default search action
Eduardo Fernández-Medina
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j77]Luis Enrique Sánchez, Antonio Santos-Olmo, David Garcia Rosado, Carlos Blanco, Manuel A. Serrano, Haralambos Mouratidis, Eduardo Fernández-Medina:
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks. Comput. Stand. Interfaces 92: 103935 (2025) - 2024
- [j76]Antonio Santos-Olmo, Luis Enrique Sánchez, David Garcia Rosado, Manuel A. Serrano, Carlos Blanco, Haralambos Mouratidis, Eduardo Fernández-Medina:
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals. Frontiers Comput. Sci. 18(3): 183808 (2024) - [j75]Ferney Martínez, Luis Enrique Sánchez, Antonio Santos-Olmo, David Garcia Rosado, Eduardo Fernández-Medina:
Maritime cybersecurity: protecting digital seas. Int. J. Inf. Sec. 23(2): 1429-1457 (2024) - [j74]David Garcia Rosado, Luis Enrique Sánchez, Ángel Jesús Varela-Vaca, Antonio Santos-Olmo, María Teresa Gómez-López, Rafael M. Gasca, Eduardo Fernández-Medina:
Enabling security risk assessment and management for business process models. J. Inf. Secur. Appl. 84: 103829 (2024) - [j73]Manuel A. Serrano, Luis Enrique Sánchez, Antonio Santos-Olmo, David Garcia Rosado, Carlos Blanco, Vita Santa Barletta, Danilo Caivano, Eduardo Fernández-Medina:
Minimizing incident response time in real-world scenarios using quantum computing. Softw. Qual. J. 32(1): 163-192 (2024) - 2023
- [j72]Carlos Blanco, David Garcia Rosado, Ángel Jesús Varela-Vaca, María Teresa Gómez-López, Eduardo Fernández-Medina:
Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning. Internet Things 24: 100989 (2023) - [j71]Luis Enrique Sánchez, Antonio Santos-Olmo, Haralambos Mouratidis, Eduardo Fernández-Medina:
New Frontiers in Security Risk Management. IT Prof. 25(3): 61-67 (2023) - [j70]Maria I. Ortega, Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina:
A Systematic Analysis of Security in Blockchain. J. Inf. Sci. Eng. 39(1): 197-222 (2023) - [c125]Manuel A. Serrano, Luis Enrique Sánchez Crespo, Antonio Santos-Olmo, David Garcia Rosado, Carlos Blanco, Eduardo Fernández-Medina:
Towards a Quantum World in Cybersecurity Land. IS-EUD Workshops 2023 - 2022
- [j69]David Garcia Rosado, Antonio Santos-Olmo, Luis Enrique Sánchez, Manuel A. Serrano, Carlos Blanco, Haralambos Mouratidis, Eduardo Fernández-Medina:
Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern. Comput. Ind. 142: 103715 (2022) - [j68]Carlos Blanco, Diego García-Saiz, David Garcia Rosado, Antonio Santos-Olmo, Jesús Peral, Alejandro Maté, Juan Trujillo, Eduardo Fernández-Medina:
Security policies by design in NoSQL document databases. J. Inf. Secur. Appl. 65: 103120 (2022) - 2021
- [j67]Ángel Jesús Varela-Vaca, David Garcia Rosado, Luis Enrique Sánchez, María Teresa Gómez-López, Rafael M. Gasca, Eduardo Fernández-Medina:
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems. Comput. Ind. 132: 103524 (2021) - [j66]David Garcia Rosado, Julio Moreno, Luis Enrique Sánchez, Antonio Santos-Olmo, Manuel A. Serrano, Eduardo Fernández-Medina:
MARISMA-BiDa pattern: Integrated risk analysis for big data. Comput. Secur. 102: 102155 (2021) - [j65]Julio Moreno, David Garcia Rosado, Luis Enrique Sánchez, Manuel A. Serrano, Eduardo Fernández-Medina:
Security Reference Architecture for Cyber-Physical Systems (CPS). J. Univers. Comput. Sci. 27(6): 609-634 (2021) - [j64]Alejandro Maté, Jesús Peral, Juan Trujillo, Carlos Blanco, Diego García-Saiz, Eduardo Fernández-Medina:
Improving security in NoSQL document databases through model-driven modernization. Knowl. Inf. Syst. 63(8): 2209-2230 (2021) - 2020
- [j63]Julio Moreno, Javier Gómez, Manuel A. Serrano, Eduardo B. Fernández, Eduardo Fernández-Medina:
Application of security reference architecture to Big Data ecosystems in an industrial scenario. Softw. Pract. Exp. 50(8): 1520-1538 (2020) - [c124]Ángel Jesús Varela-Vaca, David Garcia Rosado, Luis Enrique Sánchez, María Teresa Gómez-López, Rafael M. Gasca, Eduardo Fernández-Medina:
Definition and Verification of Security Configurations of Cyber-Physical Systems. CyberICPS/SECPRE/ADIoT@ESORICS 2020: 135-155
2010 – 2019
- 2019
- [j62]Julio Moreno, Eduardo B. Fernández, Manuel A. Serrano, Eduardo Fernández-Medina:
Secure Development of Big Data Ecosystems. IEEE Access 7: 96604-96619 (2019) - [c123]Julio Moreno, Eduardo B. Fernández, Eduardo Fernández-Medina, Manuel A. Serrano:
BlockBD: a security pattern to incorporate blockchain in big data ecosystems. EuroPLoP 2019: 17:1-17:8 - 2018
- [c122]Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina:
Modelado de Requisitos de Seguridad para Big Data. CIbSE 2018: 515-522 - [c121]Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina, Eduardo B. Fernández:
Towards a Security Reference Architecture for Big Data. DOLAP 2018 - [c120]Carlos Blanco, Diego García-Saiz, Jesús Peral, Alejandro Maté, Alejandro Oliver, Eduardo Fernández-Medina:
How the Conceptual Modelling Improves the Security on Document Databases. ER 2018: 497-504 - [c119]Julio Moreno, Eduardo B. Fernández, Eduardo Fernández-Medina, Manuel A. Serrano:
A Security Pattern for Key-Value NoSQL Database Authorization. EuroPLoP 2018: 12:1-12:4 - [r2]Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo:
Data Warehouse Security. Encyclopedia of Database Systems (2nd ed.) 2018 - 2016
- [j61]Luis Enrique Sánchez, Antonio Santos-Olmo, Esther Álvarez, Monica Huerta, Sara Camacho, Eduardo Fernández-Medina:
Development of an Expert System for the Evaluation of Students' Curricula on the Basis of Competencies. Future Internet 8(2): 22 (2016) - [j60]Antonio Santos-Olmo, Luis Enrique Sánchez, Ismael Caballero, Sara Camacho, Eduardo Fernández-Medina:
The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets. Future Internet 8(3): 30 (2016) - [j59]Antonio Santos-Olmo, Luis Enrique Sánchez, David Garcia Rosado, Eduardo Fernández-Medina, Mario Piattini:
Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems. Future Internet 8(3): 36 (2016) - [j58]Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina:
Main Issues in Big Data Security. Future Internet 8(3): 44 (2016) - [c118]Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina:
Securing Databases Using Big Data Technology. ICIQ 2016: 93-102 - 2015
- [j57]Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina:
ISGcloud: a Security Governance Framework for Cloud Computing. Comput. J. 58(10): 2233-2254 (2015) - [j56]Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo:
Modernizing Secure OLAP Applications with a Model-Driven Approach. Comput. J. 58(10): 2351-2367 (2015) - [j55]Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo:
An MDA approach for developing secure OLAP applications: Metamodels and transformations. Comput. Sci. Inf. Syst. 12(2): 541-565 (2015) - [j54]Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina, Haralambos Mouratidis:
Empirical evaluation of a cloud computing information security governance framework. Inf. Softw. Technol. 58: 44-57 (2015) - [j53]Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo:
An architecture for automatically developing secure OLAP applications from models. Inf. Softw. Technol. 59: 1-16 (2015) - [c117]Luis Márquez Alcañiz, David Garcia Rosado, Haralambos Mouratidis, Daniel Mellado, Eduardo Fernández-Medina:
A Framework for Secure Migration Processes of Legacy Systems to the Cloud. CAiSE Workshops 2015: 507-517 - [c116]Nikolaos Argyropoulos, Luis Márquez Alcañiz, Haralambos Mouratidis, Andrew Fish, David Garcia Rosado, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina:
Eliciting Security Requirements for Business Processes of Legacy Systems. PoEM 2015: 91-107 - [c115]Shaun Shei, Luis Márquez Alcañiz, Haralambos Mouratidis, Aidan J. Delaney, David Garcia Rosado, Eduardo Fernández-Medina:
Modelling secure cloud systems based on system requirements. ESPRE 2015: 19-24 - 2014
- [j52]Daniel Mellado, Haralambos Mouratidis, Eduardo Fernández-Medina:
Secure Tropos framework for software product lines requirements engineering. Comput. Stand. Interfaces 36(4): 711-722 (2014) - [j51]Santiago Moral-García, Santiago Moral-Rubio, Eduardo B. Fernández, Eduardo Fernández-Medina:
Enterprise security pattern: A model-driven architecture instance. Comput. Stand. Interfaces 36(4): 748-758 (2014) - [j50]Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo:
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications. J. Univers. Comput. Sci. 20(2): 79-106 (2014) - [j49]Santiago Moral-García, Santiago Moral-Rubio, David Garcia Rosado, Eduardo B. Fernández, Eduardo Fernández-Medina:
Enterprise security pattern: a new type of security pattern. Secur. Commun. Networks 7(11): 1670-1690 (2014) - [c114]Luis Márquez Alcañiz, David Garcia Rosado, Daniel Mellado, Eduardo Fernández-Medina:
Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study. WOSIS 2014: 26-37 - 2013
- [j48]Belén Vela, Jose-Norberto Mazón, Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Esperanza Marcos:
Development of Secure XML Data Warehouses with QVT. Inf. Softw. Technol. 55(9): 1651-1677 (2013) - [j47]Keiko Hashizume, David Garcia Rosado, Eduardo Fernández-Medina, Eduardo B. Fernández:
An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1): 5:1-5:13 (2013) - 2012
- [j46]Belén Vela, Carlos Blanco, Eduardo Fernández-Medina, Esperanza Marcos:
A practical application of our MDD approach for modeling secure XML data warehouses. Decis. Support Syst. 52(4): 899-925 (2012) - [j45]David Garcia Rosado, Rafael Gómez, Daniel Mellado, Eduardo Fernández-Medina:
Security Analysis in the Migration to Cloud Environments. Future Internet 4(2): 469-487 (2012) - [j44]David Garcia Rosado, Luis Enrique Sánchez, Eduardo Fernández-Medina, Jan Jürjens:
Security in Information Systems: New Challenges and Opportunities. J. Univers. Comput. Sci. 18(6): 728-731 (2012) - [j43]Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina:
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment. J. Univers. Comput. Sci. 18(6): 798-815 (2012) - [j42]Ismael Caballero, Luis Enrique Sánchez, Alberto Freitas, Eduardo Fernández-Medina:
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management. J. Univers. Comput. Sci. 18(12): 1703-720 (2012) - 2011
- [j41]Carlos Blanco, Joaquín Lasheras, Eduardo Fernández-Medina, Rafael Valencia-García, José Ambrosio Toval Álvarez:
Basis for an integrated security ontology according to a systematic review of existing proposals. Comput. Stand. Interfaces 33(4): 372-388 (2011) - [j40]Alfonso Rodríguez, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Secure business process model specification through a UML 2.0 activity diagram profile. Decis. Support Syst. 51(3): 446-465 (2011) - [j39]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems. IEICE Trans. Inf. Syst. 94-D(2): 243-254 (2011) - [j38]Anthony Marcus, Mihaela Cardei, Ionut Cardei, Eduardo Fernández-Medina, Fulvio Frati, Ernesto Damiani:
A Pattern for Web-based WSN Monitoring (Invited Paper). J. Commun. 6(5): 393-399 (2011) - [j37]David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
Systematic design of secure Mobile Grid systems. J. Netw. Comput. Appl. 34(4): 1168-1183 (2011) - [j36]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Security services architecture for Secure Mobile Grid Systems. J. Syst. Archit. 57(3): 240-258 (2011) - [c113]Roberto Ortiz, Javier Garzás, Eduardo Fernández-Medina:
Analysis of Application of Security Patterns to Build Secure Systems. CAiSE Workshops 2011: 652-659 - [c112]Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina:
A Comparative Review of Cloud Security Proposals with ISO/IEC 27002. WOSIS 2011: 3-12 - [c111]Santiago Moral-García, Santiago Moral-Rubio, Eduardo Fernández-Medina:
Security Pattern Mining: Systematic Review and Proposal. WOSIS 2011: 13-24 - [c110]Roberto Ortiz, Santiago Moral-Rubio, Javier Garzás, Eduardo Fernández-Medina:
Towards a Pattern-based Security Methodology to Build Secure Information Systems. WOSIS 2011: 59-69 - [c109]Antonio Santos-Olmo, Luis Enrique Sánchez, Eduardo Fernández-Medina, Mario Piattini:
Desirable Characteristics for an ISMS oriented to SMEs. WOSIS 2011: 151-158 - [c108]Angel Gallego, Antonio Santos-Olmo, Luis Enrique Sánchez, Eduardo Fernández-Medina:
Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs. WOSIS 2011: 159-166 - 2010
- [j35]Daniel Mellado, Carlos Blanco, Luis Enrique Sánchez, Eduardo Fernández-Medina:
A systematic review of security requirements engineering. Comput. Stand. Interfaces 32(4): 153-165 (2010) - [j34]Miguel A. Martínez, Joaquín Lasheras, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini:
A Personal Data Audit Method through Requirements Engineering. Comput. Stand. Interfaces 32(4): 166-178 (2010) - [j33]Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Defining and transforming security rules in an MDA approach for DWs. Int. J. Bus. Intell. Data Min. 5(2): 116-133 (2010) - [j32]David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
Analysis of Secure Mobile Grid Systems: A systematic approach. Inf. Softw. Technol. 52(5): 517-536 (2010) - [j31]Alfonso Rodríguez, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Mario Piattini:
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach. Inf. Softw. Technol. 52(9): 945-971 (2010) - [j30]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Security requirements engineering framework for software product lines. Inf. Softw. Technol. 52(10): 1094-1117 (2010) - [j29]David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
Developing a Secure Mobile Grid System through a UML Extension. J. Univers. Comput. Sci. 16(17): 2333-2352 (2010) - [c107]Luis Enrique Sánchez, Carlos Ruiz, Eduardo Fernández-Medina, Mario Piattini:
Managing the Asset Risk of SMEs. ARES 2010: 422-429 - [c106]Luis Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernández-Medina, Mario Piattini:
Security Culture in Small and Medium-Size Enterprise. CENTERIS (2) 2010: 315-324 - [c105]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
A comparison of software design security metrics. ECSA Companion Volume 2010: 236-242 - [c104]Belén Vela, Carlos Blanco, Eduardo Fernández-Medina, Esperanza Marcos:
Model driven development of secure XML data warehouses: a case study. EDBT/ICDT Workshops 2010 - [c103]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
A Study of Security Approaches for the Development of Mobile Grid Systems. ICSOFT (1) 2010: 133-138 - [c102]Carlos Gutiérrez, David Garcia Rosado, Eduardo Fernández-Medina:
The practical application of a process for eliciting and designing security in web service systems. JISBD 2010: 143-143 - [c101]Roberto Ortiz, Santiago Moral-García, Santiago Moral-Rubio, Belén Vela, Javier Garzás, Eduardo Fernández-Medina:
Applicability of Security Patterns. OTM Conferences (1) 2010: 672-684 - [c100]Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Jan Jürjens:
Towards the Secure Modelling of OLAP Users' Behaviour. Secure Data Management 2010: 101-112 - [c99]Luis Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernández-Medina, Mario Piattini:
Building ISMS through the Reuse of Knowledge. TrustBus 2010: 190-201
2000 – 2009
- 2009
- [j28]Eduardo Fernández-Medina, Alfonso Rodríguez, Mariemma Yague:
Guest Editorial. J. Res. Pract. Inf. Technol. 41(2): 85 (2009) - [j27]Carlos Blanco, Ignacio García Rodríguez de Guzmán, David Garcia Rosado, Eduardo Fernández-Medina, Juan Trujillo:
Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services. J. Res. Pract. Inf. Technol. 41(2): 135-154 (2009) - [j26]Juan Trujillo, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini:
A UML 2.0 profile to define security requirements for Data Warehouses. Comput. Stand. Interfaces 31(5): 969-983 (2009) - [j25]David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
Obtaining Security Requirements for a Mobile Grid System. Int. J. Grid High Perform. Comput. 1(3): 1-17 (2009) - [j24]Eduardo Fernández-Medina, Jan Jürjens, Juan Trujillo, Sushil Jajodia:
Model-Driven Development for secure information systems. Inf. Softw. Technol. 51(5): 809-814 (2009) - [j23]Juan Trujillo, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini:
An engineering process for developing Secure Data Warehouses. Inf. Softw. Technol. 51(6): 1033-1051 (2009) - [j22]Carlos Gutiérrez, David Garcia Rosado, Eduardo Fernández-Medina:
The practical application of a process for eliciting and designing security in web service systems. Inf. Softw. Technol. 51(12): 1712-1738 (2009) - [j21]Emilio Soler, Juan Trujillo, Carlos Blanco, Eduardo Fernández-Medina:
Designing Secure Data Warehouses by Using MDA and QVT. J. Univers. Comput. Sci. 15(8): 1607-1641 (2009) - [j20]Eduardo Fernández-Medina, Alfonso Rodríguez:
Security in Information Systems: New Advances and Tendencies. J. Univers. Comput. Sci. 15(15): 2912-2915 (2009) - [c98]Daniel Mellado, Jesús Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. ARES 2009: 224-231 - [c97]Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Including Security Rules Support in an MDA Approach for Secure DWs. ARES 2009: 516-521 - [c96]Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. ARES 2009: 528-533 - [c95]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros. CIbSE 2009: 388-393 - [c94]Carlos Blanco, Ricardo Pérez-Castillo, Arnulfo Hernández, Eduardo Fernández-Medina, Juan Trujillo:
Towards a Modernization Process for Secure Data Warehouses. DaWaK 2009: 24-35 - [c93]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application. ER Workshops 2009: 126-136 - [c92]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Reusable security use cases for mobile grid environments. SESS@ICSE 2009: 1-8 - [c91]Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo:
Reingeniería sobre Almacenes de Datos Seguros aplicando ADM. JISBD 2009: 146-157 - [c90]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Towards security requirements management for software product lines: a security domain requirements engineering process. JISBD 2009: 267-267 - [c89]David Garcia Rosado, Eduardo Fernández-Medina, Javier López:
Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros. JISBD 2009: 331-342 - [c88]Luis Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernández-Medina, Mario Piattini:
MMSM-SME: Methodology for the Management of Security and its Maturity in SME. WOSIS 2009: 67-78 - [p1]Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
An MDA Compliant Approach for Designing Secure Data Warehouses. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 637-647 - [e11]Eduardo Fernández-Medina, Manu Malek, Javier Hernando:
SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2009, ISBN 978-989-674-005-4 [contents] - [e10]Alfonso Rodríguez, Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina:
Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009. INSTICC Press 2009, ISBN 978-989-8111-91-3 [contents] - [r1]Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Data Warehouse Security. Encyclopedia of Database Systems 2009: 675-679 - 2008
- [j19]Eduardo Fernández-Medina, Mariemma Inmaculada Yagüe del Valle:
State of standards in the information systems security area. Comput. Stand. Interfaces 30(6): 339-340 (2008) - [j18]Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Building a secure star schema in data warehouses by an extension of the relational package from CWM. Comput. Stand. Interfaces 30(6): 341-350 (2008) - [j17]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Towards security requirements management for software product lines: A security domain requirements engineering process. Comput. Stand. Interfaces 30(6): 361-371 (2008) - [j16]Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
How to implement multidimensional security into OLAP tools. Int. J. Bus. Intell. Data Min. 3(3): 255-276 (2008) - [c87]Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. ARES 2008: 104-111 - [c86]David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. ARES 2008: 136-143 - [c85]Carlos Blanco, Joaquín Lasheras, Rafael Valencia-García, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini:
A Systematic Review and Comparison of Security Ontologies. ARES 2008: 813-820 - [c84]Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Implementing Multidimensional Security into OLAP Tools. ARES 2008: 1248-1253 - [c83]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Security Requirements Variability for Software Product Lines. ARES 2008: 1413-1420 - [c82]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Aplicando un Proceso de Ingeniería de Requisitos de Seguridad de Dominio para Líneas de Producto Software. CIbSE 2008: 141-154 - [c81]Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Modelado de Requisitos de Seguridad para Almacenes de Datos. CIbSE 2008: 281-294 - [c80]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models. ER Workshops 2008: 103-112 - [c79]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Security Requirements Management in Software Product Line Engineering. ICETE (Selected Papers) 2008: 250-263 - [c78]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Security Requirements Engineering Process for Software Product Lines: A Case Study. ICSEA 2008: 1-6 - [c77]David Garcia Rosado, Eduardo Fernández-Medina, Mario Piattini, Javier López:
Engineering Process Based on Grid Use Cases for Mobile Grid Systems. ICSOFT (SE/MUSE/GSDCA) 2008: 146-151 - [c76]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Gestión de la Variabilidad de los Requisitos de Seguridad en Líneas de Producto. JISBD 2008: 39-50 - [c75]Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Hacia la Implementación Automática de Almacenes de Datos Seguros en Herramientas OLAP. JISBD 2008: 205-216 - [c74]Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Construcción de Modelos Lógicos Multidimensionales Seguros para su Implementación en Herramientas OLAP Mediante MDA y QVT. JISBD 2008: 373-378 - [c73]Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Automatic Generation of Secure Multidimensional Code for Data Warehouses by using QVT Transformations: an MDA Approach. MODSEC@MoDELS 2008 - [c72]Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach. OTM Conferences (2) 2008: 1052-1068 - [c71]Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:
Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas. SECRYPT 2008: 391-398 - [c70]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Security Requirements in Software Product Lines. SECRYPT 2008: 442-449 - [c69]Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT. WOSIS 2008: 38-48 - [e9]Eduardo Fernández-Medina, Manu Malek, Javier Hernando:
SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2008, ISBN 978-989-8111-59-3 [contents] - [e8]Alfonso Rodríguez, Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina:
Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008. INSTICC Press 2008, ISBN 978-989-8111-44-9 [contents] - 2007
- [j15]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
A common criteria based security requirements engineering process for the development of secure information systems. Comput. Stand. Interfaces 29(2): 244-253 (2007) - [j14]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
An MDA. appproach to develop secure business processes through a UML 2.0 extension. Comput. Syst. Sci. Eng. 22(5) (2007) - [j13]Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Model-driven multidimensional modeling of secure data warehouses. Eur. J. Inf. Syst. 16(4): 374-389 (2007) - [j12]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
A BPMN Extension for the Modeling of Security Requirements in Business Processes. IEICE Trans. Inf. Syst. 90-D(4): 745-752 (2007) - [j11]Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Web Services-Based Security Requirement Elicitation. IEICE Trans. Inf. Syst. 90-D(9): 1374-1387 (2007) - [j10]Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini:
Developing secure data warehouses with a UML extension. Inf. Syst. 32(6): 826-856 (2007) - [c68]Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
A Framework for the Development of Secure Data Warehouses based on MDA and QVT. ARES 2007: 294-300 - [c67]Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses. ARES 2007: 644-654 - [c66]Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Application of QVT for the Development of Secure Data Warehouses: A case study. ARES 2007: 829-836 - [c65]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases. BPM 2007: 408-415 - [c64]Daniel Mellado, Moisés Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Soporte Automatizado a la Ingeniería de Requisitos de Seguridad. CIbSE 2007: 17-30 - [c63]Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Aplicación de QVT al Desarrollo de Almacenes de Datos Seguros: Un caso de Estudio. CIbSE 2007: 209-222 - [c62]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification. ER Workshops 2007: 106-115 - [c61]David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Defining Security Architectural Patterns Based on Viewpoints. ICCSA (3) 2007: 262-272 - [c60]Eugenio Verbo, Ismael Caballero, Eduardo Fernández-Medina, Mario Piattini:
Data Quality in XML Databases - A Methodology for Semi-Structured Database Design Supporting Data Quality Issues. ICSOFT (ISDM/EHST/DC) 2007: 117-122 - [c59]Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:
Scmm-Tool - Tool for Computer Automation of the Information Security Management Systems. ICSOFT (SE) 2007: 311-318 - [c58]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
CIM to PIM Transformation: A Reality. CONFENIS (2) 2007: 1239-1249 - [c57]Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Una extensión del metamodelo relacional de CWM para representar Almacenes de Datos Seguros a nivel lógico. JISBD 2007: 83-92 - [c56]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Gestión Integral de Requisitos de Seguridad en Líneas de Producto Software. JISBD 2007: 177-186 - [c55]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo:
Especificación de Procesos de Negocio Seguros a través de una extensión de UML 2.0. JISBD 2007: 336-345 - [c54]Alfonso Rodríguez, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Mario Piattini:
Transformaciones QVT para la obtención de Clases de Análisis a partir de un Modelo de Proceso de Negocio Seguro. JISBD 2007: 361-366 - [c53]Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:
Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises. SECRYPT 2007: 355-362 - [c52]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines. WOSIS 2007: 220-232 - [c51]Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level. WOSIS 2007: 245-256 - [c50]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Analysis-Level Classes from Secure Business Processes Through Model Transformations. TrustBus 2007: 104-114 - [e7]Javier Hernando, Eduardo Fernández-Medina, Manu Malek:
SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2007, ISBN 978-989-8111-12-8 [contents] - [e6]Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina:
Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007. INSTICC Press 2007, ISBN 978-972-8865-96-2 [contents] - 2006
- [j9]Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Towards a Process for Web Services Security. J. Res. Pract. Inf. Technol. 38(1) (2006) - [j8]Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo:
A UML 2.0/OCL Extension for Designing Secure Data Warehouses. J. Res. Pract. Inf. Technol. 38(1) (2006) - [j7]Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini:
Access control and audit model for the multidimensional modeling of data warehouses. Decis. Support Syst. 42(3): 1270-1289 (2006) - [j6]Eduardo Fernández-Medina, Carlos A. Gutiérrez, Mario Piattini:
Developing web services security systems: a case study. Int. J. Web Eng. Technol. 2(4): 292-306 (2006) - [j5]David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Security patterns and requirements for internet-based applications. Internet Res. 16(5): 519-536 (2006) - [j4]Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini:
Model driven development of secure XML databases. SIGMOD Rec. 35(3): 22-27 (2006) - [c49]David Garcia Rosado, Eduardo Fernández-Medina, Mario Piattini, Carlos Gutiérrez:
A Study of Security Architectural Patterns. ARES 2006: 358-365 - [c48]Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini:
Quality of Password Management Policy. ARES 2006: 544-550 - [c47]Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:
Practical Approach of a Secure Management System based on ISO/IEC 17799. ARES 2006: 585-592 - [c46]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements. ARES 2006: 654-661 - [c45]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Security Requirement with a UML 2.0 Profile. ARES 2006: 670-677 - [c44]Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo:
Representing levels of abstraction to facilitate the Secure Multidimensional Modeling. ARES 2006: 678-684 - [c43]Emilio Soler, Rodolfo Villarroel, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel. ARES 2006: 914-921 - [c42]Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini:
Una Aproximación Dirigida por Modelos para el Diseño de Bases de Datos XML Seguras. CIbSE 2006: 229-242 - [c41]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Análisis Comparativo de Propuestas de Establecimiento de Requisitos de Seguridad para el Desarrollo de Sistemas de Información Seguros. CIbSE 2006: 345-358 - [c40]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Extensión de UML 2.0 para especificar Requisitos de Seguridad en Procesos de Negocios. CIbSE 2006: 375-388 - [c39]Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Un Conjunto de Transformaciones QVT para el Modelado de Almacenes de Datos Seguros. DSDM 2006 - [c38]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile. ER (Workshops) 2006: 32-42 - [c37]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Applying a Security Requirements Engineering Process. ESORICS 2006: 192-206 - [c36]Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini:
Metrics of Password Management Policy. ICCSA (3) 2006: 1013-1023 - [c35]Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Using UML Packages for Designing Secure Data Warehouses. ICCSA (3) 2006: 1024-1034 - [c34]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems. ICCSA (3) 2006: 1044-1053 - [c33]Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
PWSSec: Process for Web Services Security. ICWS 2006: 213-222 - [c32]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Aplicación práctica de un proceso de ingeniería de requisitos de seguridad. JISBD 2006: 315-324 - [c31]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio. JISBD 2006: 347-356 - [c30]David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Defining Viewpoints for Security Architectural Patterns. SECRYPT 2006: 419-424 - [c29]Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Security Risk Analysis in Web Services Systems. SECRYPT 2006: 425-430 - [c28]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Secure Information Systems Development - Based on a Security Requirements Engineering Process. SECRYPT 2006: 467-470 - [c27]Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini:
A Model Driven Approach for Secure XML Database Development. WOSIS 2006: 33-46 - [c26]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems. WOSIS 2006: 135-145 - [c25]David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Security Patterns Related to Security Requirements. WOSIS 2006: 163-173 - [c24]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. WOSIS 2006: 174-184 - [c23]Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:
Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises. WOSIS 2006: 256-266 - [c22]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. TrustBus 2006: 51-61 - [e5]Manu Malek, Eduardo Fernández-Medina, Javier Hernando:
SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2006, ISBN 972-8865-63-5 [contents] - [e4]Eduardo Fernández-Medina, Mariemma Inmaculada Yagüe del Valle:
Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006. INSTICC Press 2006, ISBN 978-972-8865-52-8 [contents] - 2005
- [j3]Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini:
Secure information systems development - a survey and comparison. Comput. Secur. 24(4): 308-321 (2005) - [j2]Eduardo Fernández-Medina, Mario Piattini:
Designing secure databases. Inf. Softw. Technol. 47(7): 463-477 (2005) - [c21]Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Un Modelo de Seguridad para Almacenes de Datos e Implementación Semiautomática con OLS10g. CIbSE 2005: 243-254 - [c20]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Representación de Requisitos de Seguridad en el Modelado de Procesos de Negocios. CIbSE 2005: 255-266 - [c19]Carlos Gutiérrez García, Eduardo Fernández-Medina, Mario Piattini:
PWSSEC: Proceso de Desarrollo para Seguridad de Servicios. JISBD 2005: 203-210 - [c18]Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Towards a UML 2.0/OCL extension for designing Secure Data Warehouses. WOSIS 2005: 217-228 - [c17]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Towards an integration of Security Requirements into Business Process Modeling. WOSIS 2005: 287-297 - [c16]Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Towards a Process for Web Services Security. WOSIS 2005: 298-308 - [c15]Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Web services enterprise security architecture: a case study. SWS 2005: 10-19 - [e3]Eduardo Fernández-Medina, Julio César Hernández Castro, Luis Javier García Castro:
Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, In conjunction with ICEIS2005, Miami, USA, May 2005. INSTICC Press 2005, ISBN 972-8865-25-2 [contents] - 2004
- [j1]Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Web Services Security: Is the Problem Solved? Inf. Secur. J. A Glob. Perspect. 13(3): 22-31 (2004) - [c14]Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini:
A Comparison of Secure Information Systems Design Methodologies. CAiSE Workshops (1) 2004: 189-198 - [c13]Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini:
Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics. Security and Management 2004: 109-117 - [c12]Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini:
General Considerations on Data Warehouse Security. Security and Management 2004: 242-248 - [c11]Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini:
Incorporating Security Issues in the Information Systems Design. ENC 2004: 345-352 - [c10]Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini:
Extending UML for Designing Secure Data Warehouses. ER 2004: 217-230 - [c9]Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
A Survey of Web Services Security. ICCSA (1) 2004: 968-977 - [c8]Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Web Services Security: is the problem solved? WOSIS 2004: 293-304 - [c7]Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini:
Towards a Classification of Security Metrics. WOSIS 2004: 342-350 - [c6]Eduardo Fernández-Medina, Mario Piattini:
Extending OCL for Secure Database Development. UML 2004: 380-394 - [e2]Eduardo Fernández-Medina, Julio César Hernández Castro, L. Javier García-Villalba:
Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004. INSTICC Press 2004, ISBN 972-8865-07-4 [contents] - 2003
- [c5]Eduardo Fernández-Medina, Mario Piattini:
A Methodology for Multilevel Database Design. CAiSE Short Paper Proceedings 2003 - [c4]Eduardo Fernández-Medina, Mario Piattini:
Designing Secure Databases for OLS. DEXA 2003: 886-895 - [c3]Eduardo Fernández-Medina, G. Ruiz, Sabrina De Capitani di Vimercati:
Implementing an Access Control System for SVG Documents. OTM Workshops 2003: 741-753 - 2002
- [c2]Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati:
Access Control of SVG Documents. DBSec 2002: 219-230 - [c1]Eduardo Fernández-Medina, Mario Piattini:
UML for the Design of Secure Databases. SIS 2002: 25-38 - [e1]Roberto Moya, Eduardo Fernández-Medina:
Security in Information Systems, Proceedings of the 1st International Workshop on Security in Information Systems, SIS 2002, In conjunction with ICEIS 2002, Ciudad Real, Spain, April 2002. ICEIS Press 2002, ISBN 972-98050-9-1 [contents]
Coauthor Index
aka: Luis Enrique Sánchez
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint