The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Eduardo Fernández-Medina: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:654-661 [Conf]
  2. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Security Requirement with a UML 2.0 Profile. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:670-677 [Conf]
  3. David G. Rosado, Eduardo Fernández-Medina, Mario Piattini, Carlos Gutiérrez
    A Study of Security Architectural Patterns. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:358-365 [Conf]
  4. Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini
    Practical Approach of a Secure Management System based on ISO/IEC 17799. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:585-592 [Conf]
  5. Emilio Soler, Rodolfo Villarroel, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini
    Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:914-921 [Conf]
  6. Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo
    Representing levels of abstraction to facilitate the Secure Multidimensional Modeling. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:678-684 [Conf]
  7. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
    Quality of Password Management Policy. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:544-550 [Conf]
  8. Eduardo Fernández-Medina, Mario Piattini
    A Methodology for Multilevel Database Design. [Citation Graph (0, 0)][DBLP]
    CAiSE Short Paper Proceedings, 2003, pp:- [Conf]
  9. Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini
    A Comparison of Secure Information Systems Design Methodologies. [Citation Graph (0, 0)][DBLP]
    CAiSE Workshops (1), 2004, pp:189-198 [Conf]
  10. Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini
    General Considerations on Data Warehouse Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:242-248 [Conf]
  11. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
    Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:109-117 [Conf]
  12. Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati
    Access Control of SVG Documents. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:219-230 [Conf]
  13. Eduardo Fernández-Medina, Mario Piattini
    Designing Secure Databases for OLS. [Citation Graph (0, 0)][DBLP]
    DEXA, 2003, pp:886-895 [Conf]
  14. Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini
    Incorporating Security Issues in the Information Systems Design. [Citation Graph (0, 0)][DBLP]
    ENC, 2004, pp:345-352 [Conf]
  15. Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini
    Extending UML for Designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP]
    ER, 2004, pp:217-230 [Conf]
  16. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile. [Citation Graph (0, 0)][DBLP]
    ER (Workshops), 2006, pp:32-42 [Conf]
  17. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    Applying a Security Requirements Engineering Process. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:192-206 [Conf]
  18. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    A Survey of Web Services Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:968-977 [Conf]
  19. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1044-1053 [Conf]
  20. Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
    Using UML Packages for Designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1024-1034 [Conf]
  21. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
    Metrics of Password Management Policy. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1013-1023 [Conf]
  22. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    PWSSec: Process for Web Services Security. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:213-222 [Conf]
  23. Carlos Gutiérrez García, Eduardo Fernández-Medina, Mario Piattini
    PWSSEC: Proceso de Desarrollo para Seguridad de Servicios. [Citation Graph (0, 0)][DBLP]
    JISBD, 2005, pp:203-210 [Conf]
  24. Eduardo Fernández-Medina, G. Ruiz, Sabrina De Capitani di Vimercati
    Implementing an Access Control System for SVG Documents. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:741-753 [Conf]
  25. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Security Risk Analysis in Web Services Systems. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:425-430 [Conf]
  26. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    Secure Information Systems Development - Based on a Security Requirements Engineering Process. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:467-470 [Conf]
  27. David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Defining Viewpoints for Security Architectural Patterns. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:419-424 [Conf]
  28. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:135-145 [Conf]
  29. Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini
    A Model Driven Approach for Secure XML Database Development. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:33-46 [Conf]
  30. Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
    Towards a UML 2.0/OCL extension for designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:217-228 [Conf]
  31. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
    Towards a Classification of Security Metrics. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:342-350 [Conf]
  32. David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Security Patterns Related to Security Requirements. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:163-173 [Conf]
  33. Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini
    Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:256-266 [Conf]
  34. Eduardo Fernández-Medina, Mario Piattini
    UML for the Design of Secure Databases. [Citation Graph (0, 0)][DBLP]
    SIS, 2002, pp:25-38 [Conf]
  35. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Web Services Security: is the problem solved? [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:293-304 [Conf]
  36. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Towards a Process for Web Services Security. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:298-308 [Conf]
  37. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Towards an integration of Security Requirements into Business Process Modeling. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:287-297 [Conf]
  38. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:174-184 [Conf]
  39. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:51-61 [Conf]
  40. Eduardo Fernández-Medina, Mario Piattini
    Extending OCL for Secure Database Development. [Citation Graph (0, 0)][DBLP]
    UML, 2004, pp:380-394 [Conf]
  41. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Towards a Process for Web Services Security. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal]
  42. Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo
    A UML 2.0/OCL Extension for Designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal]
  43. Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini
    Secure information systems development - a survey and comparison. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:4, pp:308-321 [Journal]
  44. Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini
    Access control and audit model for the multidimensional modeling of data warehouses. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2006, v:42, n:3, pp:1270-1289 [Journal]
  45. Eduardo Fernández-Medina, Mario Piattini
    Designing secure databases. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2005, v:47, n:7, pp:463-477 [Journal]
  46. Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini
    Developing secure data warehouses with a UML extension. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2007, v:32, n:6, pp:826-856 [Journal]
  47. Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini
    Model driven development of secure XML databases. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2006, v:35, n:3, pp:22-27 [Journal]
  48. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases. [Citation Graph (0, 0)][DBLP]
    BPM, 2007, pp:408-415 [Conf]
  49. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification. [Citation Graph (0, 0)][DBLP]
    ER Workshops, 2007, pp:106-115 [Conf]
  50. David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Defining Security Architectural Patterns Based on Viewpoints. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:262-272 [Conf]
  51. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    Aplicación práctica de un proceso de ingeniería de requisitos de seguridad. [Citation Graph (0, 0)][DBLP]
    JISBD, 2006, pp:315-324 [Conf]
  52. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio. [Citation Graph (0, 0)][DBLP]
    JISBD, 2006, pp:347-356 [Conf]
  53. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Analysis-Level Classes from Secure Business Processes Through Model Transformations. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:104-114 [Conf]

  54. Application of QVT for the Development of Secure Data Warehouses: A case study. [Citation Graph (, )][DBLP]


  55. A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses. [Citation Graph (, )][DBLP]


  56. A Framework for the Development of Secure Data Warehouses based on MDA and QVT. [Citation Graph (, )][DBLP]


  57. Security Requirements Variability for Software Product Lines. [Citation Graph (, )][DBLP]


  58. Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. [Citation Graph (, )][DBLP]


  59. A Systematic Review and Comparison of Security Ontologies. [Citation Graph (, )][DBLP]


  60. Implementing Multidimensional Security into OLAP Tools. [Citation Graph (, )][DBLP]


  61. PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. [Citation Graph (, )][DBLP]


  62. Including Security Rules Support in an MDA Approach for Secure DWs. [Citation Graph (, )][DBLP]


  63. Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. [Citation Graph (, )][DBLP]


  64. Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. [Citation Graph (, )][DBLP]


  65. Managing the Asset Risk of SMEs. [Citation Graph (, )][DBLP]


  66. Towards a Modernization Process for Secure Data Warehouses. [Citation Graph (, )][DBLP]


  67. Model driven development of secure XML data warehouses: a case study. [Citation Graph (, )][DBLP]


  68. Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models. [Citation Graph (, )][DBLP]


  69. Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application. [Citation Graph (, )][DBLP]


  70. Scmm-Tool - Tool for Computer Automation of the Information Security Management Systems. [Citation Graph (, )][DBLP]


  71. Data Quality in XML Databases - A Methodology for Semi-Structured Database Design Supporting Data Quality Issues. [Citation Graph (, )][DBLP]


  72. Engineering Process Based on Grid Use Cases for Mobile Grid Systems. [Citation Graph (, )][DBLP]


  73. CIM to PIM Transformation: A Reality. [Citation Graph (, )][DBLP]


  74. Towards security requirements management for software product lines: a security domain requirements engineering process. [Citation Graph (, )][DBLP]


  75. Reingeniería sobre Almacenes de Datos Seguros aplicando ADM. [Citation Graph (, )][DBLP]


  76. Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros. [Citation Graph (, )][DBLP]


  77. Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach. [Citation Graph (, )][DBLP]


  78. Towards the Secure Modelling of OLAP Users' Behaviour. [Citation Graph (, )][DBLP]


  79. Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas. [Citation Graph (, )][DBLP]


  80. Security Requirements in Software Product Lines. [Citation Graph (, )][DBLP]


  81. Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises. [Citation Graph (, )][DBLP]


  82. SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines. [Citation Graph (, )][DBLP]


  83. SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level. [Citation Graph (, )][DBLP]


  84. Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT. [Citation Graph (, )][DBLP]


  85. Building ISMS through the Reuse of Knowledge. [Citation Graph (, )][DBLP]


  86. Security Requirements Engineering Process for Software Product Lines: A Case Study. [Citation Graph (, )][DBLP]


  87. A comparison of software design security metrics. [Citation Graph (, )][DBLP]


  88. Web services enterprise security architecture: a case study. [Citation Graph (, )][DBLP]


  89. Un Conjunto de Transformaciones QVT para el Modelado de Almacenes de Datos Seguros. [Citation Graph (, )][DBLP]


  90. Modelado de Requisitos de Seguridad para Almacenes de Datos. [Citation Graph (, )][DBLP]


  91. Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros. [Citation Graph (, )][DBLP]


  92. Aplicando un Proceso de Ingeniería de Requisitos de Seguridad de Dominio para Líneas de Producto Software. [Citation Graph (, )][DBLP]


Search in 0.019secs, Finished in 0.622secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002