Остановите войну!
for scientists:
default search action
Eduardo B. Fernández
- > Home > Persons > Eduardo B. Fernández
Publications
- 2023
- [j62]Bijayita Thapa, Eduardo B. Fernández, Ionut Cardei, Maria M. Larrondo-Petrie:
Abstract Entity Patterns for Sensors and Actuators. Comput. 12(5): 93 (2023) - [j61]Ingrid A. Buckley, Eduardo B. Fernández:
Dependability Patterns: A Survey. Comput. 12(10): 214 (2023) - 2022
- [j59]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns and the design of secure systems. Cybersecur. 5(1): 7 (2022) - 2021
- [j57]Anelis Pereira Vale, Eduardo B. Fernández, Raúl Monge, Hernán Astudillo, Gastón Márquez:
Security in microservice-based systems: A Multivocal literature review. Comput. Secur. 103: 102200 (2021) - [j56]Tian Xia, Hironori Washizaki, Yoshiaki Fukazawa, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández, Takehisa Kato, Hideyuki Kanuka, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development. Int. J. Syst. Softw. Secur. Prot. 12(2): 68-85 (2021) - [j55]Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Takao Okubo:
The design of secure IoT applications using patterns: State of the art and directions for research. Internet Things 15: 100408 (2021) - [c137]Eduardo B. Fernández, Hernán Astudillo, Cristian Orellana:
A pattern for a Secure IoT Thing. EuroPLoP 2021: 16:1-16:6 - [c136]Cristian Orellana, Hernán Astudillo, Eduardo B. Fernández:
A Pattern for a Secure Actuator Node. EuroPLoP 2021: 29:1-29:6 - [e1]Nobukazu Yoshioka, Hironori Washizaki, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto, Fuyuki Ishikawa, Foutse Khomh, Giuliano Antoniol:
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), Nara, Japan, December 4, 2018. CEUR Workshop Proceedings 2809, CEUR-WS.org 2021 [contents] - 2020
- [j54]Hironori Washizaki, Shinpei Ogata, Atsuo Hazeyama, Takao Okubo, Eduardo B. Fernández, Nobukazu Yoshioka:
Landscape of Architecture and Design Patterns for IoT Systems. IEEE Internet Things J. 7(10): 10091-10101 (2020) - [j53]Julio Moreno, Javier Gómez, Manuel A. Serrano, Eduardo B. Fernández, Eduardo Fernández-Medina:
Application of security reference architecture to Big Data ecosystems in an industrial scenario. Softw. Pract. Exp. 50(8): 1520-1538 (2020) - 2019
- [j52]Julio Moreno, Eduardo B. Fernández, Manuel A. Serrano, Eduardo Fernández-Medina:
Secure Development of Big Data Ecosystems. IEEE Access 7: 96604-96619 (2019) - [c131]Anelis Pereira Vale, Gastón Márquez, Hernán Astudillo, Eduardo B. Fernández:
Security Mechanisms Used in Microservices-Based Systems: A Systematic Mapping. CLEI 2019: 1-10 - [c130]Julio Moreno, Eduardo B. Fernández, Eduardo Fernández-Medina, Manuel A. Serrano:
BlockBD: a security pattern to incorporate blockchain in big data ecosystems. EuroPLoP 2019: 17:1-17:8 - [c129]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT patterns. SERP4IoT@ICSE 2019: 57-60 - [c128]Anelis Pereira Vale, Eduardo B. Fernández:
An Ontology for Security Patterns. SCCC 2019: 1-8 - [i3]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT Patterns. CoRR abs/1902.09718 (2019) - 2018
- [j51]Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka:
Using Security Patterns to Develop Secure Systems - Ten Years Later. Int. J. Syst. Softw. Secur. Prot. 9(4): 46-57 (2018) - [j50]Matías Zapata-Barra, Alfonso Rodríguez, Angélica Caro, Eduardo B. Fernández:
Towards Obtaining UML Class Diagrams from Secure Business Processes Using Security Patterns. J. Univers. Comput. Sci. 24(10): 1472-1492 (2018) - [c125]Madiha H. Syed, Eduardo B. Fernández:
A reference architecture for the container ecosystem. ARES 2018: 31:1-31:6 - [c124]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki:
Evaluating the degree of security of a system built using security patterns. ARES 2018: 43:1-43:8 - [c123]Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto:
Report of WESPr-18: the International Workshop on Evidence-based Security and Privacy in the Wild. WESPr-iMLSE@APSEC 2018: 1-2 - [c122]Eduardo B. Fernández, Nobukazu Yoshioka:
Using a variety of patterns in a secure software development methodology. WESPr-iMLSE@APSEC 2018: 26-32 - [c121]Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina, Eduardo B. Fernández:
Towards a Security Reference Architecture for Big Data. DOLAP 2018 - [c120]Julio Moreno, Eduardo B. Fernández, Eduardo Fernández-Medina, Manuel A. Serrano:
A Security Pattern for Key-Value NoSQL Database Authorization. EuroPLoP 2018: 12:1-12:4 - [c119]Madiha H. Syed, Eduardo B. Fernández, Julio Moreno:
A misuse Pattern for DDoS in the IoT. EuroPLoP 2018: 34:1-34:5 - [c118]Tian Xia, Hironori Washizaki, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández, Hideyuki Kanuka, Masayuki Yoshino, Dan Yamamoto, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services. MODELSWARD 2018: 379-386 - [r2]Jan Jürjens, Eduardo B. Fernández:
Secure Database Development. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [c117]Madiha H. Syed, Eduardo B. Fernández:
The Container Manager Pattern. EuroPLoP 2017: 28:1-28:9 - 2016
- [j48]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Madiha H. Syed:
Modeling and Security in Cloud Ecosystems. Future Internet 8(2): 13 (2016) - [j45]Eduardo B. Fernández, Raúl Monge, Keiko Hashizume:
Building a security reference architecture for cloud systems. Requir. Eng. 21(2): 225-249 (2016) - [c113]Gilberto Pedraza-Garcia, René Noël, Santiago Matalonga, Hernán Astudillo, Eduardo B. Fernández:
Mitigating security threats using tactics and patterns: a controlled experiment. ECSA Workshops 2016: 37 - [c112]Paulina Silva, Raúl Monge, Eduardo B. Fernández:
A reference architecture for web browsers: part II, a pattern for web browser content renderer. EuroPLoP 2016: 27 - [c108]Madiha H. Syed, Eduardo B. Fernández:
Cloud Ecosystems Support for Internet of Things and DevOps Using Patterns. IoTDI 2016: 301-304 - [c107]Hironori Washizaki, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Takehisa Kato, Shinpei Ogata, Haruhiko Kaiya, Eduardo B. Fernández, Hideyuki Kanuka, Yuki Kondo, Nobukazu Yoshioka, Takao Okubo, Atsuo Hazeyama:
A Metamodel for Security and Privacy Knowledge in Cloud Services. SERVICES 2016: 142-143 - [c106]Madiha H. Syed, Eduardo B. Fernández, Mohammad Ilyas:
A Pattern for Fog Computing. VikingPLoP 2016: 13:1-13:10 - 2015
- [c105]Eduardo B. Fernández, Hernán Astudillo, Gilberto Pedraza-Garcia:
Revisiting Architectural Tactics for Security. ECSA 2015: 55-69 - [c102]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki:
Patterns for security and privacy in cloud ecosystems. ESPRE 2015: 13-18 - 2014
- [j40]Santiago Moral-García, Santiago Moral-Rubio, Eduardo B. Fernández, Eduardo Fernández-Medina:
Enterprise security pattern: A model-driven architecture instance. Comput. Stand. Interfaces 36(4): 748-758 (2014) - [j39]Santiago Moral-García, Santiago Moral-Rubio, David Garcia Rosado, Eduardo B. Fernández, Eduardo Fernández-Medina:
Enterprise security pattern: a new type of security pattern. Secur. Commun. Networks 7(11): 1670-1690 (2014) - [c99]René Noël, Gilberto Pedraza-Garcia, Hernán Astudillo, Eduardo B. Fernández:
An exploratory comparison of security patterns and tactics to harden systems. CIbSE 2014: 378-391 - [c98]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements and analysis of secure systems. CIbSE 2014: 437-450 - [c97]Oscar Encina, Eduardo B. Fernández, A. Raúl Monge:
Threat analysis and misuse patterns of federated inter-cloud systems. EuroPLoP 2014: 13:1-13:8 - [c96]Eduardo B. Fernández, A. Raúl Monge, René Carvajal, Oscar Encina, Juan Hernández, Paulina Silva:
Patterns for content-dependent and context-enhanced authorization. EuroPLoP 2014: 32:1-32:10 - [c95]Oscar Encina, Eduardo B. Fernández, Raúl Monge:
Towards Secure Inter-Cloud Architectures. VikingPLoP 2014: 2:1-2:10 - [c94]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements specification and analysis of secure systems. WER 2014 - [c93]Eduardo B. Fernández, Raúl Monge:
A security reference architecture for cloud systems. WICSA Companion 2014: 3:1-3:5 - [i2]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). CoRR abs/1409.6608 (2014) - 2013
- [j37]Keiko Hashizume, David Garcia Rosado, Eduardo Fernández-Medina, Eduardo B. Fernández:
An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1): 5:1-5:13 (2013) - 2012
- [j35]Eduardo B. Fernández, Ola Ajaj, Ingrid A. Buckley, Nelly Delessy-Gassant, Keiko Hashizume, Maria M. Larrondo-Petrie:
A Survey of Patterns for Web Services Security and Reliability Standards. Future Internet 4(2): 430-450 (2012) - 2011
- [c90]Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Michael VanHilst:
An Approach to Model-based Development of Secure and Reliable Systems. ARES 2011: 260-265 - [c89]Ingrid A. Buckley, Eduardo B. Fernández:
Enumerating Software Failures to Build Dependable Distributed Applications. HASE 2011: 120-123 - [c88]Ingrid A. Buckley, Eduardo B. Fernández, Marco Anisetti, Claudio A. Ardagna, Seyed Masoud Sadjadi, Ernesto Damiani:
Towards Pattern-Based Reliability Certification of Services. OTM Conferences (2) 2011: 560-576 - [c87]Eduardo B. Fernández, Nobukazu Yoshioka:
Two patterns for distributed systems: enterprise service bus (ESB) and distributed publish/subscribe. PLoP 2011: 8:1-8:10 - [c86]Zhen Jiang, Eduardo B. Fernández, Liang Cheng:
P2N: a pedagogical <u>p</u>attern for teaching computer <u>p</u>rogramming to <u>n</u>on-CS majors. PLoP 2011: 25:1-25:9 - [c85]Keiko Hashizume, Eduardo B. Fernández, Nobukazu Yoshioka:
Misuse Patterns for Cloud Computing. SEKE 2011: 683-686 - [i1]Xiaohong Yuan, Eduardo B. Fernández:
Patterns for Business-to-consumer E-Commerce Applications. CoRR abs/1108.3342 (2011) - 2010
- [c84]Michael Netter, Eduardo B. Fernández, Günther Pernul:
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. ARES 2010: 560-564 - [c83]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Michael VanHilst:
Measuring the Level of Security Introduced by Security Patterns. ARES 2010: 565-568 - [c82]Eduardo B. Fernández, María M. Larrondo-Petrie:
Designing Secure SCADA Systems Using Security Patterns. HICSS 2010: 1-8 - [c81]Anupama Sahu, Eduardo B. Fernández, Mihaela Cardei, Michael VanHilst:
A pattern for a sensor node. PLoP 2010: 7:1-7:7 - [c80]Michael Van Hilst, Eduardo B. Fernández:
A pattern system of underlying theories for process improvement. PLoP 2010: 8:1-8:24 - [c78]Ola Ajaj, Eduardo B. Fernández:
The WS-policy standard pattern. SugarLoafPLoP 2010: 4:1-4:12 - [p2]Eduardo B. Fernández, Carolina Marin, Maria M. Larrondo-Petrie:
Security Requirements for Social Networks in Web 2.0. Handbook of Social Network Technologies 2010: 569-582 - 2009
- [j30]Michael VanHilst, Eduardo B. Fernández, Fabrício A. Braz:
A Multi-Dimensional Classification for Users of Security Patterns. J. Res. Pract. Inf. Technol. 41(2): 87-118 (2009) - [j29]Juan C. Pelaez, Eduardo B. Fernández, María M. Larrondo-Petrie:
Misuse patterns in VoIP. Secur. Commun. Networks 2(6): 635-653 (2009) - [c77]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki:
Modeling Misuse Patterns. ARES 2009: 566-571 - [c75]Eduardo B. Fernández, Jie Wu, María M. Larrondo-Petrie, Yifeng Shao:
On building secure SCADA systems using security patterns. CSIIRW 2009: 17 - [c74]Hironori Washizaki, Eduardo B. Fernández, Katsuhisa Maruyama, Atsuto Kubo, Nobukazu Yoshioka:
Improving the Classification of Security Patterns. DEXA Workshops 2009: 165-170 - [c73]Miguel Solinas, Eduardo B. Fernández, Leandro Antonelli:
Embedding Security Patterns into a Domain Model. DEXA Workshops 2009: 176-180 - [c71]Keiko Hashizume, Eduardo B. Fernández, Shihong Huang:
Digital Signature with Hashing and XML Signature patterns. EuroPLoP 2009 - [c70]Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Jan Jürjens:
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). OOPSLA Companion 2009: 713-714 - [c69]Ingrid A. Buckley, Eduardo B. Fernández, Gustavo Rossi, Seyed Masoud Sadjadi:
Web Services Reliability Patterns. SEKE 2009: 4-9 - [r1]Jan Jürjens, Eduardo B. Fernández:
Secure Database Development. Encyclopedia of Database Systems 2009: 2528-2534 - 2008
- [c67]Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Atsuto Kubo, Yoshiaki Fukazawa:
Classifying Security Patterns. APWeb 2008: 342-347 - [c66]Eduardo B. Fernández, Mihai Fonoage, Michael VanHilst, Mirela Marta:
The Secure Three-Tier Architecture Pattern. CISIS 2008: 555-560 - [c65]Eduardo B. Fernández, Jan Jürjens, Nobukazu Yoshioka, Hironori Washizaki:
Incorporating Database Systems into a Secure Software Development Methodology. DEXA Workshops 2008: 310-314 - [c64]Fabrício A. Braz, Eduardo B. Fernández, Michael VanHilst:
Eliciting Security Requirements through Misuse Activities. DEXA Workshops 2008: 328-333 - [c62]Michael VanHilst, Eduardo B. Fernández, Fabrício A. Braz:
A Multi-Dimensional Classification for Users of Security Patterns. WOSIS 2008: 89-98 - [c61]Eduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie:
Patterns and Pattern Diagrams for Access Control. TrustBus 2008: 38-47 - 2007
- [j28]Bing Wu, Jie Wu, Eduardo B. Fernández, Mohammad Ilyas, Spyros S. Magliveras:
Secure and efficient key management in mobile ad hoc networks. J. Netw. Comput. Appl. 30(3): 937-954 (2007) - [j27]Eduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie:
Security Patterns for Voice over IP Networks. J. Softw. 2(2): 19-29 (2007) - [c60]Eduardo B. Fernández, Xiaohong Yuan:
Securing analysis patterns. ACM Southeast Regional Conference 2007: 288-293 - [c57]Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie:
Security Patterns for Physical Access Control Systems. DBSec 2007: 259-274 - [c56]Eduardo B. Fernández, Preethi Cholmondeley, Olaf Zimmermann:
Extending a Secure System Development Methodology to SOA. DEXA Workshops 2007: 749-754 - [c55]Eduardo B. Fernández, Michael VanHilst:
Patterns for WiMax security. EuroPLoP 2007: 707-720 - [c54]Juan C. Pelaez, Eduardo B. Fernández:
Patterns for VoIP Signaling Protocol Architectures. EuroPLoP 2007: 721-734 - [c53]Eduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie:
Attack Patterns: A New Forensic and Design Tool. IFIP Int. Conf. Digital Forensics 2007: 345-357 - [c51]Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger:
Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2 - 2006
- [c48]Eduardo B. Fernández, Michael VanHilst, María M. Larrondo-Petrie, Shihong Huang:
Defining Security Requirements Through Misuse Actions. IFIP Workshop on Advanced Software Engineering 2006: 123-137 - 2005
- [c46]Bing Wu, Jie Wu, Eduardo B. Fernández, Spyros S. Magliveras:
Secure and Efficient Key Management in Mobile Ad Hoc Networks. IPDPS 2005 - [c45]Eduardo B. Fernández, Saeed Rajput, Michael VanHilst, María M. Larrondo-Petrie:
Some Security Issues of Wireless Systems. ISSADS 2005: 388-396 - [c44]Eduardo B. Fernández, Tami Sorgente:
An analysis of modeling flaws in HL7 and JAHIS. SAC 2005: 216-223 - [c43]Eduardo B. Fernández, Tami Sorgente, María M. Larrondo-Petrie:
A UML-Based Methodology for Secure Systems: The Design Stage . WOSIS 2005: 207-216 - 2004
- [c42]Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul:
A Pattern System for Access Control. DBSec 2004: 235-249 - [c39]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). UML Satellite Activities 2004: 76-84 - 2003
- [c37]Xiaohong Yuan, Eduardo B. Fernández:
An Analysis Pattern for Course Management. EuroPLoP 2003: 899-912 - 2002
- [c36]Eduardo B. Fernández, Ying Liu:
The Account Analysis Pattern. EuroPLoP 2002: 477-484 - [c35]Eduardo B. Fernández, Fei Dai:
An Analysis Pattern for the Request and Allocation of Limited Resources. EuroPLoP 2002: 485-496 - 2000
- [c34]Eduardo B. Fernández, Xiaohong Yuan:
Semantic Analysis Patterns. ER 2000: 183-195 - 1999
- [c32]Massimo Ancona, Walter Cazzola, Eduardo B. Fernández:
Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks. Secure Internet Programming 1999: 35-49 - 1998
- [j26]Jie Wu, Eduardo B. Fernández, Donglai Dai:
Optimal Fault-Secure Scheduling. Comput. J. 41(4): 207-222 (1998) - [j25]Jie Wu, Eduardo B. Fernández, Yingqui Lo:
Embedding of Binomial Treas in Hypercubes with Link Faults. J. Parallel Distributed Comput. 54(1): 49-74 (1998) - [c31]Eduardo B. Fernández, Krishnakumar R. Nair:
An Abstract Authorization System for the Internet. DEXA Workshop 1998: 310-315 - [c30]Massimo Ancona, Walter Cazzola, Eduardo B. Fernández:
Reflective Authorization Systems. ECOOP Workshops 1998: 281 - [c29]Ke Huang, Jie Wu, Eduardo B. Fernández:
A Generalized Forward Recovery Checkpointing Scheme. IPPS/SPDP Workshops 1998: 623-643 - 1997
- [c27]Jie Wu, Eduardo B. Fernández, Yingquiu Luo:
Embedding of binomial trees in hypercubes with link faults. ICPP 1997: 96-99 - 1996
- [c26]Eduardo B. Fernández, Krishnakumar R. Nair, María M. Larrondo-Petrie, Yan Xu:
High-Level Security Issues in Multimedia/Hypertext Systems. Communications and Multimedia Security 1996: 13-24 - 1995
- [c25]Eduardo B. Fernández, Robert B. France, D. Wei:
A Formal Specification of an Authorization Model for Object-Oriented Databases. DBSec 1995: 95-110 - [c24]Haifeng Qian, Eduardo B. Fernández, Jie Wu:
A combined functional and object-oriented approach to software design. ICECCS 1995: 167-174 - [c23]Eduardo B. Fernández, Robert B. France:
Formal specification of real-time dependable systems. ICECCS 1995: 342-348 - 1994
- [j23]Jie Wu, Y. Wang, Eduardo B. Fernández:
A uniform approach to software and hardware fault tolerance. J. Syst. Softw. 26(2): 117-127 (1994) - [j22]Eduardo B. Fernández, Ehud Gudes, Haiyan Song:
A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 6(2): 275-292 (1994) - [j21]Jie Wu, Eduardo B. Fernández:
Using Petri Nets for the Design of Conversation Boundaries in Fault-Tolerant Software. IEEE Trans. Parallel Distributed Syst. 5(10): 1106-1112 (1994) - [c22]Eduardo B. Fernández, Jie Wu, Minjie H. Fernandez:
User Group Structures in Object-Oriented Database Authorization. DBSec 1994: 57-76 - 1993
- [j20]Jie Wu, Eduardo B. Fernández:
Broadcasting in faulty hypercubes. Microprocess. Microprogramming 39(1): 43-53 (1993) - [c21]Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes:
A Method-Based Authorization Model for Object-Oriented Databases. Security for Object-Oriented Systems 1993: 135-150 - [c20]Jie Wu, Yi-Min Wang, Eduardo B. Fernández:
A uniform approach to software and hardware fault tolerance. PDP 1993: 409-416 - [c19]Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernández:
A Model of Methods Access Authorization in Object-oriented Databases. VLDB 1993: 52-61 - 1992
- [j19]Jie Wu, Eduardo B. Fernández, Ruiguang Zhang:
Some extensions to the lattice model for computer security. Comput. Secur. 11(4): 357-369 (1992) - [c18]Jie Wu, Eduardo B. Fernández:
Broadcasting in Faulty Cube-Connected-Cycles with Minimum Recovery Time. CONPAR 1992: 833-834 - [c17]Jie Wu, Eduardo B. Fernández:
Reliable Broadcasting in Faulty Hypercube Computers. SRDS 1992: 122-129 - 1990
- [j17]Massimo Ancona, Gabriella Dodero, Vittoria Gianuzzi, Andrea Clematis, Eduardo B. Fernández:
A System Architecture for Fault Tolerance in Concurrent Software. Computer 23(10): 23-32 (1990) - [c16]Ehud Gudes, Haiyan Song, Eduardo B. Fernández:
Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. DBSec 1990: 85-98 - [c15]Jie Wu, Eduardo B. Fernández:
The Extended G-Network, a Fault-Tolerant Interconnection Network for the Multiprocessors. PARBASE / Architectures 1990: 250-259 - 1989
- [j14]Jie Wu, Eduardo B. Fernández:
A Simplification of a Conversation Design Scheme Using Petri Nets. IEEE Trans. Software Eng. 15(5): 658-660 (1989) - [c14]María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández:
Security Policies in Object-Oriented Databases. DBSec 1989: 257-268 - [c13]Eduardo B. Fernández, Ehud Gudes, Haiyan Song:
A Security Model for Object-Oriented Databases. S&P 1989: 110-115 - 1988
- [j13]Brenda M. Ozaki, Eduardo B. Fernández, Ehud Gudes:
Software fault tolerance in architectures with hierarchical protection levels. IEEE Micro 8(4): 30-43 (1988) - 1987
- [c12]Massimo Ancona, Andrea Clematis, Gabriella Dodero, Eduardo B. Fernández, Vittoria Gianuzzi:
A System Architecture for Software Fault Tolerance. Fehlertolerierende Rechensysteme 1987: 273-283
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-06 23:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint