Search the dblp DataBase
Eduardo B. Fernández :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tomás Lang , Christopher Wood , Eduardo B. Fernández Database Buffer Paging in Virtual Storage Systems. [Citation Graph (12, 3)][DBLP ] ACM Trans. Database Syst., 1977, v:2, n:4, pp:339-351 [Journal ] Eduardo B. Fernández , Rita C. Summers , Charles D. Coleman An Authorization Model for a Shared Data Base. [Citation Graph (9, 3)][DBLP ] SIGMOD Conference, 1975, pp:23-31 [Conf ] Eduardo B. Fernández , Ehud Gudes , Haiyan Song A Model for Evaluation and Administration of Security in Object-Oriented Databases. [Citation Graph (7, 20)][DBLP ] IEEE Trans. Knowl. Data Eng., 1994, v:6, n:2, pp:275-292 [Journal ] Rita C. Summers , Charles D. Coleman , Eduardo B. Fernández A Programming Language Extension for Access to a Shared Data Base. [Citation Graph (6, 0)][DBLP ] ACM Pacific, 1975, pp:114-118 [Conf ] Eduardo B. Fernández , Tomás Lang , Christopher Wood Effect of Replacement Algorithms on a Paged Buffer Database System. [Citation Graph (6, 0)][DBLP ] IBM J. Res. Dev., 1978, v:22, n:2, pp:185-196 [Journal ] Eduardo B. Fernández , Rita C. Summers , Tomás Lang Definition and Evaluation of Access Rules in Data Management Systems. [Citation Graph (5, 2)][DBLP ] VLDB, 1975, pp:268-285 [Conf ] Ehud Gudes , Haiyan Song , Eduardo B. Fernández Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP ] DBSec, 1990, pp:85-98 [Conf ] María M. Larrondo-Petrie , Ehud Gudes , Haiyan Song , Eduardo B. Fernández Security Policies in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP ] DBSec, 1989, pp:257-268 [Conf ] Eduardo B. Fernández , Jie Wu , Minjie H. Fernandez User Group Structures in Object-Oriented Database Authorization. [Citation Graph (2, 0)][DBLP ] DBSec, 1994, pp:57-76 [Conf ] Nurith Gal-Oz , Ehud Gudes , Eduardo B. Fernández A Model of Methods Access Authorization in Object-oriented Databases. [Citation Graph (2, 9)][DBLP ] VLDB, 1993, pp:52-61 [Conf ] Christopher Wood , Eduardo B. Fernández Decentralized Authorization in a Database System. [Citation Graph (2, 8)][DBLP ] VLDB, 1979, pp:352-359 [Conf ] Teresa F. Lunt , Eduardo B. Fernández Database Security. [Citation Graph (2, 0)][DBLP ] SIGMOD Record, 1990, v:19, n:4, pp:90-97 [Journal ] Eduardo B. Fernández , Ehud Gudes , Haiyan Song A Security Model for Object-Oriented Databases. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:110-115 [Conf ] Teresa F. Lunt , Eduardo B. Fernández Database Security. [Citation Graph (1, 0)][DBLP ] IEEE Data Eng. Bull., 1990, v:13, n:4, pp:43-50 [Journal ] Christopher Wood , Rita C. Summers , Eduardo B. Fernández Authorization in multilevel database models. [Citation Graph (1, 0)][DBLP ] Inf. Syst., 1979, v:4, n:2, pp:155-161 [Journal ] Eduardo B. Fernández Security patterns and secure systems design. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 2007, pp:510- [Conf ] Eduardo B. Fernández , Xiaohong Yuan Securing analysis patterns. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 2007, pp:288-293 [Conf ] L. Lichten , Eduardo B. Fernández Interaction with databases through procedural languages. [Citation Graph (0, 0)][DBLP ] ACM Annual Conference (2), 1978, pp:937-945 [Conf ] Eduardo B. Fernández , Nelly A. Delessy Using Patterns to Understand and Compare Web Services Security Products and Standards. [Citation Graph (0, 0)][DBLP ] AICT/ICIW, 2006, pp:157- [Conf ] Eduardo B. Fernández , Krishnakumar R. Nair , María M. Larrondo-Petrie , Yan Xu High-Level Security Issues in Multimedia/Hypertext Systems. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:13-24 [Conf ] Jie Wu , Eduardo B. Fernández Broadcasting in Faulty Cube-Connected-Cycles with Minimum Recovery Time. [Citation Graph (0, 0)][DBLP ] CONPAR, 1992, pp:833-834 [Conf ] Eduardo B. Fernández , Robert B. France , D. Wei A Formal Specification of an Authorization Model for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:95-110 [Conf ] Torsten Priebe , Eduardo B. Fernández , Jens Ingo Mehlau , Günther Pernul A Pattern System for Access Control. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:235-249 [Conf ] Eduardo B. Fernández Coordination of Security Levels for Internet Architectures. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1999, pp:837-841 [Conf ] Eduardo B. Fernández , Krishnakumar R. Nair An Abstract Authorization System for the Internet. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1998, pp:310-315 [Conf ] Massimo Ancona , Walter Cazzola , Eduardo B. Fernández Reflective Authorization Systems. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 1998, pp:281- [Conf ] Massimo Ancona , Walter Cazzola , Eduardo B. Fernández Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:35-49 [Conf ] Eduardo B. Fernández , Xiaohong Yuan Semantic Analysis Patterns. [Citation Graph (0, 0)][DBLP ] ER, 2000, pp:183-195 [Conf ] Eduardo B. Fernández Two Patterns for Web Services Security. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2004, pp:801-807 [Conf ] Eduardo B. Fernández , Robert B. France Formal specification of real-time dependable systems. [Citation Graph (0, 0)][DBLP ] ICECCS, 1995, pp:342-348 [Conf ] Haifeng Qian , Eduardo B. Fernández , Jie Wu A combined functional and object-oriented approach to software design. [Citation Graph (0, 0)][DBLP ] ICECCS, 1995, pp:167-174 [Conf ] Eduardo B. Fernández Security Patterns and Secure Systems Design Using UML. [Citation Graph (0, 0)][DBLP ] ICEIS (1), 2005, pp:21- [Conf ] Massimo Ancona , Andrea Clematis , Gabriella Dodero , Eduardo B. Fernández , Vittoria Gianuzzi A System Architecture for Software Fault Tolerance. [Citation Graph (0, 0)][DBLP ] Fehlertolerierende Rechensysteme, 1987, pp:273-283 [Conf ] Jie Wu , Eduardo B. Fernández , Yingquiu Luo Embedding of binomial trees in hypercubes with link faults. [Citation Graph (0, 0)][DBLP ] ICPP, 1997, pp:96-99 [Conf ] Bertram Bussell , Eduardo B. Fernández , Olivier Levy Optimal Scheduling for Homogeneous Multiprocessors. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1974, pp:286-290 [Conf ] Eduardo B. Fernández , Michael VanHilst , María M. Larrondo-Petrie , Shihong Huang Defining Security Requirements Through Misuse Actions. [Citation Graph (0, 0)][DBLP ] IFIP Workshop on Advanced Software Engineering, 2006, pp:123-137 [Conf ] Ke Huang , Jie Wu , Eduardo B. Fernández A Generalized Forward Recovery Checkpointing Scheme. [Citation Graph (0, 0)][DBLP ] IPPS/SPDP Workshops, 1998, pp:623-643 [Conf ] Bing Wu , Jie Wu , Eduardo B. Fernández , Spyros S. Magliveras Secure and Efficient Key Management in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] Eduardo B. Fernández , Rita C. Summers , Charles D. Coleman Architecture Support for System Protection. [Citation Graph (0, 0)][DBLP ] ISCA, 1976, pp:121- [Conf ] Eduardo B. Fernández , Saeed Rajput , Michael VanHilst , María M. Larrondo-Petrie Some Security Issues of Wireless Systems. [Citation Graph (0, 0)][DBLP ] ISSADS, 2005, pp:388-396 [Conf ] Eduardo B. Fernández , María M. Larrondo-Petrie , Ehud Gudes A Method-Based Authorization Model for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:135-150 [Conf ] Jie Wu , Eduardo B. Fernández The Extended G-Network, a Fault-Tolerant Interconnection Network for the Multiprocessors. [Citation Graph (0, 0)][DBLP ] PARBASE / Architectures, 1990, pp:250-259 [Conf ] Eduardo Fernández , Tami Sorgente An analysis of modeling flaws in HL7 and JAHIS. [Citation Graph (0, 0)][DBLP ] SAC, 2005, pp:216-223 [Conf ] Eduardo B. Fernández A Methodology for Secure Software Design. [Citation Graph (0, 0)][DBLP ] Software Engineering Research and Practice, 2004, pp:130-136 [Conf ] Eduardo B. Fernández , Tami Sorgente , María M. Larrondo-Petrie A UML-Based Methodology for Secure Systems: The Design Stage . [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:207-216 [Conf ] Jie Wu , Eduardo B. Fernández Reliable Broadcasting in Faulty Hypercube Computers. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1992, pp:122-129 [Conf ] Jan Jürjens , Eduardo B. Fernández , Robert B. France , Bernhard Rumpe , Constance L. Heitmeyer Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). [Citation Graph (0, 0)][DBLP ] UML Satellite Activities, 2004, pp:76-84 [Conf ] T. Lang , E. Nahouraii , K. Kasuga , Eduardo B. Fernández An Architectural Extension for a Large Database System Incorporating a Processor for Disk Search. [Citation Graph (0, 0)][DBLP ] VLDB, 1977, pp:204-210 [Conf ] Jie Wu , Eduardo B. Fernández , Donglai Dai Optimal Fault-Secure Scheduling. [Citation Graph (0, 0)][DBLP ] Comput. J., 1998, v:41, n:4, pp:207-222 [Journal ] Jie Wu , Eduardo B. Fernández , Ruiguang Zhang Some extensions to the lattice model for computer security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:4, pp:357-369 [Journal ] Massimo Ancona , Gabriella Dodero , Vittoria Gianuzzi , Andrea Clematis , Eduardo B. Fernández A System Architecture for Fault Tolerance in Concurrent Software. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1990, v:23, n:10, pp:23-32 [Journal ] Eduardo B. Fernández Surveyor's Forum: Related Information. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1980, v:12, n:1, pp:111-112 [Journal ] Eduardo B. Fernández , Tomás Lang Computation of Lower Bounds for Multiprocessor Schedules. [Citation Graph (0, 0)][DBLP ] IBM Journal of Research and Development, 1975, v:19, n:5, pp:435-444 [Journal ] Eduardo B. Fernández , Tomás Lang Scheduling as a Graph Transformation. [Citation Graph (0, 0)][DBLP ] IBM Journal of Research and Development, 1976, v:20, n:6, pp:551-559 [Journal ] Tomás Lang , Eduardo B. Fernández Improving the Computation of Lower Bounds for Optimal Schedules. [Citation Graph (0, 0)][DBLP ] IBM Journal of Research and Development, 1977, v:21, n:3, pp:273-280 [Journal ] Christopher Wood , Eduardo B. Fernández , Rita C. Summers Data Base Security: Requirements, Policies, and Models. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1980, v:19, n:2, pp:229-252 [Journal ] Tomás Lang , Eduardo B. Fernández Scheduling of Unit-Length Independent Tasks with Execution Constraints. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1976, v:4, n:4, pp:95-98 [Journal ] Christopher Wood , Eduardo B. Fernández , Tomás Lang Minimization of Demand Paging for the LRU Stack Model of Program Behavior. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1983, v:16, n:2, pp:99-104 [Journal ] Jie Wu , Eduardo B. Fernández , Yingqui Lo Embedding of Binomial Treas in Hypercubes with Link Faults. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1998, v:54, n:1, pp:49-74 [Journal ] W. Jie , Eduardo B. Fernández , Z. Manxia Design and Modeling of Hybrid Fault-Tolerant Software With Cost Constraints. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1996, v:35, n:2, pp:141-149 [Journal ] Jie Wu , Y. Wang , Eduardo B. Fernández A uniform approach to software and hardware fault tolerance. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1994, v:26, n:2, pp:117-127 [Journal ] Eduardo B. Fernández , Rita C. Summers , Tomás Lang , Charles D. Coleman Architectural Support for System Protection and Database Security. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1978, v:27, n:8, pp:767-771 [Journal ] Jie Wu , Eduardo B. Fernández Using Petri Nets for the Design of Conversation Boundaries in Fault-Tolerant Software. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1994, v:5, n:10, pp:1106-1112 [Journal ] Jie Wu , Eduardo B. Fernández A Simplification of a Conversation Design Scheme Using Petri Nets. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1989, v:15, n:5, pp:658-660 [Journal ] Nelly A. Delessy , Eduardo B. Fernández Adapting Web Services Security Standards for Mobile and Wireless Environments. [Citation Graph (0, 0)][DBLP ] APWeb/WAIM Workshops, 2007, pp:624-633 [Conf ] Eduardo B. Fernández , Jose Ballesteros , Ana C. Desouza-Doucet , Maria M. Larrondo-Petrie Security Patterns for Physical Access Control Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:259-274 [Conf ] Eduardo B. Fernandez , Preethi Cholmondeley , Olaf Zimmermann Extending a Secure System Development Methodology to SOA. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2007, pp:749-754 [Conf ] Eduardo B. Fernandez Security Patterns and Secure Systems Design. [Citation Graph (0, 0)][DBLP ] LADC, 2007, pp:233-234 [Conf ] Günther Pernul , Marco Casassa Mont , Eduardo B. Fernández , Sokratis K. Katsikas , Alfred Kobsa , Rolf Oppliger Panel Discussion: Managing Digital Identities - Challenges and Opportunities. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:2- [Conf ] Bing Wu , Jie Wu , Eduardo B. Fernández , Mohammad Ilyas , Spyros S. Magliveras Secure and efficient key management in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:937-954 [Journal ] A Pattern-Driven Security Process for SOA Applications. [Citation Graph (, )][DBLP ] Modeling Misuse Patterns. [Citation Graph (, )][DBLP ] Patterns to Support the Development of Privacy Policies. [Citation Graph (, )][DBLP ] Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. [Citation Graph (, )][DBLP ] Measuring the Level of Security Introduced by Security Patterns. [Citation Graph (, )][DBLP ] Integrity aspects of a shared data base. [Citation Graph (, )][DBLP ] Classifying Security Patterns. [Citation Graph (, )][DBLP ] Incorporating Database Systems into a Secure Software Development Methodology. [Citation Graph (, )][DBLP ] Eliciting Security Requirements through Misuse Activities. [Citation Graph (, )][DBLP ] Improving the Classification of Security Patterns. [Citation Graph (, )][DBLP ] Designing Secure SCADA Systems Using Security Patterns. [Citation Graph (, )][DBLP ] Attack Patterns: A New Forensic and Design Tool. [Citation Graph (, )][DBLP ] Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). [Citation Graph (, )][DBLP ] A pattern-driven security process for SOA applications. [Citation Graph (, )][DBLP ] A Multi-Dimensional Classification for Users of Security Patterns. [Citation Graph (, )][DBLP ] Patterns and Pattern Diagrams for Access Control. [Citation Graph (, )][DBLP ] The Secure Three-Tier Architecture Pattern. [Citation Graph (, )][DBLP ] Search in 0.086secs, Finished in 0.092secs