The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Eduardo B. Fernández: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tomás Lang, Christopher Wood, Eduardo B. Fernández
    Database Buffer Paging in Virtual Storage Systems. [Citation Graph (12, 3)][DBLP]
    ACM Trans. Database Syst., 1977, v:2, n:4, pp:339-351 [Journal]
  2. Eduardo B. Fernández, Rita C. Summers, Charles D. Coleman
    An Authorization Model for a Shared Data Base. [Citation Graph (9, 3)][DBLP]
    SIGMOD Conference, 1975, pp:23-31 [Conf]
  3. Eduardo B. Fernández, Ehud Gudes, Haiyan Song
    A Model for Evaluation and Administration of Security in Object-Oriented Databases. [Citation Graph (7, 20)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1994, v:6, n:2, pp:275-292 [Journal]
  4. Rita C. Summers, Charles D. Coleman, Eduardo B. Fernández
    A Programming Language Extension for Access to a Shared Data Base. [Citation Graph (6, 0)][DBLP]
    ACM Pacific, 1975, pp:114-118 [Conf]
  5. Eduardo B. Fernández, Tomás Lang, Christopher Wood
    Effect of Replacement Algorithms on a Paged Buffer Database System. [Citation Graph (6, 0)][DBLP]
    IBM J. Res. Dev., 1978, v:22, n:2, pp:185-196 [Journal]
  6. Eduardo B. Fernández, Rita C. Summers, Tomás Lang
    Definition and Evaluation of Access Rules in Data Management Systems. [Citation Graph (5, 2)][DBLP]
    VLDB, 1975, pp:268-285 [Conf]
  7. Ehud Gudes, Haiyan Song, Eduardo B. Fernández
    Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP]
    DBSec, 1990, pp:85-98 [Conf]
  8. María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández
    Security Policies in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP]
    DBSec, 1989, pp:257-268 [Conf]
  9. Eduardo B. Fernández, Jie Wu, Minjie H. Fernandez
    User Group Structures in Object-Oriented Database Authorization. [Citation Graph (2, 0)][DBLP]
    DBSec, 1994, pp:57-76 [Conf]
  10. Nurith Gal-Oz, Ehud Gudes, Eduardo B. Fernández
    A Model of Methods Access Authorization in Object-oriented Databases. [Citation Graph (2, 9)][DBLP]
    VLDB, 1993, pp:52-61 [Conf]
  11. Christopher Wood, Eduardo B. Fernández
    Decentralized Authorization in a Database System. [Citation Graph (2, 8)][DBLP]
    VLDB, 1979, pp:352-359 [Conf]
  12. Teresa F. Lunt, Eduardo B. Fernández
    Database Security. [Citation Graph (2, 0)][DBLP]
    SIGMOD Record, 1990, v:19, n:4, pp:90-97 [Journal]
  13. Eduardo B. Fernández, Ehud Gudes, Haiyan Song
    A Security Model for Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:110-115 [Conf]
  14. Teresa F. Lunt, Eduardo B. Fernández
    Database Security. [Citation Graph (1, 0)][DBLP]
    IEEE Data Eng. Bull., 1990, v:13, n:4, pp:43-50 [Journal]
  15. Christopher Wood, Rita C. Summers, Eduardo B. Fernández
    Authorization in multilevel database models. [Citation Graph (1, 0)][DBLP]
    Inf. Syst., 1979, v:4, n:2, pp:155-161 [Journal]
  16. Eduardo B. Fernández
    Security patterns and secure systems design. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2007, pp:510- [Conf]
  17. Eduardo B. Fernández, Xiaohong Yuan
    Securing analysis patterns. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2007, pp:288-293 [Conf]
  18. L. Lichten, Eduardo B. Fernández
    Interaction with databases through procedural languages. [Citation Graph (0, 0)][DBLP]
    ACM Annual Conference (2), 1978, pp:937-945 [Conf]
  19. Eduardo B. Fernández, Nelly A. Delessy
    Using Patterns to Understand and Compare Web Services Security Products and Standards. [Citation Graph (0, 0)][DBLP]
    AICT/ICIW, 2006, pp:157- [Conf]
  20. Eduardo B. Fernández, Krishnakumar R. Nair, María M. Larrondo-Petrie, Yan Xu
    High-Level Security Issues in Multimedia/Hypertext Systems. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:13-24 [Conf]
  21. Jie Wu, Eduardo B. Fernández
    Broadcasting in Faulty Cube-Connected-Cycles with Minimum Recovery Time. [Citation Graph (0, 0)][DBLP]
    CONPAR, 1992, pp:833-834 [Conf]
  22. Eduardo B. Fernández, Robert B. France, D. Wei
    A Formal Specification of an Authorization Model for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:95-110 [Conf]
  23. Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul
    A Pattern System for Access Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:235-249 [Conf]
  24. Eduardo B. Fernández
    Coordination of Security Levels for Internet Architectures. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:837-841 [Conf]
  25. Eduardo B. Fernández, Krishnakumar R. Nair
    An Abstract Authorization System for the Internet. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:310-315 [Conf]
  26. Massimo Ancona, Walter Cazzola, Eduardo B. Fernández
    Reflective Authorization Systems. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:281- [Conf]
  27. Massimo Ancona, Walter Cazzola, Eduardo B. Fernández
    Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:35-49 [Conf]
  28. Eduardo B. Fernández, Xiaohong Yuan
    Semantic Analysis Patterns. [Citation Graph (0, 0)][DBLP]
    ER, 2000, pp:183-195 [Conf]
  29. Eduardo B. Fernández
    Two Patterns for Web Services Security. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2004, pp:801-807 [Conf]
  30. Eduardo B. Fernández, Robert B. France
    Formal specification of real-time dependable systems. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1995, pp:342-348 [Conf]
  31. Haifeng Qian, Eduardo B. Fernández, Jie Wu
    A combined functional and object-oriented approach to software design. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1995, pp:167-174 [Conf]
  32. Eduardo B. Fernández
    Security Patterns and Secure Systems Design Using UML. [Citation Graph (0, 0)][DBLP]
    ICEIS (1), 2005, pp:21- [Conf]
  33. Massimo Ancona, Andrea Clematis, Gabriella Dodero, Eduardo B. Fernández, Vittoria Gianuzzi
    A System Architecture for Software Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    Fehlertolerierende Rechensysteme, 1987, pp:273-283 [Conf]
  34. Jie Wu, Eduardo B. Fernández, Yingquiu Luo
    Embedding of binomial trees in hypercubes with link faults. [Citation Graph (0, 0)][DBLP]
    ICPP, 1997, pp:96-99 [Conf]
  35. Bertram Bussell, Eduardo B. Fernández, Olivier Levy
    Optimal Scheduling for Homogeneous Multiprocessors. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1974, pp:286-290 [Conf]
  36. Eduardo B. Fernández, Michael VanHilst, María M. Larrondo-Petrie, Shihong Huang
    Defining Security Requirements Through Misuse Actions. [Citation Graph (0, 0)][DBLP]
    IFIP Workshop on Advanced Software Engineering, 2006, pp:123-137 [Conf]
  37. Ke Huang, Jie Wu, Eduardo B. Fernández
    A Generalized Forward Recovery Checkpointing Scheme. [Citation Graph (0, 0)][DBLP]
    IPPS/SPDP Workshops, 1998, pp:623-643 [Conf]
  38. Bing Wu, Jie Wu, Eduardo B. Fernández, Spyros S. Magliveras
    Secure and Efficient Key Management in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  39. Eduardo B. Fernández, Rita C. Summers, Charles D. Coleman
    Architecture Support for System Protection. [Citation Graph (0, 0)][DBLP]
    ISCA, 1976, pp:121- [Conf]
  40. Eduardo B. Fernández, Saeed Rajput, Michael VanHilst, María M. Larrondo-Petrie
    Some Security Issues of Wireless Systems. [Citation Graph (0, 0)][DBLP]
    ISSADS, 2005, pp:388-396 [Conf]
  41. Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes
    A Method-Based Authorization Model for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:135-150 [Conf]
  42. Jie Wu, Eduardo B. Fernández
    The Extended G-Network, a Fault-Tolerant Interconnection Network for the Multiprocessors. [Citation Graph (0, 0)][DBLP]
    PARBASE / Architectures, 1990, pp:250-259 [Conf]
  43. Eduardo Fernández, Tami Sorgente
    An analysis of modeling flaws in HL7 and JAHIS. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:216-223 [Conf]
  44. Eduardo B. Fernández
    A Methodology for Secure Software Design. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2004, pp:130-136 [Conf]
  45. Eduardo B. Fernández, Tami Sorgente, María M. Larrondo-Petrie
    A UML-Based Methodology for Secure Systems: The Design Stage . [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:207-216 [Conf]
  46. Jie Wu, Eduardo B. Fernández
    Reliable Broadcasting in Faulty Hypercube Computers. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1992, pp:122-129 [Conf]
  47. Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer
    Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). [Citation Graph (0, 0)][DBLP]
    UML Satellite Activities, 2004, pp:76-84 [Conf]
  48. T. Lang, E. Nahouraii, K. Kasuga, Eduardo B. Fernández
    An Architectural Extension for a Large Database System Incorporating a Processor for Disk Search. [Citation Graph (0, 0)][DBLP]
    VLDB, 1977, pp:204-210 [Conf]
  49. Jie Wu, Eduardo B. Fernández, Donglai Dai
    Optimal Fault-Secure Scheduling. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1998, v:41, n:4, pp:207-222 [Journal]
  50. Jie Wu, Eduardo B. Fernández, Ruiguang Zhang
    Some extensions to the lattice model for computer security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:4, pp:357-369 [Journal]
  51. Massimo Ancona, Gabriella Dodero, Vittoria Gianuzzi, Andrea Clematis, Eduardo B. Fernández
    A System Architecture for Fault Tolerance in Concurrent Software. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1990, v:23, n:10, pp:23-32 [Journal]
  52. Eduardo B. Fernández
    Surveyor's Forum: Related Information. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1980, v:12, n:1, pp:111-112 [Journal]
  53. Eduardo B. Fernández, Tomás Lang
    Computation of Lower Bounds for Multiprocessor Schedules. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 1975, v:19, n:5, pp:435-444 [Journal]
  54. Eduardo B. Fernández, Tomás Lang
    Scheduling as a Graph Transformation. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 1976, v:20, n:6, pp:551-559 [Journal]
  55. Tomás Lang, Eduardo B. Fernández
    Improving the Computation of Lower Bounds for Optimal Schedules. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 1977, v:21, n:3, pp:273-280 [Journal]
  56. Christopher Wood, Eduardo B. Fernández, Rita C. Summers
    Data Base Security: Requirements, Policies, and Models. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1980, v:19, n:2, pp:229-252 [Journal]
  57. Tomás Lang, Eduardo B. Fernández
    Scheduling of Unit-Length Independent Tasks with Execution Constraints. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1976, v:4, n:4, pp:95-98 [Journal]
  58. Christopher Wood, Eduardo B. Fernández, Tomás Lang
    Minimization of Demand Paging for the LRU Stack Model of Program Behavior. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1983, v:16, n:2, pp:99-104 [Journal]
  59. Jie Wu, Eduardo B. Fernández, Yingqui Lo
    Embedding of Binomial Treas in Hypercubes with Link Faults. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1998, v:54, n:1, pp:49-74 [Journal]
  60. W. Jie, Eduardo B. Fernández, Z. Manxia
    Design and Modeling of Hybrid Fault-Tolerant Software With Cost Constraints. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1996, v:35, n:2, pp:141-149 [Journal]
  61. Jie Wu, Y. Wang, Eduardo B. Fernández
    A uniform approach to software and hardware fault tolerance. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1994, v:26, n:2, pp:117-127 [Journal]
  62. Eduardo B. Fernández, Rita C. Summers, Tomás Lang, Charles D. Coleman
    Architectural Support for System Protection and Database Security. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1978, v:27, n:8, pp:767-771 [Journal]
  63. Jie Wu, Eduardo B. Fernández
    Using Petri Nets for the Design of Conversation Boundaries in Fault-Tolerant Software. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1994, v:5, n:10, pp:1106-1112 [Journal]
  64. Jie Wu, Eduardo B. Fernández
    A Simplification of a Conversation Design Scheme Using Petri Nets. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1989, v:15, n:5, pp:658-660 [Journal]
  65. Nelly A. Delessy, Eduardo B. Fernández
    Adapting Web Services Security Standards for Mobile and Wireless Environments. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:624-633 [Conf]
  66. Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie
    Security Patterns for Physical Access Control Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:259-274 [Conf]
  67. Eduardo B. Fernandez, Preethi Cholmondeley, Olaf Zimmermann
    Extending a Secure System Development Methodology to SOA. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:749-754 [Conf]
  68. Eduardo B. Fernandez
    Security Patterns and Secure Systems Design. [Citation Graph (0, 0)][DBLP]
    LADC, 2007, pp:233-234 [Conf]
  69. Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger
    Panel Discussion: Managing Digital Identities - Challenges and Opportunities. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:2- [Conf]
  70. Bing Wu, Jie Wu, Eduardo B. Fernández, Mohammad Ilyas, Spyros S. Magliveras
    Secure and efficient key management in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:937-954 [Journal]

  71. A Pattern-Driven Security Process for SOA Applications. [Citation Graph (, )][DBLP]


  72. Modeling Misuse Patterns. [Citation Graph (, )][DBLP]


  73. Patterns to Support the Development of Privacy Policies. [Citation Graph (, )][DBLP]


  74. Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. [Citation Graph (, )][DBLP]


  75. Measuring the Level of Security Introduced by Security Patterns. [Citation Graph (, )][DBLP]


  76. Integrity aspects of a shared data base. [Citation Graph (, )][DBLP]


  77. Classifying Security Patterns. [Citation Graph (, )][DBLP]


  78. Incorporating Database Systems into a Secure Software Development Methodology. [Citation Graph (, )][DBLP]


  79. Eliciting Security Requirements through Misuse Activities. [Citation Graph (, )][DBLP]


  80. Improving the Classification of Security Patterns. [Citation Graph (, )][DBLP]


  81. Designing Secure SCADA Systems Using Security Patterns. [Citation Graph (, )][DBLP]


  82. Attack Patterns: A New Forensic and Design Tool. [Citation Graph (, )][DBLP]


  83. Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). [Citation Graph (, )][DBLP]


  84. A pattern-driven security process for SOA applications. [Citation Graph (, )][DBLP]


  85. A Multi-Dimensional Classification for Users of Security Patterns. [Citation Graph (, )][DBLP]


  86. Patterns and Pattern Diagrams for Access Control. [Citation Graph (, )][DBLP]


  87. The Secure Three-Tier Architecture Pattern. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.460secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002