2008 | ||
---|---|---|
82 | EE | Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Atsuto Kubo, Yoshiaki Fukazawa: Classifying Security Patterns. APWeb 2008: 342-347 |
81 | EE | Nelly A. Delessy, Eduardo B. Fernández: A Pattern-Driven Security Process for SOA Applications. ARES 2008: 416-421 |
80 | Samuel F. Romero, Christian A. Morillas, Francisco J. Pelayo, Eduardo B. Fernández: Computer-Controlled Neurostimulation for a Visual Implant. BIODEVICES (1) 2008: 84-91 | |
79 | EE | Eduardo B. Fernández, Mihai Fonoage, Michael VanHilst, Mirela Marta: The Secure Three-Tier Architecture Pattern. CISIS 2008: 555-560 |
78 | EE | Eduardo B. Fernández, Jan Jürjens, Nobukazu Yoshioka, Hironori Washizaki: Incorporating Database Systems into a Secure Software Development Methodology. DEXA Workshops 2008: 310-314 |
77 | EE | Fabrício A. Braz, Eduardo B. Fernández, Michael VanHilst: Eliciting Security Requirements through Misuse Activities. DEXA Workshops 2008: 328-333 |
76 | EE | Nelly A. Delessy, Eduardo B. Fernández: A pattern-driven security process for SOA applications. SAC 2008: 2226-2227 |
75 | EE | Eduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie: Patterns and Pattern Diagrams for Access Control. TrustBus 2008: 38-47 |
74 | Michael VanHilst, Eduardo B. Fernández, Fabrício A. Braz: A Multi-Dimensional Classification for Users of Security Patterns. WOSIS 2008: 89-98 | |
2007 | ||
73 | EE | Eduardo B. Fernández, Xiaohong Yuan: Securing analysis patterns. ACM Southeast Regional Conference 2007: 288-293 |
72 | EE | Eduardo B. Fernández: Security patterns and secure systems design. ACM Southeast Regional Conference 2007: 510 |
71 | EE | Nelly A. Delessy, Eduardo B. Fernández: Adapting Web Services Security Standards for Mobile and Wireless Environments. APWeb/WAIM Workshops 2007: 624-633 |
70 | EE | Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie: Security Patterns for Physical Access Control Systems. DBSec 2007: 259-274 |
69 | EE | Eduardo B. Fernández, Preethi Cholmondeley, Olaf Zimmermann: Extending a Secure System Development Methodology to SOA. DEXA Workshops 2007: 749-754 |
68 | EE | Eduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie: Attack Patterns: A New Forensic and Design Tool. IFIP Int. Conf. Digital Forensics 2007: 345-357 |
67 | EE | Eduardo B. Fernández: Security Patterns and Secure Systems Design. LADC 2007: 233-234 |
66 | EE | Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger: Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2 |
65 | EE | Bing Wu, Jie Wu, Eduardo B. Fernández, Mohammad Ilyas, Spyros S. Magliveras: Secure and efficient key management in mobile ad hoc networks. J. Network and Computer Applications 30(3): 937-954 (2007) |
64 | EE | Eduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie: Security Patterns for Voice over IP Networks. JSW 2(2): 19-29 (2007) |
2006 | ||
63 | EE | Eduardo B. Fernández, Nelly A. Delessy: Using Patterns to Understand and Compare Web Services Security Products and Standards. AICT/ICIW 2006: 157 |
62 | EE | Eduardo B. Fernández, Michael VanHilst, María M. Larrondo-Petrie, Shihong Huang: Defining Security Requirements Through Misuse Actions. IFIP Workshop on Advanced Software Engineering 2006: 123-137 |
2005 | ||
61 | Eduardo B. Fernández: Security Patterns and Secure Systems Design Using UML. ICEIS (1) 2005: 21 | |
60 | EE | Bing Wu, Jie Wu, Eduardo B. Fernández, Spyros S. Magliveras: Secure and Efficient Key Management in Mobile Ad Hoc Networks. IPDPS 2005 |
59 | EE | Eduardo B. Fernández, Saeed Rajput, Michael VanHilst, María M. Larrondo-Petrie: Some Security Issues of Wireless Systems. ISSADS 2005: 388-396 |
58 | Eduardo B. Fernández, Tami Sorgente, María M. Larrondo-Petrie: A UML-Based Methodology for Secure Systems: The Design Stage . WOSIS 2005: 207-216 | |
2004 | ||
57 | Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul: A Pattern System for Access Control. DBSec 2004: 235-249 | |
56 | Eduardo B. Fernández: Two Patterns for Web Services Security. International Conference on Internet Computing 2004: 801-807 | |
55 | Eduardo B. Fernández: A Methodology for Secure Software Design. Software Engineering Research and Practice 2004: 130-136 | |
54 | EE | Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer: Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). UML Satellite Activities 2004: 76-84 |
2000 | ||
53 | EE | Eduardo B. Fernández, Xiaohong Yuan: Semantic Analysis Patterns. ER 2000: 183-195 |
1999 | ||
52 | EE | Eduardo B. Fernández: Coordination of Security Levels for Internet Architectures. DEXA Workshop 1999: 837-841 |
51 | Massimo Ancona, Walter Cazzola, Eduardo B. Fernández: Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks. Secure Internet Programming 1999: 35-49 | |
1998 | ||
50 | Eduardo B. Fernández, Krishnakumar R. Nair: An Abstract Authorization System for the Internet. DEXA Workshop 1998: 310-315 | |
49 | EE | Massimo Ancona, Walter Cazzola, Eduardo B. Fernández: Reflective Authorization Systems. ECOOP Workshops 1998: 281 |
48 | Ke Huang, Jie Wu, Eduardo B. Fernández: A Generalized Forward Recovery Checkpointing Scheme. IPPS/SPDP Workshops 1998: 623-643 | |
47 | Jie Wu, Eduardo B. Fernández, Donglai Dai: Optimal Fault-Secure Scheduling. Comput. J. 41(4): 207-222 (1998) | |
46 | Jie Wu, Eduardo B. Fernández, Yingqui Lo: Embedding of Binomial Treas in Hypercubes with Link Faults. J. Parallel Distrib. Comput. 54(1): 49-74 (1998) | |
1997 | ||
45 | EE | Jie Wu, Eduardo B. Fernández, Yingquiu Luo: Embedding of binomial trees in hypercubes with link faults. ICPP 1997: 96-99 |
1996 | ||
44 | Eduardo B. Fernández, Krishnakumar R. Nair, María M. Larrondo-Petrie, Yan Xu: High-Level Security Issues in Multimedia/Hypertext Systems. Communications and Multimedia Security 1996: 13-24 | |
43 | W. Jie, Eduardo B. Fernández, Z. Manxia: Design and Modeling of Hybrid Fault-Tolerant Software With Cost Constraints. Journal of Systems and Software 35(2): 141-149 (1996) | |
1995 | ||
42 | Eduardo B. Fernández, Robert B. France, D. Wei: A Formal Specification of an Authorization Model for Object-Oriented Databases. DBSec 1995: 95-110 | |
41 | EE | Haifeng Qian, Eduardo B. Fernández, Jie Wu: A combined functional and object-oriented approach to software design. ICECCS 1995: 167-174 |
40 | EE | Eduardo B. Fernández, Robert B. France: Formal specification of real-time dependable systems. ICECCS 1995: 342-348 |
1994 | ||
39 | Eduardo B. Fernández, Jie Wu, Minjie H. Fernandez: User Group Structures in Object-Oriented Database Authorization. DBSec 1994: 57-76 | |
38 | EE | Eduardo B. Fernández, Ehud Gudes, Haiyan Song: A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 6(2): 275-292 (1994) |
37 | EE | Jie Wu, Eduardo B. Fernández: Using Petri Nets for the Design of Conversation Boundaries in Fault-Tolerant Software. IEEE Trans. Parallel Distrib. Syst. 5(10): 1106-1112 (1994) |
36 | EE | Jie Wu, Y. Wang, Eduardo B. Fernández: A uniform approach to software and hardware fault tolerance. Journal of Systems and Software 26(2): 117-127 (1994) |
1993 | ||
35 | Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes: A Method-Based Authorization Model for Object-Oriented Databases. Security for Object-Oriented Systems 1993: 135-150 | |
34 | EE | Nurith Gal-Oz, Ehud Gudes, Eduardo B. Fernández: A Model of Methods Access Authorization in Object-oriented Databases. VLDB 1993: 52-61 |
1992 | ||
33 | Jie Wu, Eduardo B. Fernández: Broadcasting in Faulty Cube-Connected-Cycles with Minimum Recovery Time. CONPAR 1992: 833-834 | |
32 | Jie Wu, Eduardo B. Fernández: Reliable Broadcasting in Faulty Hypercube Computers. SRDS 1992: 122-129 | |
31 | EE | Jie Wu, Eduardo B. Fernández, Ruiguang Zhang: Some extensions to the lattice model for computer security. Computers & Security 11(4): 357-369 (1992) |
30 | EE | Khoa D. Huynh, Eduardo B. Fernández, Taghi M. Khoshgoftaar: A workload model for frame-based real-time applications on distributed systems. Journal of Systems and Software 18(3): 255-271 (1992) |
1990 | ||
29 | Ehud Gudes, Haiyan Song, Eduardo B. Fernández: Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. DBSec 1990: 85-98 | |
28 | Jie Wu, Eduardo B. Fernández: The Extended G-Network, a Fault-Tolerant Interconnection Network for the Multiprocessors. PARBASE / Architectures 1990: 250-259 | |
27 | Massimo Ancona, Gabriella Dodero, Vittoria Gianuzzi, Andrea Clematis, Eduardo B. Fernández: A System Architecture for Fault Tolerance in Concurrent Software. IEEE Computer 23(10): 23-32 (1990) | |
26 | EE | Teresa F. Lunt, Eduardo B. Fernández: Database Security. IEEE Data Eng. Bull. 13(4): 43-50 (1990) |
25 | EE | Teresa F. Lunt, Eduardo B. Fernández: Database Security. SIGMOD Record 19(4): 90-97 (1990) |
1989 | ||
24 | María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández: Security Policies in Object-Oriented Databases. DBSec 1989: 257-268 | |
23 | Eduardo B. Fernández, Ehud Gudes, Haiyan Song: A Security Model for Object-Oriented Databases. IEEE Symposium on Security and Privacy 1989: 110-115 | |
22 | EE | Jie Wu, Eduardo B. Fernández: A Simplification of a Conversation Design Scheme Using Petri Nets. IEEE Trans. Software Eng. 15(5): 658-660 (1989) |
1987 | ||
21 | Massimo Ancona, Andrea Clematis, Gabriella Dodero, Eduardo B. Fernández, Vittoria Gianuzzi: A System Architecture for Software Fault Tolerance. Fehlertolerierende Rechensysteme 1987: 273-283 | |
1983 | ||
20 | Christopher Wood, Eduardo B. Fernández, Tomás Lang: Minimization of Demand Paging for the LRU Stack Model of Program Behavior. Inf. Process. Lett. 16(2): 99-104 (1983) | |
1980 | ||
19 | Eduardo B. Fernández: Surveyor's Forum: Related Information. ACM Comput. Surv. 12(1): 111-112 (1980) | |
18 | Christopher Wood, Eduardo B. Fernández, Rita C. Summers: Data Base Security: Requirements, Policies, and Models. IBM Systems Journal 19(2): 229-252 (1980) | |
1979 | ||
17 | EE | Christopher Wood, Eduardo B. Fernández: Decentralized Authorization in a Database System. VLDB 1979: 352-359 |
16 | Christopher Wood, Rita C. Summers, Eduardo B. Fernández: Authorization in multilevel database models. Inf. Syst. 4(2): 155-161 (1979) | |
1978 | ||
15 | EE | L. Lichten, Eduardo B. Fernández: Interaction with databases through procedural languages. ACM Annual Conference (2) 1978: 937-945 |
14 | Eduardo B. Fernández, Tomás Lang, Christopher Wood: Effect of Replacement Algorithms on a Paged Buffer Database System. IBM J. Res. Dev. 22(2): 185-196 (1978) | |
13 | Eduardo B. Fernández, Rita C. Summers, Tomás Lang, Charles D. Coleman: Architectural Support for System Protection and Database Security. IEEE Trans. Computers 27(8): 767-771 (1978) | |
1977 | ||
12 | EE | T. Lang, E. Nahouraii, K. Kasuga, Eduardo B. Fernández: An Architectural Extension for a Large Database System Incorporating a Processor for Disk Search. VLDB 1977: 204-210 |
11 | EE | Tomás Lang, Christopher Wood, Eduardo B. Fernández: Database Buffer Paging in Virtual Storage Systems. ACM Trans. Database Syst. 2(4): 339-351 (1977) |
10 | Tomás Lang, Eduardo B. Fernández: Improving the Computation of Lower Bounds for Optimal Schedules. IBM Journal of Research and Development 21(3): 273-280 (1977) | |
1976 | ||
9 | EE | Eduardo B. Fernández, Rita C. Summers: Integrity aspects of a shared data base. AFIPS National Computer Conference 1976: 819-827 |
8 | Eduardo B. Fernández, Rita C. Summers, Charles D. Coleman: Architecture Support for System Protection. ISCA 1976: 121 | |
7 | Eduardo B. Fernández, Tomás Lang: Scheduling as a Graph Transformation. IBM Journal of Research and Development 20(6): 551-559 (1976) | |
6 | Tomás Lang, Eduardo B. Fernández: Scheduling of Unit-Length Independent Tasks with Execution Constraints. Inf. Process. Lett. 4(4): 95-98 (1976) | |
1975 | ||
5 | Rita C. Summers, Charles D. Coleman, Eduardo B. Fernández: A Programming Language Extension for Access to a Shared Data Base. ACM Pacific 1975: 114-118 | |
4 | EE | Eduardo B. Fernández, Rita C. Summers, Charles D. Coleman: An Authorization Model for a Shared Data Base. SIGMOD Conference 1975: 23-31 |
3 | EE | Eduardo B. Fernández, Rita C. Summers, Tomás Lang: Definition and Evaluation of Access Rules in Data Management Systems. VLDB 1975: 268-285 |
2 | Eduardo B. Fernández, Tomás Lang: Computation of Lower Bounds for Multiprocessor Schedules. IBM Journal of Research and Development 19(5): 435-444 (1975) | |
1974 | ||
1 | Bertram Bussell, Eduardo B. Fernández, Olivier Levy: Optimal Scheduling for Homogeneous Multiprocessors. IFIP Congress 1974: 286-290 |