Eduardo B. Fernández

Affiliations:
  • Florida Atlantic University, Boca Raton, Florida, USA


According to our database1, Eduardo B. Fernández authored at least 191 papers between 1973 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
The design of secure IoT applications using patterns: State of the art and directions for research.
Internet Things, 2021

Security in microservice-based systems: A Multivocal literature review.
Comput. Secur., 2021

2020
Application of security reference architecture to Big Data ecosystems in an industrial scenario.
Softw. Pract. Exp., 2020

Landscape of Architecture and Design Patterns for IoT Systems.
IEEE Internet Things J., 2020

TPM, a pattern for an architecture for trusted computing.
Proceedings of the EuroPLoP '20: European Conference on Pattern Languages of Programs 2020, 2020

Refining the evaluation of the degree of security of a system built using security patterns.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Secure Development of Big Data Ecosystems.
IEEE Access, 2019

Analysis of threats and countermeasures in NFV use cases.
Proceedings of the 2019 IEEE International Systems Conference, 2019

A Pattern for an NFV Virtual Machine Environment.
Proceedings of the 2019 IEEE International Systems Conference, 2019

An Ontology for Security Patterns.
Proceedings of the 38th International Conference of the Chilean Computer Science Society, 2019

Landscape of IoT patterns.
Proceedings of the 1st International Workshop on Software Engineering Research & Practices for the Internet of Things, 2019

BlockBD: a security pattern to incorporate blockchain in big data ecosystems.
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019

Security Mechanisms Used in Microservices-Based Systems: A Systematic Mapping.
Proceedings of the XLV Latin American Computing Conference, 2019

A Pattern for a Virtual Network Function (VNF).
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

A Misuse Pattern for Compromising VMs via Virtual Machine Escape in NFV.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Secure Database Development.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Assessing and improving the quality of security methodologies for distributed systems.
J. Softw. Evol. Process., 2018

Towards Obtaining UML Class Diagrams from Secure Business Processes Using Security Patterns.
J. Univers. Comput. Sci., 2018

Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development, 2018

A misuse Pattern for DDoS in the IoT.
Proceedings of the 23rd European Conference on Pattern Languages of Programs, 2018

A Security Pattern for Key-Value NoSQL Database Authorization.
Proceedings of the 23rd European Conference on Pattern Languages of Programs, 2018

Towards a Security Reference Architecture for Big Data.
Proceedings of the 20th International Workshop on Design, 2018

Report of WESPr-18: the International Workshop on Evidence-based Security and Privacy in the Wild.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

Using a variety of patterns in a secure software development methodology.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

A reference architecture for the container ecosystem.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Evaluating the degree of security of a system built using security patterns.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Design process for usable security and authentication using a user-centered approach.
Proceedings of the XVIII International Conference on Human Computer Interaction, 2017

The Container Manager Pattern.
Proceedings of the 22nd European Conference on Pattern Languages of Programs, 2017

Two safety patterns: Safety Assertion and Safety Assertion Enforcer.
Proceedings of the 22nd European Conference on Pattern Languages of Programs, 2017

2016
Building a security reference architecture for cloud systems.
Requir. Eng., 2016

A survey of compliance issues in cloud computing.
J. Internet Serv. Appl., 2016

Introduction to the Special Issue on Evaluating the Security of Complex Systems.
Inf., 2016

Modeling and Security in Cloud Ecosystems.
Future Internet, 2016

A Pattern for Fog Computing.
Proceedings of the 10th Travelling Conference on Pattern Languages of Programs, 2016

A Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the IEEE World Congress on Services, 2016

Cloud Ecosystems Support for Internet of Things and DevOps Using Patterns.
Proceedings of the First IEEE International Conference on Internet-of-Things Design and Implementation, 2016

Building Compliance and Security Reference Architectures (CSRA) for Cloud Systems.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

Building Secure Cloud Architectures Using Patterns.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

Preventing and unifying threats in cyberphysical systems.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

A reference architecture for web browsers: part II, a pattern for web browser content renderer.
Proceedings of the 21st European Conference on Pattern Languages of Programs, 2016

Mitigating security threats using tactics and patterns: a controlled experiment.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016

Threat Modeling in Cyber-Physical Systems.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
A comprehensive pattern-oriented approach to engineering security methodologies.
Inf. Softw. Technol., 2015

ASE: A comprehensive pattern-driven security methodology for distributed systems.
Comput. Stand. Interfaces, 2015

Security solution frames and security patterns for authorization in distributed, collaborative systems.
Comput. Secur., 2015

Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations.
Proceedings of the SECRYPT 2015, 2015

Patterns for security and privacy in cloud ecosystems.
Proceedings of the 2nd IEEE Workshop on Evolving Security and Privacy Requirements Engineering, 2015

Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities.
Proceedings of the 20th European Conference on Pattern Languages of Programs, 2015

A pattern for network functions virtualization.
Proceedings of the 20th European Conference on Pattern Languages of Programs, 2015

Revisiting Architectural Tactics for Security.
Proceedings of the Software Architecture - 9th European Conference, 2015

2014
Enterprise security pattern: a new type of security pattern.
Secur. Commun. Networks, 2014

An extensible pattern-based library and taxonomy of security threats for distributed systems.
Comput. Stand. Interfaces, 2014

Enterprise security pattern: A model-driven architecture instance.
Comput. Stand. Interfaces, 2014

A security reference architecture for cloud systems.
Proceedings of the WICSA 2014 Companion Volume, Sydney, NSW, Australia, April 7-11, 2014, 2014

Abstract security patterns for requirements specification and analysis of secure systems.
Proceedings of the Anais do WER14, 2014

Towards Secure Inter-Cloud Architectures.
Proceedings of the 8th Nordic Conference on Pattern Languages of Programs, VikingPLoP 2014, 2014

Patterns for content-dependent and context-enhanced authorization.
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014

Threat analysis and misuse patterns of federated inter-cloud systems.
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014

An exploratory comparison of security patterns and tactics to harden systems.
Proceedings of the XVII Iberoamerican Conference on Software Engineering, 2014

Abstract security patterns for requirements and analysis of secure systems.
Proceedings of the XVII Iberoamerican Conference on Software Engineering, 2014

A Comprehensive Pattern-Driven Security Methodology for Distributed Systems.
Proceedings of the 23rd Australian Software Engineering Conference, 2014

2013
An analysis of security issues for cloud computing.
J. Internet Serv. Appl., 2013

A conceptual approach to secure electronic elections based on patterns.
Gov. Inf. Q., 2013

Decomposing Distributed Software Architectures for the Determination and Incorporation of Security and Other Non-functional Requirements.
Proceedings of the 22nd Australian Conference on Software Engineering (ASWEC 2013), 2013

2012
Engineering Security into Distributed Systems: A Survey of Methodologies.
J. Univers. Comput. Sci., 2012

A Survey of Patterns for Web Services Security and Reliability Standards.
Future Internet, 2012

Introduction to the Special Issue on Recent Advances in Web Services.
Future Internet, 2012

Securing distributed systems using patterns: A survey.
Comput. Secur., 2012

Secure Middleware Patterns.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
Wkc-OWA, a New Neat-OWA Operator to Aggregate Information in Democratic Decision Problems.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2011

Patterns for Business-to-consumer E-Commerce Applications
CoRR, 2011

Model-based development of security requirements.
CLEI Electron. J., 2011

Misuse Patterns for Cloud Computing.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

P2N: a pedagogical <u>p</u>attern for teaching computer <u>p</u>rogramming to <u>n</u>on-CS majors.
Proceedings of the 18th Conference on Pattern Languages of Programs, 2011

Two patterns for distributed systems: enterprise service bus (ESB) and distributed publish/subscribe.
Proceedings of the 18th Conference on Pattern Languages of Programs, 2011

Towards Pattern-Based Reliability Certification of Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011

Enumerating Software Failures to Build Dependable Distributed Applications.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

An Approach to Model-based Development of Secure and Reliable Systems.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Security Requirements for Social Networks in Web 2.0.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

The WS-policy standard pattern.
Proceedings of the 8th Latin American Conference on Pattern Languages of Programs, 2010

Building Secure Systems: From Threats to Security Patterns.
Proceedings of the SCCC 2010, 2010

A pattern for a sensor node.
Proceedings of the 17th Conference on Pattern Languages of Programs, 2010

A pattern system of underlying theories for process improvement.
Proceedings of the 17th Conference on Pattern Languages of Programs, 2010

Designing Secure SCADA Systems Using Security Patterns.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats.
Proceedings of the ARES 2010, 2010

Measuring the Level of Security Introduced by Security Patterns.
Proceedings of the ARES 2010, 2010

2009
Security Patterns and A Methodology to Apply them.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Secure Database Development.
Proceedings of the Encyclopedia of Database Systems, 2009

Misuse patterns in VoIP.
Secur. Commun. Networks, 2009

A Multi-Dimensional Classification for Users of Security Patterns.
J. Res. Pract. Inf. Technol., 2009

Web Services Reliability Patterns.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09).
Proceedings of the Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2009

Digital Signature with Hashing and XML Signature patterns.
Proceedings of the EuroPLoP 2009: 14th Annual European Conference on Pattern Languages of Programming, 2009

Improving the Classification of Security Patterns.
Proceedings of the Database and Expert Systems Applications, 2009

Embedding Security Patterns into a Domain Model.
Proceedings of the Database and Expert Systems Applications, 2009

The Secure Pipes and Filters Pattern.
Proceedings of the Database and Expert Systems Applications, 2009

On building secure SCADA systems using security patterns.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Patterns to Support the Development of Privacy Policies.
Proceedings of the The Forth International Conference on Availability, 2009

Modeling Misuse Patterns.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Patterns and Pattern Diagrams for Access Control.
Proceedings of the Trust, 2008

A pattern-driven security process for SOA applications.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Incorporating Database Systems into a Secure Software Development Methodology.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

Eliciting Security Requirements through Misuse Activities.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

The Secure Three-Tier Architecture Pattern.
Proceedings of the Second International Conference on Complex, 2008

Classifying Security Patterns.
Proceedings of the Progress in WWW Research and Development, 2008

2007
Security Patterns for Voice over IP Networks.
J. Softw., 2007

Secure and efficient key management in mobile ad hoc networks.
J. Netw. Comput. Appl., 2007

Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
Proceedings of the Trust, 2007

Attack Patterns: A New Forensic and Design Tool.
Proceedings of the Advances in Digital Forensics III, 2007

Patterns for VoIP Signaling Protocol Architectures.
Proceedings of the 12th European Conference on Pattern Languages of Programs (EuroPLoP '2007), 2007

Patterns for WiMax security.
Proceedings of the 12th European Conference on Pattern Languages of Programs (EuroPLoP '2007), 2007

Extending a Secure System Development Methodology to SOA.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Security Patterns for Physical Access Control Systems.
Proceedings of the Data and Applications Security XXI, 2007

Adapting Web Services Security Standards for Mobile and Wireless Environments.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Securing analysis patterns.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

Security patterns and secure systems design.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Defining Security Requirements Through Misuse Actions.
Proceedings of the IFIP 19th World Computer Congress, 2006

Securing the Broker Pattern.
Proceedings of the EuroPLoP' 2006, 2006

Using Patterns to Understand and Compare Web Services Security Products and Standards.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
A UML-Based Methodology for Secure Systems: The Design Stage .
Proceedings of the Security in Information Systems, 2005

An analysis of modeling flaws in HL7 and JAHIS.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Some Security Issues of Wireless Systems.
Proceedings of the Advanced Distributed Systems: 5th International School and Symposium, 2005

Secure and Efficient Key Management in Mobile Ad Hoc Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Security Patterns and Secure Systems Design Using UML.
Proceedings of the ICEIS 2005, 2005

Security Patterns - Integrating Security and Systems Engineering.
Wiley, ISBN: 978-0-470-85884-4, 2005

2004
Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop).
Proceedings of the UML Modeling Languages and Applications, 2004

A Methodology for Secure Software Design.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

Two Patterns for Web Services Security.
Proceedings of the International Conference on Internet Computing, 2004

A Pattern System for Access Control.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
An Analysis Pattern for Course Management.
Proceedings of the 8th European Conference on Pattern Languages of Programms (EuroPLoP '2003), 2003

More Patterns for Operating System Access Control.
Proceedings of the 8th European Conference on Pattern Languages of Programms (EuroPLoP '2003), 2003

2002
The Account Analysis Pattern.
Proceedings of the 7th European Conference on Pattern Languages of Programms (EuroPLoP '2002), 2002

An Analysis Pattern for the Request and Allocation of Limited Resources.
Proceedings of the 7th European Conference on Pattern Languages of Programms (EuroPLoP '2002), 2002

2000
Semantic Analysis Patterns.
Proceedings of the Conceptual Modeling, 2000

1999
Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks.
Proceedings of the Secure Internet Programming, 1999

Coordination of Security Levels for Internet Architectures.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1998
Embedding of Binomial Treas in Hypercubes with Link Faults.
J. Parallel Distributed Comput., 1998

Optimal Fault-Secure Scheduling.
Comput. J., 1998

A Generalized Forward Recovery Checkpointing Scheme.
Proceedings of the Parallel and Distributed Processing, 10 IPPS/SPDP'98 Workshops Held in Conjunction with the 12th International Parallel Processing Symposium and 9th Symposium on Parallel and Distributed Processing, Orlando, Florida, USA, March 30, 1998

Reflective Authorization Systems.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

An Abstract Authorization System for the Internet.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

1997
Embedding of binomial trees in hypercubes with link faults.
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997

1996
Design and Modeling of Hybrid Fault-Tolerant Software With Cost Constraints.
J. Syst. Softw., 1996

High-Level Security Issues in Multimedia/Hypertext Systems.
Proceedings of the Communications and Multimedia Security II, 1996

1995
A combined functional and object-oriented approach to software design.
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995

Formal specification of real-time dependable systems.
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995

A Formal Specification of an Authorization Model for Object-Oriented Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Using Petri Nets for the Design of Conversation Boundaries in Fault-Tolerant Software.
IEEE Trans. Parallel Distributed Syst., 1994

A Model for Evaluation and Administration of Security in Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng., 1994

A uniform approach to software and hardware fault tolerance.
J. Syst. Softw., 1994

User Group Structures in Object-Oriented Database Authorization.
Proceedings of the Database Security, 1994

1993
Broadcasting in faulty hypercubes.
Microprocess. Microprogramming, 1993

A Model of Methods Access Authorization in Object-oriented Databases.
Proceedings of the 19th International Conference on Very Large Data Bases, 1993

A uniform approach to software and hardware fault tolerance.
Proceedings of the 1993 Euromicro Workshop on Parallel and Distributed Processing, 1993

A Method-Based Authorization Model for Object-Oriented Databases.
Proceedings of the Security for Object-Oriented Systems, 1993

1992
A workload model for frame-based real-time applications on distributed systems.
J. Syst. Softw., 1992

Some extensions to the lattice model for computer security.
Comput. Secur., 1992

Reliable Broadcasting in Faulty Hypercube Computers.
Proceedings of the 11th Symposium on Reliable Distributed Systems, 1992

Broadcasting in Faulty Cube-Connected-Cycles with Minimum Recovery Time.
Proceedings of the Parallel Processing: CONPAR 92, 1992

1990
Database Security.
IEEE Data Eng. Bull., 1990

A System Architecture for Fault Tolerance in Concurrent Software.
Computer, 1990

The Extended G-Network, a Fault-Tolerant Interconnection Network for the Multiprocessors.
Proceedings of the Parallel Architectures (Postconference PARBASE-90)., 1990

Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases.
Proceedings of the Database Security, 1990

1989
A Simplification of a Conversation Design Scheme Using Petri Nets.
IEEE Trans. Software Eng., 1989

A Security Model for Object-Oriented Databases.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

Security Policies in Object-Oriented Databases.
Proceedings of the Database Security, 1989

1988
Software fault tolerance in architectures with hierarchical protection levels.
IEEE Micro, 1988

1987
A System Architecture for Software Fault Tolerance.
Proceedings of the Fehlertolerierende Rechensysteme / Fault-Tolerant Computing Systems, 1987

1983
Minimization of Demand Paging for the LRU Stack Model of Program Behavior.
Inf. Process. Lett., 1983

1980
Data Base Security: Requirements, Policies, and Models.
IBM Syst. J., 1980

Surveyor's Forum: Related Information.
ACM Comput. Surv., 1980

1979
Authorization in multilevel database models.
Inf. Syst., 1979

Decentralized Authorization in a Database System.
Proceedings of the Fifth International Conference on Very Large Data Bases, 1979

1978
Architectural Support for System Protection and Database Security.
IEEE Trans. Computers, 1978

Effect of Replacement Algorithms on a Paged Buffer Database System.
IBM J. Res. Dev., 1978

Interaction with databases through procedural languages.
Proceedings of the Proceedings 1978 ACM Annual Conference, 1978

1977
Database Buffer Paging in Virtual Storage Systems.
ACM Trans. Database Syst., 1977

Improving the Computation of Lower Bounds for Optimal Schedules.
IBM J. Res. Dev., 1977

An Architectural Extension for a Large Database System Incorporating a Processor for Disk Search.
Proceedings of the Third International Conference on Very Large Data Bases, 1977

A system architecture for compile-time actions in databases.
Proceedings of the 1977 annual conference, 1977

1976
Scheduling of Unit-Length Independent Tasks with Execution Constraints.
Inf. Process. Lett., 1976

Scheduling as a Graph Transformation.
IBM J. Res. Dev., 1976

Architecture Support for System Protection.
Proceedings of the 3rd Annual Symposium on Computer Architecture, 1976

Integrity aspects of a shared data base.
Proceedings of the American Federation of Information Processing Societies: 1976 National Computer Conference, 1976

SIGBDP (Paper Session).
Proceedings of the 1976 Annual Conference, Houston, Texas, USA, October 20-22, 1976, 1976

1975
Computation of Lower Bounds for Multiprocessor Schedules.
IBM J. Res. Dev., 1975

Definition and Evaluation of Access Rules in Data Management Systems.
Proceedings of the International Conference on Very Large Data Bases, 1975

An Authorization Model for a Shared Data Base.
Proceedings of the 1975 ACM SIGMOD International Conference on Management of Data, 1975

A Programming Language Extension for Access to a Shared Data Base.
Proceedings of the Data: Its Use, 1975

1974
Optimal Scheduling for Homogeneous Multiprocessors.
Proceedings of the Information Processing, 1974

1973
Bounds on the Number of Processors and Time for Multiprocessor Optimal Schedules.
IEEE Trans. Computers, 1973


  Loading...