|
Search the dblp DataBase
Eduardo Fernández-Medina:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:654-661 [Conf]
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
Security Requirement with a UML 2.0 Profile. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:670-677 [Conf]
- David G. Rosado, Eduardo Fernández-Medina, Mario Piattini, Carlos Gutiérrez
A Study of Security Architectural Patterns. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:358-365 [Conf]
- Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini
Practical Approach of a Secure Management System based on ISO/IEC 17799. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:585-592 [Conf]
- Emilio Soler, Rodolfo Villarroel, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini
Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:914-921 [Conf]
- Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo
Representing levels of abstraction to facilitate the Secure Multidimensional Modeling. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:678-684 [Conf]
- Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
Quality of Password Management Policy. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:544-550 [Conf]
- Eduardo Fernández-Medina, Mario Piattini
A Methodology for Multilevel Database Design. [Citation Graph (0, 0)][DBLP] CAiSE Short Paper Proceedings, 2003, pp:- [Conf]
- Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini
A Comparison of Secure Information Systems Design Methodologies. [Citation Graph (0, 0)][DBLP] CAiSE Workshops (1), 2004, pp:189-198 [Conf]
- Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini
General Considerations on Data Warehouse Security. [Citation Graph (0, 0)][DBLP] Security and Management, 2004, pp:242-248 [Conf]
- Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics. [Citation Graph (0, 0)][DBLP] Security and Management, 2004, pp:109-117 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati
Access Control of SVG Documents. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:219-230 [Conf]
- Eduardo Fernández-Medina, Mario Piattini
Designing Secure Databases for OLS. [Citation Graph (0, 0)][DBLP] DEXA, 2003, pp:886-895 [Conf]
- Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini
Incorporating Security Issues in the Information Systems Design. [Citation Graph (0, 0)][DBLP] ENC, 2004, pp:345-352 [Conf]
- Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini
Extending UML for Designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP] ER, 2004, pp:217-230 [Conf]
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile. [Citation Graph (0, 0)][DBLP] ER (Workshops), 2006, pp:32-42 [Conf]
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
Applying a Security Requirements Engineering Process. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:192-206 [Conf]
- Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
A Survey of Web Services Security. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:968-977 [Conf]
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:1044-1053 [Conf]
- Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
Using UML Packages for Designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:1024-1034 [Conf]
- Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
Metrics of Password Management Policy. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:1013-1023 [Conf]
- Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
PWSSec: Process for Web Services Security. [Citation Graph (0, 0)][DBLP] ICWS, 2006, pp:213-222 [Conf]
- Carlos Gutiérrez García, Eduardo Fernández-Medina, Mario Piattini
PWSSEC: Proceso de Desarrollo para Seguridad de Servicios. [Citation Graph (0, 0)][DBLP] JISBD, 2005, pp:203-210 [Conf]
- Eduardo Fernández-Medina, G. Ruiz, Sabrina De Capitani di Vimercati
Implementing an Access Control System for SVG Documents. [Citation Graph (0, 0)][DBLP] OTM Workshops, 2003, pp:741-753 [Conf]
- Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
Security Risk Analysis in Web Services Systems. [Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:425-430 [Conf]
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
Secure Information Systems Development - Based on a Security Requirements Engineering Process. [Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:467-470 [Conf]
- David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
Defining Viewpoints for Security Architectural Patterns. [Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:419-424 [Conf]
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:135-145 [Conf]
- Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini
A Model Driven Approach for Secure XML Database Development. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:33-46 [Conf]
- Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
Towards a UML 2.0/OCL extension for designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:217-228 [Conf]
- Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
Towards a Classification of Security Metrics. [Citation Graph (0, 0)][DBLP] WOSIS, 2004, pp:342-350 [Conf]
- David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
Security Patterns Related to Security Requirements. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:163-173 [Conf]
- Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini
Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:256-266 [Conf]
- Eduardo Fernández-Medina, Mario Piattini
UML for the Design of Secure Databases. [Citation Graph (0, 0)][DBLP] SIS, 2002, pp:25-38 [Conf]
- Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
Web Services Security: is the problem solved? [Citation Graph (0, 0)][DBLP] WOSIS, 2004, pp:293-304 [Conf]
- Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
Towards a Process for Web Services Security. [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:298-308 [Conf]
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
Towards an integration of Security Requirements into Business Process Modeling. [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:287-297 [Conf]
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:174-184 [Conf]
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. [Citation Graph (0, 0)][DBLP] TrustBus, 2006, pp:51-61 [Conf]
- Eduardo Fernández-Medina, Mario Piattini
Extending OCL for Secure Database Development. [Citation Graph (0, 0)][DBLP] UML, 2004, pp:380-394 [Conf]
- Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
Towards a Process for Web Services Security. [Citation Graph (0, 0)][DBLP] Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal]
- Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo
A UML 2.0/OCL Extension for Designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP] Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal]
- Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini
Secure information systems development - a survey and comparison. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:4, pp:308-321 [Journal]
- Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini
Access control and audit model for the multidimensional modeling of data warehouses. [Citation Graph (0, 0)][DBLP] Decision Support Systems, 2006, v:42, n:3, pp:1270-1289 [Journal]
- Eduardo Fernández-Medina, Mario Piattini
Designing secure databases. [Citation Graph (0, 0)][DBLP] Information & Software Technology, 2005, v:47, n:7, pp:463-477 [Journal]
- Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini
Developing secure data warehouses with a UML extension. [Citation Graph (0, 0)][DBLP] Inf. Syst., 2007, v:32, n:6, pp:826-856 [Journal]
- Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini
Model driven development of secure XML databases. [Citation Graph (0, 0)][DBLP] SIGMOD Record, 2006, v:35, n:3, pp:22-27 [Journal]
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases. [Citation Graph (0, 0)][DBLP] BPM, 2007, pp:408-415 [Conf]
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification. [Citation Graph (0, 0)][DBLP] ER Workshops, 2007, pp:106-115 [Conf]
- David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
Defining Security Architectural Patterns Based on Viewpoints. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2007, pp:262-272 [Conf]
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
Aplicación práctica de un proceso de ingeniería de requisitos de seguridad. [Citation Graph (0, 0)][DBLP] JISBD, 2006, pp:315-324 [Conf]
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio. [Citation Graph (0, 0)][DBLP] JISBD, 2006, pp:347-356 [Conf]
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
Analysis-Level Classes from Secure Business Processes Through Model Transformations. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:104-114 [Conf]
Application of QVT for the Development of Secure Data Warehouses: A case study. [Citation Graph (, )][DBLP]
A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses. [Citation Graph (, )][DBLP]
A Framework for the Development of Secure Data Warehouses based on MDA and QVT. [Citation Graph (, )][DBLP]
Security Requirements Variability for Software Product Lines. [Citation Graph (, )][DBLP]
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. [Citation Graph (, )][DBLP]
A Systematic Review and Comparison of Security Ontologies. [Citation Graph (, )][DBLP]
Implementing Multidimensional Security into OLAP Tools. [Citation Graph (, )][DBLP]
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. [Citation Graph (, )][DBLP]
Including Security Rules Support in an MDA Approach for Secure DWs. [Citation Graph (, )][DBLP]
Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. [Citation Graph (, )][DBLP]
Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. [Citation Graph (, )][DBLP]
Managing the Asset Risk of SMEs. [Citation Graph (, )][DBLP]
Towards a Modernization Process for Secure Data Warehouses. [Citation Graph (, )][DBLP]
Model driven development of secure XML data warehouses: a case study. [Citation Graph (, )][DBLP]
Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models. [Citation Graph (, )][DBLP]
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application. [Citation Graph (, )][DBLP]
Scmm-Tool - Tool for Computer Automation of the Information Security Management Systems. [Citation Graph (, )][DBLP]
Data Quality in XML Databases - A Methodology for Semi-Structured Database Design Supporting Data Quality Issues. [Citation Graph (, )][DBLP]
Engineering Process Based on Grid Use Cases for Mobile Grid Systems. [Citation Graph (, )][DBLP]
CIM to PIM Transformation: A Reality. [Citation Graph (, )][DBLP]
Towards security requirements management for software product lines: a security domain requirements engineering process. [Citation Graph (, )][DBLP]
Reingeniería sobre Almacenes de Datos Seguros aplicando ADM. [Citation Graph (, )][DBLP]
Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros. [Citation Graph (, )][DBLP]
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach. [Citation Graph (, )][DBLP]
Towards the Secure Modelling of OLAP Users' Behaviour. [Citation Graph (, )][DBLP]
Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas. [Citation Graph (, )][DBLP]
Security Requirements in Software Product Lines. [Citation Graph (, )][DBLP]
Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises. [Citation Graph (, )][DBLP]
SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines. [Citation Graph (, )][DBLP]
SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level. [Citation Graph (, )][DBLP]
Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT. [Citation Graph (, )][DBLP]
Building ISMS through the Reuse of Knowledge. [Citation Graph (, )][DBLP]
Security Requirements Engineering Process for Software Product Lines: A Case Study. [Citation Graph (, )][DBLP]
A comparison of software design security metrics. [Citation Graph (, )][DBLP]
Web services enterprise security architecture: a case study. [Citation Graph (, )][DBLP]
Un Conjunto de Transformaciones QVT para el Modelado de Almacenes de Datos Seguros. [Citation Graph (, )][DBLP]
Modelado de Requisitos de Seguridad para Almacenes de Datos. [Citation Graph (, )][DBLP]
Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros. [Citation Graph (, )][DBLP]
Aplicando un Proceso de Ingeniería de Requisitos de Seguridad de Dominio para Líneas de Producto Software. [Citation Graph (, )][DBLP]
Search in 0.019secs, Finished in 0.622secs
|