dblp.uni-trier.dewww.uni-trier.de

Eduardo B. Fernández Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
83EEHironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Jan Jürjens: Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). OOPSLA Companion 2009: 713-714
2008
82EEEduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Atsuto Kubo, Yoshiaki Fukazawa: Classifying Security Patterns. APWeb 2008: 342-347
81EENelly A. Delessy, Eduardo B. Fernández: A Pattern-Driven Security Process for SOA Applications. ARES 2008: 416-421
80EEEduardo B. Fernández, Mihai Fonoage, Michael VanHilst, Mirela Marta: The Secure Three-Tier Architecture Pattern. CISIS 2008: 555-560
79EEEduardo B. Fernández, Jan Jürjens, Nobukazu Yoshioka, Hironori Washizaki: Incorporating Database Systems into a Secure Software Development Methodology. DEXA Workshops 2008: 310-314
78EEFabrício A. Braz, Eduardo B. Fernández, Michael VanHilst: Eliciting Security Requirements through Misuse Activities. DEXA Workshops 2008: 328-333
77EENelly A. Delessy, Eduardo B. Fernández: A pattern-driven security process for SOA applications. SAC 2008: 2226-2227
76EEEduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie: Patterns and Pattern Diagrams for Access Control. TrustBus 2008: 38-47
75 Michael VanHilst, Eduardo B. Fernández, Fabrício A. Braz: A Multi-Dimensional Classification for Users of Security Patterns. WOSIS 2008: 89-98
2007
74EEEduardo B. Fernández, Xiaohong Yuan: Securing analysis patterns. ACM Southeast Regional Conference 2007: 288-293
73EEEduardo B. Fernández: Security patterns and secure systems design. ACM Southeast Regional Conference 2007: 510
72EENelly A. Delessy, Eduardo B. Fernández: Adapting Web Services Security Standards for Mobile and Wireless Environments. APWeb/WAIM Workshops 2007: 624-633
71EEEduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie: Security Patterns for Physical Access Control Systems. DBSec 2007: 259-274
70EEEduardo B. Fernández, Preethi Cholmondeley, Olaf Zimmermann: Extending a Secure System Development Methodology to SOA. DEXA Workshops 2007: 749-754
69EEEduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie: Attack Patterns: A New Forensic and Design Tool. IFIP Int. Conf. Digital Forensics 2007: 345-357
68EEEduardo B. Fernández: Security Patterns and Secure Systems Design. LADC 2007: 233-234
67EEGünther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger: Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2
66EEBing Wu, Jie Wu, Eduardo B. Fernández, Mohammad Ilyas, Spyros S. Magliveras: Secure and efficient key management in mobile ad hoc networks. J. Network and Computer Applications 30(3): 937-954 (2007)
65EEEduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie: Security Patterns for Voice over IP Networks. JSW 2(2): 19-29 (2007)
2006
64EEEduardo B. Fernández, Nelly A. Delessy: Using Patterns to Understand and Compare Web Services Security Products and Standards. AICT/ICIW 2006: 157
63EEEduardo B. Fernández, Michael VanHilst, María M. Larrondo-Petrie, Shihong Huang: Defining Security Requirements Through Misuse Actions. IFIP Workshop on Advanced Software Engineering 2006: 123-137
2005
62 Eduardo B. Fernández: Security Patterns and Secure Systems Design Using UML. ICEIS (1) 2005: 21
61EEBing Wu, Jie Wu, Eduardo B. Fernández, Spyros S. Magliveras: Secure and Efficient Key Management in Mobile Ad Hoc Networks. IPDPS 2005
60EEEduardo B. Fernández, Saeed Rajput, Michael VanHilst, María M. Larrondo-Petrie: Some Security Issues of Wireless Systems. ISSADS 2005: 388-396
59 Eduardo B. Fernández, Tami Sorgente, María M. Larrondo-Petrie: A UML-Based Methodology for Secure Systems: The Design Stage . WOSIS 2005: 207-216
2004
58 Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul: A Pattern System for Access Control. DBSec 2004: 235-249
57 Eduardo B. Fernández: Two Patterns for Web Services Security. International Conference on Internet Computing 2004: 801-807
56 Eduardo B. Fernández: A Methodology for Secure Software Design. Software Engineering Research and Practice 2004: 130-136
55EEJan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer: Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). UML Satellite Activities 2004: 76-84
2000
54EEEduardo B. Fernández, Xiaohong Yuan: Semantic Analysis Patterns. ER 2000: 183-195
1999
53EEEduardo B. Fernández: Coordination of Security Levels for Internet Architectures. DEXA Workshop 1999: 837-841
52 Massimo Ancona, Walter Cazzola, Eduardo B. Fernández: Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks. Secure Internet Programming 1999: 35-49
1998
51 Eduardo B. Fernández, Krishnakumar R. Nair: An Abstract Authorization System for the Internet. DEXA Workshop 1998: 310-315
50EEMassimo Ancona, Walter Cazzola, Eduardo B. Fernández: Reflective Authorization Systems. ECOOP Workshops 1998: 281
49 Ke Huang, Jie Wu, Eduardo B. Fernández: A Generalized Forward Recovery Checkpointing Scheme. IPPS/SPDP Workshops 1998: 623-643
48 Jie Wu, Eduardo B. Fernández, Donglai Dai: Optimal Fault-Secure Scheduling. Comput. J. 41(4): 207-222 (1998)
47 Jie Wu, Eduardo B. Fernández, Yingqui Lo: Embedding of Binomial Treas in Hypercubes with Link Faults. J. Parallel Distrib. Comput. 54(1): 49-74 (1998)
1997
46EEJie Wu, Eduardo B. Fernández, Yingquiu Luo: Embedding of binomial trees in hypercubes with link faults. ICPP 1997: 96-99
1996
45 Eduardo B. Fernández, Krishnakumar R. Nair, María M. Larrondo-Petrie, Yan Xu: High-Level Security Issues in Multimedia/Hypertext Systems. Communications and Multimedia Security 1996: 13-24
44 W. Jie, Eduardo B. Fernández, Z. Manxia: Design and Modeling of Hybrid Fault-Tolerant Software With Cost Constraints. Journal of Systems and Software 35(2): 141-149 (1996)
1995
43 Eduardo B. Fernández, Robert B. France, D. Wei: A Formal Specification of an Authorization Model for Object-Oriented Databases. DBSec 1995: 95-110
42EEHaifeng Qian, Eduardo B. Fernández, Jie Wu: A combined functional and object-oriented approach to software design. ICECCS 1995: 167-174
41EEEduardo B. Fernández, Robert B. France: Formal specification of real-time dependable systems. ICECCS 1995: 342-348
1994
40 Eduardo B. Fernández, Jie Wu, Minjie H. Fernandez: User Group Structures in Object-Oriented Database Authorization. DBSec 1994: 57-76
39EEEduardo B. Fernández, Ehud Gudes, Haiyan Song: A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 6(2): 275-292 (1994)
38EEJie Wu, Eduardo B. Fernández: Using Petri Nets for the Design of Conversation Boundaries in Fault-Tolerant Software. IEEE Trans. Parallel Distrib. Syst. 5(10): 1106-1112 (1994)
37EEJie Wu, Y. Wang, Eduardo B. Fernández: A uniform approach to software and hardware fault tolerance. Journal of Systems and Software 26(2): 117-127 (1994)
1993
36 Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes: A Method-Based Authorization Model for Object-Oriented Databases. Security for Object-Oriented Systems 1993: 135-150
35EENurith Gal-Oz, Ehud Gudes, Eduardo B. Fernández: A Model of Methods Access Authorization in Object-oriented Databases. VLDB 1993: 52-61
34EEJie Wu, Eduardo B. Fernández: Broadcasting in faulty hypercubes. Microprocessing and Microprogramming 39(1): 43-53 (1993)
1992
33EEJie Wu, Eduardo B. Fernández: Broadcasting in Faulty Cube-Connected-Cycles with Minimum Recovery Time. CONPAR 1992: 833-834
32 Jie Wu, Eduardo B. Fernández: Reliable Broadcasting in Faulty Hypercube Computers. SRDS 1992: 122-129
31EEJie Wu, Eduardo B. Fernández, Ruiguang Zhang: Some extensions to the lattice model for computer security. Computers & Security 11(4): 357-369 (1992)
30EEKhoa D. Huynh, Eduardo B. Fernández, Taghi M. Khoshgoftaar: A workload model for frame-based real-time applications on distributed systems. Journal of Systems and Software 18(3): 255-271 (1992)
1990
29 Ehud Gudes, Haiyan Song, Eduardo B. Fernández: Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. DBSec 1990: 85-98
28 Jie Wu, Eduardo B. Fernández: The Extended G-Network, a Fault-Tolerant Interconnection Network for the Multiprocessors. PARBASE / Architectures 1990: 250-259
27 Massimo Ancona, Gabriella Dodero, Vittoria Gianuzzi, Andrea Clematis, Eduardo B. Fernández: A System Architecture for Fault Tolerance in Concurrent Software. IEEE Computer 23(10): 23-32 (1990)
26EETeresa F. Lunt, Eduardo B. Fernández: Database Security. IEEE Data Eng. Bull. 13(4): 43-50 (1990)
25EETeresa F. Lunt, Eduardo B. Fernández: Database Security. SIGMOD Record 19(4): 90-97 (1990)
1989
24 María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández: Security Policies in Object-Oriented Databases. DBSec 1989: 257-268
23 Eduardo B. Fernández, Ehud Gudes, Haiyan Song: A Security Model for Object-Oriented Databases. IEEE Symposium on Security and Privacy 1989: 110-115
22EEJie Wu, Eduardo B. Fernández: A Simplification of a Conversation Design Scheme Using Petri Nets. IEEE Trans. Software Eng. 15(5): 658-660 (1989)
1987
21 Massimo Ancona, Andrea Clematis, Gabriella Dodero, Eduardo B. Fernández, Vittoria Gianuzzi: A System Architecture for Software Fault Tolerance. Fehlertolerierende Rechensysteme 1987: 273-283
1983
20 Christopher Wood, Eduardo B. Fernández, Tomás Lang: Minimization of Demand Paging for the LRU Stack Model of Program Behavior. Inf. Process. Lett. 16(2): 99-104 (1983)
1980
19 Eduardo B. Fernández: Surveyor's Forum: Related Information. ACM Comput. Surv. 12(1): 111-112 (1980)
18 Christopher Wood, Eduardo B. Fernández, Rita C. Summers: Data Base Security: Requirements, Policies, and Models. IBM Systems Journal 19(2): 229-252 (1980)
1979
17EEChristopher Wood, Eduardo B. Fernández: Decentralized Authorization in a Database System. VLDB 1979: 352-359
16 Christopher Wood, Rita C. Summers, Eduardo B. Fernández: Authorization in multilevel database models. Inf. Syst. 4(2): 155-161 (1979)
1978
15EEL. Lichten, Eduardo B. Fernández: Interaction with databases through procedural languages. ACM Annual Conference (2) 1978: 937-945
14 Eduardo B. Fernández, Tomás Lang, Christopher Wood: Effect of Replacement Algorithms on a Paged Buffer Database System. IBM J. Res. Dev. 22(2): 185-196 (1978)
13 Eduardo B. Fernández, Rita C. Summers, Tomás Lang, Charles D. Coleman: Architectural Support for System Protection and Database Security. IEEE Trans. Computers 27(8): 767-771 (1978)
1977
12EET. Lang, E. Nahouraii, K. Kasuga, Eduardo B. Fernández: An Architectural Extension for a Large Database System Incorporating a Processor for Disk Search. VLDB 1977: 204-210
11EETomás Lang, Christopher Wood, Eduardo B. Fernández: Database Buffer Paging in Virtual Storage Systems. ACM Trans. Database Syst. 2(4): 339-351 (1977)
10 Tomás Lang, Eduardo B. Fernández: Improving the Computation of Lower Bounds for Optimal Schedules. IBM Journal of Research and Development 21(3): 273-280 (1977)
1976
9EEEduardo B. Fernández, Rita C. Summers: Integrity aspects of a shared data base. AFIPS National Computer Conference 1976: 819-827
8 Eduardo B. Fernández, Rita C. Summers, Charles D. Coleman: Architecture Support for System Protection. ISCA 1976: 121
7 Eduardo B. Fernández, Tomás Lang: Scheduling as a Graph Transformation. IBM Journal of Research and Development 20(6): 551-559 (1976)
6 Tomás Lang, Eduardo B. Fernández: Scheduling of Unit-Length Independent Tasks with Execution Constraints. Inf. Process. Lett. 4(4): 95-98 (1976)
1975
5 Rita C. Summers, Charles D. Coleman, Eduardo B. Fernández: A Programming Language Extension for Access to a Shared Data Base. ACM Pacific 1975: 114-118
4EEEduardo B. Fernández, Rita C. Summers, Charles D. Coleman: An Authorization Model for a Shared Data Base. SIGMOD Conference 1975: 23-31
3EEEduardo B. Fernández, Rita C. Summers, Tomás Lang: Definition and Evaluation of Access Rules in Data Management Systems. VLDB 1975: 268-285
2 Eduardo B. Fernández, Tomás Lang: Computation of Lower Bounds for Multiprocessor Schedules. IBM Journal of Research and Development 19(5): 435-444 (1975)
1974
1 Bertram Bussell, Eduardo B. Fernández, Olivier Levy: Optimal Scheduling for Homogeneous Multiprocessors. IFIP Congress 1974: 286-290

Coauthor Index

1Massimo Ancona [21] [27] [50] [52]
2Jose Ballesteros [71]
3Fabrício A. Braz [75] [78]
4Bertram Bussell [1]
5Walter Cazzola [50] [52]
6Preethi Cholmondeley [70]
7Andrea Clematis [21] [27]
8Charles D. Coleman [4] [5] [8] [13]
9Donglai Dai [48]
10Nelly A. Delessy [64] [72] [77] [81]
11Ana C. Desouza-Doucet [71]
12Gabriella Dodero [21] [27]
13Minjie H. Fernandez [40]
14Mihai Fonoage [80]
15Robert B. France [41] [43] [55]
16Yoshiaki Fukazawa [82]
17Nurith Gal-Oz [35]
18Vittoria Gianuzzi [21] [27]
19Ehud Gudes [23] [24] [29] [35] [36] [39]
20Constance L. Heitmeyer (Connie Heitmeyer) [55]
21Ke Huang [49]
22Shihong Huang [63]
23Khoa D. Huynh [30]
24Mohammad Ilyas [66]
25W. Jie [44]
26Jan Jürjens [55] [79] [83]
27K. Kasuga [12]
28Sokratis K. Katsikas [67]
29Taghi M. Khoshgoftaar [30]
30Alfred Kobsa [67]
31Atsuto Kubo [82]
32T. Lang [12]
33Tomás Lang [2] [3] [6] [7] [10] [11] [13] [14] [20]
34María M. Larrondo-Petrie (Maria M. Larrondo-Petrie) [24] [36] [45] [59] [60] [63] [65] [69] [71] [76]
35Olivier Levy [1]
36L. Lichten [15]
37Yingqui Lo [47]
38Teresa F. Lunt [25] [26]
39Yingquiu Luo [46]
40Spyros S. Magliveras [61] [66]
41Z. Manxia [44]
42Mirela Marta [80]
43Jens Ingo Mehlau [58]
44Marco Casassa Mont [67]
45E. Nahouraii [12]
46Krishnakumar R. Nair [45] [51]
47Rolf Oppliger [67]
48Juan C. Pelaez [65] [69]
49Günther Pernul [58] [67] [76]
50Torsten Priebe [58]
51Haifeng Qian [42]
52Saeed Rajput [60]
53Bernhard Rumpe [55]
54Haiyan Song [23] [24] [29] [39]
55Tami Sorgente [59]
56Rita C. Summers [3] [4] [5] [8] [9] [13] [16] [18]
57Michael VanHilst [60] [63] [75] [78] [80]
58Y. Wang [37]
59Hironori Washizaki [79] [82] [83]
60D. Wei [43]
61Christopher Wood [11] [14] [16] [17] [18] [20]
62Bing Wu [61] [66]
63Jie Wu [22] [28] [31] [32] [33] [34] [37] [38] [40] [42] [46] [47] [48] [49] [61] [66]
64Yan Xu [45]
65Nobukazu Yoshioka [79] [82] [83]
66Xiaohong Yuan [54] [74]
67Ruiguang Zhang [31]
68Olaf Zimmermann [70]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)