2017: 30:1-30:9 - [c115]Paulo Realpe-Muñoz, César A. Collazos, Toni Granollers, Jaime Muñoz Arteaga
, Eduardo B. Fernández
:
Design process for usable security and authentication using a user-centered approach. Interacción 2017: 42:1-42:8 - 2016
- [j48]Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki
, Madiha H. Syed:
Modeling and Security in Cloud Ecosystems. Future Internet 8(2): 13 (2016) - [j47]Eduardo B. Fernández:
Introduction to the Special Issue on Evaluating the Security of Complex Systems. Inf. 7(3): 46 (2016) - [j46]Dereje Yimam, Eduardo B. Fernández
:
A survey of compliance issues in cloud computing. J. Internet Serv. Appl. 7(1): 5:1-5:12 (2016) - [j45]Eduardo B. Fernández
, Raúl Monge, Keiko Hashizume:
Building a security reference architecture for cloud systems. Requir. Eng. 21(2): 225-249 (2016) - [c114]Eduardo B. Fernández
:
Threat Modeling in Cyber-Physical Systems. DASC/PiCom/DataCom/CyberSciTech 2016: 448-453 - [c113]Gilberto Pedraza-Garcia, René Noël, Santiago Matalonga, Hernán Astudillo, Eduardo B. Fernández:
Mitigating security threats using tactics and patterns: a controlled experiment. ECSA Workshops 2016: 37 - [c112]Paulina Silva, Raúl Monge, Eduardo B. Fernández:
A reference architecture for web browsers: part II, a pattern for web browser content renderer. EuroPLoP 2016: 27 - [c111]Eduardo B. Fernández
:
Preventing and unifying threats in cyberphysical systems. HASE 2016: 292-293 - [c110]Dereje Yimam, Eduardo B. Fernández
:
Building Compliance and Security Reference Architectures (CSRA) for Cloud Systems. IC2E 2016: 147-150 - [c109]Eduardo B. Fernández
:
Building Secure Cloud Architectures Using Patterns. IC2E Workshops 2016: 194 - [c108]Madiha H. Syed, Eduardo B. Fernández
:
Cloud Ecosystems Support for Internet of Things and DevOps Using Patterns. IoTDI 2016: 301-304 - [c107]Hironori Washizaki
, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Takehisa Kato, Shinpei Ogata
, Haruhiko Kaiya, Eduardo B. Fernández
, Hideyuki Kanuka
, Yuki Kondo, Nobukazu Yoshioka
, Takao Okubo, Atsuo Hazeyama:
A Metamodel for Security and Privacy Knowledge in Cloud Services. SERVICES 2016: 142-143 - [c106]Madiha H. Syed, Eduardo B. Fernández
, Mohammad Ilyas:
A Pattern for Fog Computing. VikingPLoP 2016: 13:1-13:10 - 2015
- [j44]Anton V. Uzunov, Eduardo B. Fernández
, Katrina Falkner
:
Security solution frames and security patterns for authorization in distributed, collaborative systems. Comput. Secur. 55: 193-234 (2015) - [j43]Anton V. Uzunov, Eduardo B. Fernández
, Katrina Falkner
:
ASE: A comprehensive pattern-driven security methodology for distributed systems. Comput. Stand. Interfaces 41: 112-137 (2015) - [j42]Anton V. Uzunov, Katrina Falkner
, Eduardo B. Fernández
:
A comprehensive pattern-oriented approach to engineering security methodologies. Inf. Softw. Technol. 57: 217-247 (2015) - [c105]Eduardo B. Fernández
, Hernán Astudillo
, Gilberto Pedraza-Garcia:
Revisiting Architectural Tactics for Security. ECSA 2015: 55-69 - [c104]Rohini Sulatycki, Eduardo B. Fernández
:
Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities. EuroPLoP 2015: 46:1-46:11 - [c103]Eduardo B. Fernández
, Brahim Hamid
:
A pattern for network functions virtualization. EuroPLoP 2015: 47:1-47:9 - [c102]Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki
:
Patterns for security and privacy in cloud ecosystems. ESPRE 2015: 13-18 - [c101]Eduardo B. Fernández, Dereje Yimam:
Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations. SECRYPT 2015: 435-440 - 2014
- [j41]Anton V. Uzunov, Eduardo B. Fernández
:
An extensible pattern-based library and taxonomy of security threats for distributed systems. Comput. Stand. Interfaces 36(4): 734-747 (2014) - [j40]Santiago Moral-García, Santiago Moral-Rubio, Eduardo B. Fernández, Eduardo Fernández-Medina
:
Enterprise security pattern: A model-driven architecture instance. Comput. Stand. Interfaces 36(4): 748-758 (2014) - [j39]Santiago Moral-García, Santiago Moral-Rubio, David Garcia Rosado
, Eduardo B. Fernández, Eduardo Fernández-Medina
:
Enterprise security pattern: a new type of security pattern. Secur. Commun. Networks 7(11): 1670-1690 (2014) - [c100]Anton V. Uzunov, Eduardo B. Fernández
, Katrina Falkner
:
A Comprehensive Pattern-Driven Security Methodology for Distributed Systems. Australian Software Engineering Conference 2014: 142-151 - [c99]René Noël, Gilberto Pedraza-Garcia, Hernán Astudillo, Eduardo B. Fernández:
An exploratory comparison of security patterns and tactics to harden systems. CIbSE 2014: 378-391 - [c98]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements and analysis of secure systems. CIbSE 2014: 437-450 - [c97]Oscar Encina, Eduardo B. Fernández, A. Raúl Monge:
Threat analysis and misuse patterns of federated inter-cloud systems. EuroPLoP 2014: 13:1-13:8 - [c96]Eduardo B. Fernández, A. Raúl Monge, René Carvajal, Oscar Encina, Juan Hernández, Paulina Silva
:
Patterns for content-dependent and context-enhanced authorization. EuroPLoP 2014: 32:1-32:10 - [c95]Oscar Encina, Eduardo B. Fernández, Raúl Monge:
Towards Secure Inter-Cloud Architectures. VikingPLoP 2014: 2:1-2:10 - [c94]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements specification and analysis of secure systems. WER 2014 - [c93]Eduardo B. Fernández
, Raúl Monge:
A security reference architecture for cloud systems. WICSA Companion 2014: 3:1-3:5 - [i2]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). CoRR abs/1409.6608 (2014) - 2013
- [j38]Eduardo B. Fernández
, David L. La Red, José Ignacio Peláez
:
A conceptual approach to secure electronic elections based on patterns. Gov. Inf. Q. 30(1): 64-73 (2013) - [j37]Keiko Hashizume, David Garcia Rosado
, Eduardo Fernández-Medina
, Eduardo B. Fernández:
An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1): 5:1-5:13 (2013) - [c92]Anton V. Uzunov, Katrina Falkner
, Eduardo B. Fernández
:
Decomposing Distributed Software Architectures for the Determination and Incorporation of Security and Other Non-functional Requirements. Australian Software Engineering Conference 2013: 30-39 - 2012
- [j36]Anton V. Uzunov, Eduardo B. Fernández
, Katrina Falkner
:
Securing distributed systems using patterns: A survey. Comput. Secur. 31(5): 681-703 (2012) - [j35]Eduardo B. Fernández
, Ola Ajaj, Ingrid A. Buckley, Nelly Delessy-Gassant, Keiko Hashizume, Maria M. Larrondo-Petrie
:
A Survey of Patterns for Web Services Security and Reliability Standards. Future Internet 4(2): 430-450 (2012) - [j34]Eduardo B. Fernández
:
Introduction to the Special Issue on Recent Advances in Web Services. Future Internet 4(3): 618-620 (2012) - [j33]Anton V. Uzunov, Eduardo B. Fernández, Katrina Falkner:
Engineering Security into Distributed Systems: A Survey of Methodologies. J. Univers. Comput. Sci. 18(20): 2920-3006 (2012) - [c91]Eduardo B. Fernández, Anton V. Uzunov:
Secure Middleware Patterns. CSS 2012: 470-482 - 2011
- [j32]Eduardo B. Fernández, Sergio Mujica:
Model-based development of security requirements. CLEI Electron. J. 14(3) (2011) - [j31]David La Red, Jesús M. Doña
, José Ignacio Peláez
, Eduardo B. Fernández
:
Wkc-OWA, a New Neat-OWA Operator to Aggregate Information in Democratic Decision Problems. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 19(5): 759-779 (2011) - [c90]Eduardo B. Fernández
, Hironori Washizaki
, Nobukazu Yoshioka
, Michael VanHilst:
An Approach to Model-based Development of Secure and Reliable Systems. ARES 2011: 260-265 - [c89]Ingrid A. Buckley, Eduardo B. Fernández
:
Enumerating Software Failures to Build Dependable Distributed Applications. HASE 2011: 120-123 - [c88]Ingrid A. Buckley, Eduardo B. Fernández
, Marco Anisetti
, Claudio A. Ardagna
, Seyed Masoud Sadjadi, Ernesto Damiani
:
Towards Pattern-Based Reliability Certification of Services. OTM Conferences (2) 2011: 560-576 - [c87]Eduardo B. Fernández
, Nobukazu Yoshioka
:
Two patterns for distributed systems: enterprise service bus (ESB) and distributed publish/subscribe. PLoP 2011: 8:1-8:10 - [c86]Zhen Jiang, Eduardo B. Fernández, Liang Cheng:
P2N: a pedagogical <u>p</u>attern for teaching computer <u>p</u>rogramming to <u>n</u>on-CS majors. PLoP 2011: 25:1-25:9 - [c85]Keiko Hashizume, Eduardo B. Fernández, Nobukazu Yoshioka:
Misuse Patterns for Cloud Computing. SEKE 2011: 683-686 - [i1]Xiaohong Yuan, Eduardo B. Fernández:
Patterns for Business-to-consumer E-Commerce Applications. CoRR abs/1108.3342 (2011) - 2010
- [c84]Michael Netter, Eduardo B. Fernández
, Günther Pernul:
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. ARES 2010: 560-564 - [c83]Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki
, Michael VanHilst:
Measuring the Level of Security Introduced by Security Patterns. ARES 2010: 565-568 - [c82]Eduardo B. Fernández, María M. Larrondo-Petrie
:
Designing Secure SCADA Systems Using Security Patterns. HICSS 2010: 1-8 - [c81]Anupama Sahu, Eduardo B. Fernández
, Mihaela Cardei, Michael VanHilst:
A pattern for a sensor node. PLoP 2010: 7:1-7:7 - [c80]Michael Van Hilst, Eduardo B. Fernández:
A pattern system of underlying theories for process improvement. PLoP 2010: 8:1-8:24 - [c79]Eduardo B. Fernández
, Sergio Mujica:
Building Secure Systems: From Threats to Security Patterns. SCCC 2010: 66-70 - [c78]Ola Ajaj, Eduardo B. Fernández:
The WS-policy standard pattern. SugarLoafPLoP 2010: 4:1-4:12 - [p2]Eduardo B. Fernández
, Carolina Marin, Maria M. Larrondo-Petrie
:
Security Requirements for Social Networks in Web 2.0. Handbook of Social Network Technologies 2010: 569-582
2000 – 2009
- 2009
- [j30]Michael VanHilst, Eduardo B. Fernández, Fabrício A. Braz:
A Multi-Dimensional Classification for Users of Security Patterns. J. Res. Pract. Inf. Technol. 41(2): 87-118 (2009) - [j29]Juan C. Pelaez, Eduardo B. Fernández
, María M. Larrondo-Petrie
:
Misuse patterns in VoIP. Secur. Commun. Networks 2(6): 635-653 (2009) - [c77]Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki
:
Modeling Misuse Patterns. ARES 2009: 566-571 - [c76]Luanna Lopes Lobato, Eduardo B. Fernández
, Sérgio Donizetti Zorzo:
Patterns to Support the Development of Privacy Policies. ARES 2009: 744-749 - [c75]Eduardo B. Fernández, Jie Wu, María M. Larrondo-Petrie
, Yifeng Shao:
On building secure SCADA systems using security patterns. CSIIRW 2009: 17 - [c74]Hironori Washizaki
, Eduardo B. Fernández
, Katsuhisa Maruyama, Atsuto Kubo, Nobukazu Yoshioka
:
Improving the Classification of Security Patterns. DEXA Workshops 2009: 165-170 - [c73]Miguel Solinas, Eduardo B. Fernández
, Leandro Antonelli:
Embedding Security Patterns into a Domain Model. DEXA Workshops 2009: 176-180 - [c72]Eduardo B. Fernández
, Jorge L. Ortega-Arjona:
The Secure Pipes and Filters Pattern. DEXA Workshops 2009: 181-185 - [c71]Keiko Hashizume, Eduardo B. Fernández, Shihong Huang:
Digital Signature with Hashing and XML Signature patterns. EuroPLoP 2009 - [c70]Hironori Washizaki
, Nobukazu Yoshioka
, Eduardo B. Fernández, Jan Jürjens:
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). OOPSLA Companion 2009: 713-714 - [c69]Ingrid A. Buckley, Eduardo B. Fernández, Gustavo Rossi, Seyed Masoud Sadjadi:
Web Services Reliability Patterns. SEKE 2009: 4-9 - [p1]Eduardo B. Fernández
:
Security Patterns and A Methodology to Apply them. Security and Dependability for Ambient Intelligence 2009: 37-46 - [r1]Jan Jürjens, Eduardo B. Fernández
:
Secure Database Development. Encyclopedia of Database Systems 2009: 2528-2534 - 2008
- [c68]Nelly A. Delessy, Eduardo B. Fernández
:
A Pattern-Driven Security Process for SOA Applications. ARES 2008: 416-421 - [c67]Eduardo B. Fernández
, Hironori Washizaki
, Nobukazu Yoshioka
, Atsuto Kubo, Yoshiaki Fukazawa:
Classifying Security Patterns. APWeb 2008: 342-347 - [c66]Eduardo B. Fernández
, Mihai Fonoage, Michael VanHilst, Mirela Marta:
The Secure Three-Tier Architecture Pattern. CISIS 2008: 555-560 - [c65]Eduardo B. Fernández
, Jan Jürjens, Nobukazu Yoshioka
, Hironori Washizaki
:
Incorporating Database Systems into a Secure Software Development Methodology. DEXA Workshops 2008: 310-314 - [c64]Fabrício A. Braz, Eduardo B. Fernández
, Michael VanHilst:
Eliciting Security Requirements through Misuse Activities. DEXA Workshops 2008: 328-333 - [c63]Nelly A. Delessy, Eduardo B. Fernández:
A pattern-driven security process for SOA applications. SAC 2008: 2226-2227 - [c62]Michael VanHilst, Eduardo B. Fernández, Fabrício A. Braz:
A Multi-Dimensional Classification for Users of Security Patterns. WOSIS 2008: 89-98 - [c61]Eduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie
:
Patterns and Pattern Diagrams for Access Control. TrustBus 2008: 38-47 - 2007
- [j28]Bing Wu, Jie Wu, Eduardo B. Fernández
, Mohammad Ilyas
, Spyros S. Magliveras:
Secure and efficient key management in mobile ad hoc networks. J. Netw. Comput. Appl. 30(3): 937-954 (2007) - [j27]Eduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie
:
Security Patterns for Voice over IP Networks. J. Softw. 2(2): 19-29 (2007) - [c60]Eduardo B. Fernández, Xiaohong Yuan:
Securing analysis patterns. ACM Southeast Regional Conference 2007: 288-293 - [c59]Eduardo B. Fernández:
Security patterns and secure systems design. ACM Southeast Regional Conference 2007: 510 - [c58]Nelly A. Delessy, Eduardo B. Fernández:
Adapting Web Services Security Standards for Mobile and Wireless Environments. APWeb/WAIM Workshops 2007: 624-633 - [c57]Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie
:
Security Patterns for Physical Access Control Systems. DBSec 2007: 259-274 - [c56]Eduardo B. Fernández
, Preethi Cholmondeley, Olaf Zimmermann:
Extending a Secure System Development Methodology to SOA. DEXA Workshops 2007: 749-754 - [c55]Eduardo B. Fernández, Michael VanHilst:
Patterns for WiMax security. EuroPLoP 2007: 707-720 - [c54]Juan C. Pelaez, Eduardo B. Fernández:
Patterns for VoIP Signaling Protocol Architectures. EuroPLoP 2007: 721-734 - [c53]Eduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie
:
Attack Patterns: A New Forensic and Design Tool. IFIP Int. Conf. Digital Forensics 2007: 345-357 - [c52]Eduardo B. Fernández:
Security Patterns and Secure Systems Design. LADC 2007: 233-234 - [c51]Günther Pernul, Marco Casassa Mont
, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger:
Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2 - 2006
- [c50]Eduardo B. Fernández, Nelly A. Delessy:
Using Patterns to Understand and Compare Web Services Security Products and Standards. AICT/ICIW 2006: 157 - [c49]Patrick Morrison, Eduardo B. Fernández:
Securing the Broker Pattern. EuroPLoP 2006: 513-530 - [c48]Eduardo B. Fernández, Michael VanHilst, María M. Larrondo-Petrie
, Shihong Huang:
Defining Security Requirements Through Misuse Actions. IFIP Workshop on Advanced Software Engineering 2006: 123-137 - 2005
- [b1]Markus Schumacher, Eduardo B. Fernández-Buglioni, Duane Hybertson, Frank Buschmann, Peter Sommerlad:
Security Patterns - Integrating Security and Systems Engineering. Wiley 2005, ISBN 978-0-470-85884-4, pp. I-XXXIII, 1-565 - [c47]Eduardo B. Fernández:
Security Patterns and Secure Systems Design Using UML. ICEIS (1) 2005: 21 - [c46]Bing Wu, Jie Wu, Eduardo B. Fernández
, Spyros S. Magliveras:
Secure and Efficient Key Management in Mobile Ad Hoc Networks. IPDPS 2005 - [c45]Eduardo B. Fernández, Saeed Rajput, Michael VanHilst, María M. Larrondo-Petrie
:
Some Security Issues of Wireless Systems. ISSADS 2005: 388-396 - [c44]Eduardo B. Fernández
, Tami Sorgente:
An analysis of modeling flaws in HL7 and JAHIS. SAC 2005: 216-223 - [c43]Eduardo B. Fernández, Tami Sorgente, María M. Larrondo-Petrie:
A UML-Based Methodology for Secure Systems: The Design Stage . WOSIS 2005: 207-216 - 2004
- [c42]Torsten Priebe
, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul:
A Pattern System for Access Control. DBSec 2004: 235-249 - [c41]Eduardo B. Fernández:
Two Patterns for Web Services Security. International Conference on Internet Computing 2004: 801-807 - [c40]Eduardo B. Fernández:
A Methodology for Secure Software Design. Software Engineering Research and Practice 2004: 130-136 - [c39]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe
, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). UML Satellite Activities 2004: 76-84 - 2003
- [c38]Eduardo B. Fernández, John Sinibaldi:
More Patterns for Operating System Access Control. EuroPLoP 2003: 381-398 - [c37]Xiaohong Yuan, Eduardo B. Fernández:
An Analysis Pattern for Course Management. EuroPLoP 2003: 899-912 - 2002
- [c36]Eduardo B. Fernández, Ying Liu:
The Account Analysis Pattern. EuroPLoP 2002: 477-484 - [c35]Eduardo B. Fernández, Fei Dai:
An Analysis Pattern for the Request and Allocation of Limited Resources. EuroPLoP 2002: 485-496 - 2000
- [c34]Eduardo B. Fernández
, Xiaohong Yuan:
Semantic Analysis Patterns. ER 2000: 183-195
1990 – 1999
- 1999
- [c33]Eduardo B. Fernández
:
Coordination of Security Levels for Internet Architectures. DEXA Workshop 1999: 837-841 - [c32]Massimo Ancona, Walter Cazzola, Eduardo B. Fernández:
Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks. Secure Internet Programming 1999: 35-49 - 1998
- [j26]Jie Wu, Eduardo B. Fernández
, Donglai Dai:
Optimal Fault-Secure Scheduling. Comput. J. 41(4): 207-222 (1998) - [j25]Jie Wu, Eduardo B. Fernández, Yingqui Lo:
Embedding of Binomial Treas in Hypercubes with Link Faults. J. Parallel Distributed Comput. 54(1): 49-74 (1998) - [c31]Eduardo B. Fernández
, Krishnakumar R. Nair:
An Abstract Authorization System for the Internet. DEXA Workshop 1998: 310-315 - [c30]Massimo Ancona, Walter Cazzola, Eduardo B. Fernández:
Reflective Authorization Systems. ECOOP Workshops 1998: 281 - [c29]Ke Huang, Jie Wu, Eduardo B. Fernández:
A Generalized Forward Recovery Checkpointing Scheme. IPPS/SPDP Workshops 1998: 623-643 - [c28]Eduardo B. Fernández:
Building systems using analysis patterns. ISAW@FSE 1998: 37-40 - 1997
- [c27]Jie Wu, Eduardo B. Fernández
, Yingquiu Luo:
Embedding of binomial trees in hypercubes with link faults. ICPP 1997: 96-99 - 1996
- [j24]W. Jie, Eduardo B. Fernández
, Z. Manxia:
Design and Modeling of Hybrid Fault-Tolerant Software With Cost Constraints. J. Syst. Softw. 35(2): 141-149 (1996) - [c26]Eduardo B. Fernández, Krishnakumar R. Nair, María M. Larrondo-Petrie, Yan Xu:
High-Level Security Issues in Multimedia/Hypertext Systems. Communications and Multimedia Security 1996: 13-24 - 1995
- [c25]Eduardo B. Fernández, Robert B. France, D. Wei:
A Formal Specification of an Authorization Model for Object-Oriented Databases. DBSec 1995: 95-110 - [c24]Haifeng Qian, Eduardo B. Fernández, Jie Wu:
A combined functional and object-oriented approach to software design. ICECCS 1995: 167-174 - [c23]Eduardo B. Fernández
, Robert B. France:
Formal specification of real-time dependable systems. ICECCS 1995: 342-348 - 1994
- [j23]Jie Wu, Y. Wang, Eduardo B. Fernández:
A uniform approach to software and hardware fault tolerance. J. Syst. Softw. 26(2): 117-127 (1994) - [j22]Eduardo B. Fernández
, Ehud Gudes, Haiyan Song:
A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 6(2): 275-292 (1994) - [j21]Jie Wu, Eduardo B. Fernández
:
Using Petri Nets for the Design of Conversation Boundaries in Fault-Tolerant Software. IEEE Trans. Parallel Distributed Syst. 5(10): 1106-1112 (1994) - [c22]Eduardo B. Fernández, Jie Wu, Minjie H. Fernandez:
User Group Structures in Object-Oriented Database Authorization. DBSec 1994: 57-76 - 1993
- [j20]Jie Wu, Eduardo B. Fernández:
Broadcasting in faulty hypercubes. Microprocess. Microprogramming 39(1): 43-53 (1993) - [c21]Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes:
A Method-Based Authorization Model for Object-Oriented Databases. Security for Object-Oriented Systems 1993: 135-150 - [c20]Jie Wu, Yi-Min Wang, Eduardo B. Fernández
:
A uniform approach to software and hardware fault tolerance. PDP 1993: 409-416 - [c19]Nurit Gal-Oz
, Ehud Gudes, Eduardo B. Fernández:
A Model of Methods Access Authorization in Object-oriented Databases. VLDB 1993: 52-61 - 1992
- [j19]Jie Wu, Eduardo B. Fernández
, Ruiguang Zhang:
Some extensions to the lattice model for computer security. Comput. Secur. 11(4): 357-369 (1992) - [j18]Khoa D. Huynh, Eduardo B. Fernández
, Taghi M. Khoshgoftaar:
A workload model for frame-based real-time applications on distributed systems. J. Syst. Softw. 18(3): 255-271 (1992) - [c18]Jie Wu, Eduardo B. Fernández:
Broadcasting in Faulty Cube-Connected-Cycles with Minimum Recovery Time. CONPAR 1992: 833-834 - [c17]Jie Wu, Eduardo B. Fernández
:
Reliable Broadcasting in Faulty Hypercube Computers. SRDS 1992: 122-129 - 1990
- [j17]Massimo Ancona, Gabriella Dodero, Vittoria Gianuzzi, Andrea Clematis
, Eduardo B. Fernández
:
A System Architecture for Fault Tolerance in Concurrent Software. Computer 23(10): 23-32 (1990) - [j16]Teresa F. Lunt, Eduardo B. Fernández:
Database Security. IEEE Data Eng. Bull. 13(4): 43-50 (1990) - [j15]Teresa F. Lunt, Eduardo B. Fernández:
Database Security. SIGMOD Rec. 19(4): 90-97 (1990) - [c16]Ehud Gudes, Haiyan Song, Eduardo B. Fernández:
Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. DBSec 1990: 85-98 - [c15]Jie Wu, Eduardo B. Fernández
:
The Extended G-Network, a Fault-Tolerant Interconnection Network for the Multiprocessors. PARBASE / Architectures 1990: 250-259
1980 – 1989
- 1989
- [j14]Jie Wu, Eduardo B. Fernández
:
A Simplification of a Conversation Design Scheme Using Petri Nets. IEEE Trans. Software Eng. 15(5): 658-660 (1989) - [c14]María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández:
Security Policies in Object-Oriented Databases. DBSec 1989: 257-268 - [c13]Eduardo B. Fernández
, Ehud Gudes, Haiyan Song:
A Security Model for Object-Oriented Databases. S&P 1989: 110-115 - 1988
- [j13]Brenda M. Ozaki, Eduardo B. Fernández
, Ehud Gudes:
Software fault tolerance in architectures with hierarchical protection levels. IEEE Micro 8(4): 30-43 (1988) - 1987
- [c12]Massimo Ancona, Andrea Clematis, Gabriella Dodero, Eduardo B. Fernández, Vittoria Gianuzzi:
A System Architecture for Software Fault Tolerance. Fehlertolerierende Rechensysteme 1987: 273-283 - 1983
- [j12]Christopher Wood, Eduardo B. Fernández
, Tomás Lang:
Minimization of Demand Paging for the LRU Stack Model of Program Behavior. Inf. Process. Lett. 16(2): 99-104 (1983) - 1980
- [j11]Eduardo B. Fernández:
Surveyor's Forum: Related Information. ACM Comput. Surv. 12(1): 111-112 (1980) - [j10]Christopher Wood, Eduardo B. Fernández
, Rita C. Summers:
Data Base Security: Requirements, Policies, and Models. IBM Syst. J. 19(2): 229-252 (1980)
1970 – 1979
- 1979
- [j9]Christopher Wood, Rita C. Summers, Eduardo B. Fernández
:
Authorization in multilevel database models. Inf. Syst. 4(2): 155-161 (1979) - [c11]Christopher Wood, Eduardo B. Fernández:
Decentralized Authorization in a Database System. VLDB 1979: 352-359 - 1978
- [j8]Eduardo B. Fernández
, Tomás Lang, Christopher Wood:
Effect of Replacement Algorithms on a Paged Buffer Database System. IBM J. Res. Dev. 22(2): 185-196 (1978) - [j7]Eduardo B. Fernández, Rita C. Summers, Tomás Lang, Charles D. Coleman:
Architectural Support for System Protection and Database Security. IEEE Trans. Computers 27(8): 767-771 (1978) - [c10]Larry Lichten, Eduardo B. Fernández
:
Interaction with databases through procedural languages. ACM Annual Conference (2) 1978: 937-945 - 1977
- [j6]Tomás Lang, Eduardo B. Fernández
:
Improving the Computation of Lower Bounds for Optimal Schedules. IBM J. Res. Dev. 21(3): 273-280 (1977) - [j5]Tomás Lang, Christopher Wood, Eduardo B. Fernández
:
Database Buffer Paging in Virtual Storage Systems. ACM Trans. Database Syst. 2(4): 339-351 (1977) - [c9]Tomás Lang, Eduardo B. Fernández
, Rita C. Summers:
A system architecture for compile-time actions in databases. ACM Annual Conference 1977: 11-15 - [c8]T. Lang, E. Nahouraii, K. Kasuga, Eduardo B. Fernández:
An Architectural Extension for a Large Database System Incorporating a Processor for Disk Search. VLDB 1977: 204-210 - 1976
- [j4]Eduardo B. Fernández
, Tomás Lang:
Scheduling as a Graph Transformation. IBM J. Res. Dev. 20(6): 551-559 (1976) - [j3]Tomás Lang, Eduardo B. Fernández
:
Scheduling of Unit-Length Independent Tasks with Execution Constraints. Inf. Process. Lett. 4(4): 95-98 (1976) - [c7]Michael Stonebraker, Peter Rubinstein, Richard Conway, David Strip, H. Rex Hartson, David K. Hsiao, Eduardo B. Fernández:
SIGBDP (Paper Session). ACM Annual Conference 1976: 79 - [c6]Eduardo B. Fernández
, Rita C. Summers:
Integrity aspects of a shared data base. AFIPS National Computer Conference 1976: 819-827 - [c5]Eduardo B. Fernández, Rita C. Summers, Charles D. Coleman:
Architecture Support for System Protection. ISCA 1976: 121 - 1975
- [j2]Eduardo B. Fernández
, Tomás Lang:
Computation of Lower Bounds for Multiprocessor Schedules. IBM J. Res. Dev. 19(5): 435-444 (1975) - [c4]Rita C. Summers, Charles D. Coleman, Eduardo B. Fernández:
A Programming Language Extension for Access to a Shared Data Base. ACM Pacific 1975: 114-118 - [c3]Eduardo B. Fernández
, Rita C. Summers, Charles D. Coleman:
An Authorization Model for a Shared Data Base. SIGMOD Conference 1975: 23-31 - [c2]Eduardo B. Fernández
, Rita C. Summers, Tomás Lang:
Definition and Evaluation of Access Rules in Data Management Systems. VLDB 1975: 268-285 - 1974
- [c1]Bertram Bussell, Eduardo B. Fernández, Olivier Levy:
Optimal Scheduling for Homogeneous Multiprocessors. IFIP Congress 1974: 286-290 - 1973
- [j1]Eduardo B. Fernández
, Bertram Bussell:
Bounds on the Number of Processors and Time for Multiprocessor Optimal Schedules. IEEE Trans. Computers 22(8): 745-751 (1973)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint