2008 |
82 | EE | Eduardo B. Fernández,
Hironori Washizaki,
Nobukazu Yoshioka,
Atsuto Kubo,
Yoshiaki Fukazawa:
Classifying Security Patterns.
APWeb 2008: 342-347 |
81 | EE | Nelly A. Delessy,
Eduardo B. Fernández:
A Pattern-Driven Security Process for SOA Applications.
ARES 2008: 416-421 |
80 | | Samuel F. Romero,
Christian A. Morillas,
Francisco J. Pelayo,
Eduardo B. Fernández:
Computer-Controlled Neurostimulation for a Visual Implant.
BIODEVICES (1) 2008: 84-91 |
79 | EE | Eduardo B. Fernández,
Mihai Fonoage,
Michael VanHilst,
Mirela Marta:
The Secure Three-Tier Architecture Pattern.
CISIS 2008: 555-560 |
78 | EE | Eduardo B. Fernández,
Jan Jürjens,
Nobukazu Yoshioka,
Hironori Washizaki:
Incorporating Database Systems into a Secure Software Development Methodology.
DEXA Workshops 2008: 310-314 |
77 | EE | Fabrício A. Braz,
Eduardo B. Fernández,
Michael VanHilst:
Eliciting Security Requirements through Misuse Activities.
DEXA Workshops 2008: 328-333 |
76 | EE | Nelly A. Delessy,
Eduardo B. Fernández:
A pattern-driven security process for SOA applications.
SAC 2008: 2226-2227 |
75 | EE | Eduardo B. Fernández,
Günther Pernul,
María M. Larrondo-Petrie:
Patterns and Pattern Diagrams for Access Control.
TrustBus 2008: 38-47 |
74 | | Michael VanHilst,
Eduardo B. Fernández,
Fabrício A. Braz:
A Multi-Dimensional Classification for Users of Security Patterns.
WOSIS 2008: 89-98 |
2007 |
73 | EE | Eduardo B. Fernández,
Xiaohong Yuan:
Securing analysis patterns.
ACM Southeast Regional Conference 2007: 288-293 |
72 | EE | Eduardo B. Fernández:
Security patterns and secure systems design.
ACM Southeast Regional Conference 2007: 510 |
71 | EE | Nelly A. Delessy,
Eduardo B. Fernández:
Adapting Web Services Security Standards for Mobile and Wireless Environments.
APWeb/WAIM Workshops 2007: 624-633 |
70 | EE | Eduardo B. Fernández,
Jose Ballesteros,
Ana C. Desouza-Doucet,
Maria M. Larrondo-Petrie:
Security Patterns for Physical Access Control Systems.
DBSec 2007: 259-274 |
69 | EE | Eduardo B. Fernández,
Preethi Cholmondeley,
Olaf Zimmermann:
Extending a Secure System Development Methodology to SOA.
DEXA Workshops 2007: 749-754 |
68 | EE | Eduardo B. Fernández,
Juan C. Pelaez,
María M. Larrondo-Petrie:
Attack Patterns: A New Forensic and Design Tool.
IFIP Int. Conf. Digital Forensics 2007: 345-357 |
67 | EE | Eduardo B. Fernández:
Security Patterns and Secure Systems Design.
LADC 2007: 233-234 |
66 | EE | Günther Pernul,
Marco Casassa Mont,
Eduardo B. Fernández,
Sokratis K. Katsikas,
Alfred Kobsa,
Rolf Oppliger:
Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
TrustBus 2007: 2 |
65 | EE | Bing Wu,
Jie Wu,
Eduardo B. Fernández,
Mohammad Ilyas,
Spyros S. Magliveras:
Secure and efficient key management in mobile ad hoc networks.
J. Network and Computer Applications 30(3): 937-954 (2007) |
64 | EE | Eduardo B. Fernández,
Juan C. Pelaez,
María M. Larrondo-Petrie:
Security Patterns for Voice over IP Networks.
JSW 2(2): 19-29 (2007) |
2006 |
63 | EE | Eduardo B. Fernández,
Nelly A. Delessy:
Using Patterns to Understand and Compare Web Services Security Products and Standards.
AICT/ICIW 2006: 157 |
62 | EE | Eduardo B. Fernández,
Michael VanHilst,
María M. Larrondo-Petrie,
Shihong Huang:
Defining Security Requirements Through Misuse Actions.
IFIP Workshop on Advanced Software Engineering 2006: 123-137 |
2005 |
61 | | Eduardo B. Fernández:
Security Patterns and Secure Systems Design Using UML.
ICEIS (1) 2005: 21 |
60 | EE | Bing Wu,
Jie Wu,
Eduardo B. Fernández,
Spyros S. Magliveras:
Secure and Efficient Key Management in Mobile Ad Hoc Networks.
IPDPS 2005 |
59 | EE | Eduardo B. Fernández,
Saeed Rajput,
Michael VanHilst,
María M. Larrondo-Petrie:
Some Security Issues of Wireless Systems.
ISSADS 2005: 388-396 |
58 | | Eduardo B. Fernández,
Tami Sorgente,
María M. Larrondo-Petrie:
A UML-Based Methodology for Secure Systems: The Design Stage .
WOSIS 2005: 207-216 |
2004 |
57 | | Torsten Priebe,
Eduardo B. Fernández,
Jens Ingo Mehlau,
Günther Pernul:
A Pattern System for Access Control.
DBSec 2004: 235-249 |
56 | | Eduardo B. Fernández:
Two Patterns for Web Services Security.
International Conference on Internet Computing 2004: 801-807 |
55 | | Eduardo B. Fernández:
A Methodology for Secure Software Design.
Software Engineering Research and Practice 2004: 130-136 |
54 | EE | Jan Jürjens,
Eduardo B. Fernández,
Robert B. France,
Bernhard Rumpe,
Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop).
UML Satellite Activities 2004: 76-84 |
2000 |
53 | EE | Eduardo B. Fernández,
Xiaohong Yuan:
Semantic Analysis Patterns.
ER 2000: 183-195 |
1999 |
52 | EE | Eduardo B. Fernández:
Coordination of Security Levels for Internet Architectures.
DEXA Workshop 1999: 837-841 |
51 | | Massimo Ancona,
Walter Cazzola,
Eduardo B. Fernández:
Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks.
Secure Internet Programming 1999: 35-49 |
1998 |
50 | | Eduardo B. Fernández,
Krishnakumar R. Nair:
An Abstract Authorization System for the Internet.
DEXA Workshop 1998: 310-315 |
49 | EE | Massimo Ancona,
Walter Cazzola,
Eduardo B. Fernández:
Reflective Authorization Systems.
ECOOP Workshops 1998: 281 |
48 | | Ke Huang,
Jie Wu,
Eduardo B. Fernández:
A Generalized Forward Recovery Checkpointing Scheme.
IPPS/SPDP Workshops 1998: 623-643 |
47 | | Jie Wu,
Eduardo B. Fernández,
Donglai Dai:
Optimal Fault-Secure Scheduling.
Comput. J. 41(4): 207-222 (1998) |
46 | | Jie Wu,
Eduardo B. Fernández,
Yingqui Lo:
Embedding of Binomial Treas in Hypercubes with Link Faults.
J. Parallel Distrib. Comput. 54(1): 49-74 (1998) |
1997 |
45 | EE | Jie Wu,
Eduardo B. Fernández,
Yingquiu Luo:
Embedding of binomial trees in hypercubes with link faults.
ICPP 1997: 96-99 |
1996 |
44 | | Eduardo B. Fernández,
Krishnakumar R. Nair,
María M. Larrondo-Petrie,
Yan Xu:
High-Level Security Issues in Multimedia/Hypertext Systems.
Communications and Multimedia Security 1996: 13-24 |
43 | | W. Jie,
Eduardo B. Fernández,
Z. Manxia:
Design and Modeling of Hybrid Fault-Tolerant Software With Cost Constraints.
Journal of Systems and Software 35(2): 141-149 (1996) |
1995 |
42 | | Eduardo B. Fernández,
Robert B. France,
D. Wei:
A Formal Specification of an Authorization Model for Object-Oriented Databases.
DBSec 1995: 95-110 |
41 | EE | Haifeng Qian,
Eduardo B. Fernández,
Jie Wu:
A combined functional and object-oriented approach to software design.
ICECCS 1995: 167-174 |
40 | EE | Eduardo B. Fernández,
Robert B. France:
Formal specification of real-time dependable systems.
ICECCS 1995: 342-348 |
1994 |
39 | | Eduardo B. Fernández,
Jie Wu,
Minjie H. Fernandez:
User Group Structures in Object-Oriented Database Authorization.
DBSec 1994: 57-76 |
38 | EE | Eduardo B. Fernández,
Ehud Gudes,
Haiyan Song:
A Model for Evaluation and Administration of Security in Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng. 6(2): 275-292 (1994) |
37 | EE | Jie Wu,
Eduardo B. Fernández:
Using Petri Nets for the Design of Conversation Boundaries in Fault-Tolerant Software.
IEEE Trans. Parallel Distrib. Syst. 5(10): 1106-1112 (1994) |
36 | EE | Jie Wu,
Y. Wang,
Eduardo B. Fernández:
A uniform approach to software and hardware fault tolerance.
Journal of Systems and Software 26(2): 117-127 (1994) |
1993 |
35 | | Eduardo B. Fernández,
María M. Larrondo-Petrie,
Ehud Gudes:
A Method-Based Authorization Model for Object-Oriented Databases.
Security for Object-Oriented Systems 1993: 135-150 |
34 | EE | Nurith Gal-Oz,
Ehud Gudes,
Eduardo B. Fernández:
A Model of Methods Access Authorization in Object-oriented Databases.
VLDB 1993: 52-61 |
1992 |
33 | | Jie Wu,
Eduardo B. Fernández:
Broadcasting in Faulty Cube-Connected-Cycles with Minimum Recovery Time.
CONPAR 1992: 833-834 |
32 | | Jie Wu,
Eduardo B. Fernández:
Reliable Broadcasting in Faulty Hypercube Computers.
SRDS 1992: 122-129 |
31 | EE | Jie Wu,
Eduardo B. Fernández,
Ruiguang Zhang:
Some extensions to the lattice model for computer security.
Computers & Security 11(4): 357-369 (1992) |
30 | EE | Khoa D. Huynh,
Eduardo B. Fernández,
Taghi M. Khoshgoftaar:
A workload model for frame-based real-time applications on distributed systems.
Journal of Systems and Software 18(3): 255-271 (1992) |
1990 |
29 | | Ehud Gudes,
Haiyan Song,
Eduardo B. Fernández:
Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases.
DBSec 1990: 85-98 |
28 | | Jie Wu,
Eduardo B. Fernández:
The Extended G-Network, a Fault-Tolerant Interconnection Network for the Multiprocessors.
PARBASE / Architectures 1990: 250-259 |
27 | | Massimo Ancona,
Gabriella Dodero,
Vittoria Gianuzzi,
Andrea Clematis,
Eduardo B. Fernández:
A System Architecture for Fault Tolerance in Concurrent Software.
IEEE Computer 23(10): 23-32 (1990) |
26 | EE | Teresa F. Lunt,
Eduardo B. Fernández:
Database Security.
IEEE Data Eng. Bull. 13(4): 43-50 (1990) |
25 | EE | Teresa F. Lunt,
Eduardo B. Fernández:
Database Security.
SIGMOD Record 19(4): 90-97 (1990) |
1989 |
24 | | María M. Larrondo-Petrie,
Ehud Gudes,
Haiyan Song,
Eduardo B. Fernández:
Security Policies in Object-Oriented Databases.
DBSec 1989: 257-268 |
23 | | Eduardo B. Fernández,
Ehud Gudes,
Haiyan Song:
A Security Model for Object-Oriented Databases.
IEEE Symposium on Security and Privacy 1989: 110-115 |
22 | EE | Jie Wu,
Eduardo B. Fernández:
A Simplification of a Conversation Design Scheme Using Petri Nets.
IEEE Trans. Software Eng. 15(5): 658-660 (1989) |
1987 |
21 | | Massimo Ancona,
Andrea Clematis,
Gabriella Dodero,
Eduardo B. Fernández,
Vittoria Gianuzzi:
A System Architecture for Software Fault Tolerance.
Fehlertolerierende Rechensysteme 1987: 273-283 |
1983 |
20 | | Christopher Wood,
Eduardo B. Fernández,
Tomás Lang:
Minimization of Demand Paging for the LRU Stack Model of Program Behavior.
Inf. Process. Lett. 16(2): 99-104 (1983) |
1980 |
19 | | Eduardo B. Fernández:
Surveyor's Forum: Related Information.
ACM Comput. Surv. 12(1): 111-112 (1980) |
18 | | Christopher Wood,
Eduardo B. Fernández,
Rita C. Summers:
Data Base Security: Requirements, Policies, and Models.
IBM Systems Journal 19(2): 229-252 (1980) |
1979 |
17 | EE | Christopher Wood,
Eduardo B. Fernández:
Decentralized Authorization in a Database System.
VLDB 1979: 352-359 |
16 | | Christopher Wood,
Rita C. Summers,
Eduardo B. Fernández:
Authorization in multilevel database models.
Inf. Syst. 4(2): 155-161 (1979) |
1978 |
15 | EE | L. Lichten,
Eduardo B. Fernández:
Interaction with databases through procedural languages.
ACM Annual Conference (2) 1978: 937-945 |
14 | | Eduardo B. Fernández,
Tomás Lang,
Christopher Wood:
Effect of Replacement Algorithms on a Paged Buffer Database System.
IBM J. Res. Dev. 22(2): 185-196 (1978) |
13 | | Eduardo B. Fernández,
Rita C. Summers,
Tomás Lang,
Charles D. Coleman:
Architectural Support for System Protection and Database Security.
IEEE Trans. Computers 27(8): 767-771 (1978) |
1977 |
12 | EE | T. Lang,
E. Nahouraii,
K. Kasuga,
Eduardo B. Fernández:
An Architectural Extension for a Large Database System Incorporating a Processor for Disk Search.
VLDB 1977: 204-210 |
11 | EE | Tomás Lang,
Christopher Wood,
Eduardo B. Fernández:
Database Buffer Paging in Virtual Storage Systems.
ACM Trans. Database Syst. 2(4): 339-351 (1977) |
10 | | Tomás Lang,
Eduardo B. Fernández:
Improving the Computation of Lower Bounds for Optimal Schedules.
IBM Journal of Research and Development 21(3): 273-280 (1977) |
1976 |
9 | EE | Eduardo B. Fernández,
Rita C. Summers:
Integrity aspects of a shared data base.
AFIPS National Computer Conference 1976: 819-827 |
8 | | Eduardo B. Fernández,
Rita C. Summers,
Charles D. Coleman:
Architecture Support for System Protection.
ISCA 1976: 121 |
7 | | Eduardo B. Fernández,
Tomás Lang:
Scheduling as a Graph Transformation.
IBM Journal of Research and Development 20(6): 551-559 (1976) |
6 | | Tomás Lang,
Eduardo B. Fernández:
Scheduling of Unit-Length Independent Tasks with Execution Constraints.
Inf. Process. Lett. 4(4): 95-98 (1976) |
1975 |
5 | | Rita C. Summers,
Charles D. Coleman,
Eduardo B. Fernández:
A Programming Language Extension for Access to a Shared Data Base.
ACM Pacific 1975: 114-118 |
4 | EE | Eduardo B. Fernández,
Rita C. Summers,
Charles D. Coleman:
An Authorization Model for a Shared Data Base.
SIGMOD Conference 1975: 23-31 |
3 | EE | Eduardo B. Fernández,
Rita C. Summers,
Tomás Lang:
Definition and Evaluation of Access Rules in Data Management Systems.
VLDB 1975: 268-285 |
2 | | Eduardo B. Fernández,
Tomás Lang:
Computation of Lower Bounds for Multiprocessor Schedules.
IBM Journal of Research and Development 19(5): 435-444 (1975) |
1974 |
1 | | Bertram Bussell,
Eduardo B. Fernández,
Olivier Levy:
Optimal Scheduling for Homogeneous Multiprocessors.
IFIP Congress 1974: 286-290 |