Eduardo Fernández-Medina
https://orcid.org/0000-0003-2553-9320
https://www.wikidata.org/entity/Q57506876
https://d-nb.info/gnd/135832764
Antonio Santos-Olmo Parra
Luís Enrique Sanchez
David Garcia Rosado
Manuel A. Serrano
Carlos Blanco 0001
Haralambos Mouratidis
Eduardo Fernández-Medina
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals.
183808
2024
June
18
Frontiers Comput. Sci.
3
https://doi.org/10.1007/s11704-023-1582-6
db/journals/fcsc/fcsc18.html#ParraSRSBMF24
Manuel A. Serrano
Luis Enrique Sánchez
Antonio Santos-Olmo Parra
David Garcia Rosado
Carlos Blanco 0001
Vita Santa Barletta
Danilo Caivano
Eduardo Fernández-Medina
Minimizing incident response time in real-world scenarios using quantum computing.
163-192
2024
March
32
Softw. Qual. J.
1
https://doi.org/10.1007/s11219-023-09632-6
db/journals/sqj/sqj32.html#SerranoSPRBBCF24
Carlos Blanco 0001
David Garcia Rosado
Ángel Jesús Varela-Vaca
María Teresa Gómez-López
Eduardo Fernández-Medina
Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning.
100989
2023
December
24
Internet Things
https://doi.org/10.1016/j.iot.2023.100989
db/journals/iot/iot24.html#BlancoRVLF23
Luis Enrique Sánchez
Antonio Santos-Olmo Parra
Haralambos Mouratidis
Eduardo Fernández-Medina
New Frontiers in Security Risk Management.
61-67
2023
May - June
25
IT Prof.
3
https://doi.org/10.1109/MITP.2023.3251720
db/journals/itpro/itpro25.html#SanchezPMF23
Maria I. Ortega
Julio Moreno
Manuel A. Serrano
Eduardo Fernández-Medina
A Systematic Analysis of Security in Blockchain.
197-222
2023
39
J. Inf. Sci. Eng.
1
http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=191_2581
db/journals/jise/jise39.html#OrtegaMSF23
Manuel A. Serrano
Luis Enrique Sánchez Crespo
Antonio Santos-Olmo Parra
David Garcia Rosado
Carlos Blanco 0001
Eduardo Fernández-Medina
Towards a Quantum World in Cybersecurity Land.
2023
IS-EUD Workshops
https://ceur-ws.org/Vol-3408/short-s3-02.pdf
conf/iseud/2023w
db/conf/iseud/iseud2023w.html#SerranoCPRBF23
David Garcia Rosado
Antonio Santos-Olmo Parra
Luís Enrique Sanchez
Manuel A. Serrano
Carlos Blanco 0001
Haralambos Mouratidis
Eduardo Fernández-Medina
Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern.
103715
2022
142
Comput. Ind.
https://doi.org/10.1016/j.compind.2022.103715
https://www.wikidata.org/entity/Q114194112
db/journals/cii/cii142.html#RosadoPSSBMF22
Carlos Blanco 0001
Diego García-Saiz
David Garcia Rosado
Antonio Santos-Olmo Parra
Jesús Peral
Alejandro Maté
Juan Trujillo 0001
Eduardo Fernández-Medina
Security policies by design in NoSQL document databases.
103120
2022
65
J. Inf. Secur. Appl.
https://doi.org/10.1016/j.jisa.2022.103120
db/journals/istr/istr65.html#BlancoGRPPMTF22
Ángel Jesús Varela-Vaca
David Garcia Rosado
Luís Enrique Sanchez
María Teresa Gómez-López
Rafael M. Gasca
Eduardo Fernández-Medina
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems.
103524
2021
132
Comput. Ind.
https://doi.org/10.1016/j.compind.2021.103524
https://www.wikidata.org/entity/Q115062403
db/journals/cii/cii132.html#Varela-VacaRSLG21
David Garcia Rosado
Julio Moreno
Luís Enrique Sanchez
Antonio Santos-Olmo Parra
Manuel A. Serrano
Eduardo Fernández-Medina
MARISMA-BiDa pattern: Integrated risk analysis for big data.
102155
2021
102
Comput. Secur.
https://doi.org/10.1016/j.cose.2020.102155
https://www.wikidata.org/entity/Q115049601
db/journals/compsec/compsec102.html#RosadoMSPSF21
Julio Moreno
David Garcia Rosado
Luís Enrique Sanchez
Manuel A. Serrano
Eduardo Fernández-Medina
Security Reference Architecture for Cyber-Physical Systems (CPS).
609-634
2021
27
J. Univers. Comput. Sci.
6
https://doi.org/10.3897/jucs.68539
https://www.wikidata.org/entity/Q107468548
db/journals/jucs/jucs27.html#MorenoRSSF21
Alejandro Maté
Jesús Peral
Juan Trujillo 0001
Carlos Blanco 0001
Diego García-Saiz
Eduardo Fernández-Medina
Improving security in NoSQL document databases through model-driven modernization.
2209-2230
2021
63
Knowl. Inf. Syst.
8
https://doi.org/10.1007/s10115-021-01589-x
db/journals/kais/kais63.html#MatePTBGF21
Julio Moreno
Javier Gómez
Manuel A. Serrano
Eduardo B. Fernández
Eduardo Fernández-Medina
Application of security reference architecture to Big Data ecosystems in an industrial scenario.
1520-1538
2020
50
Softw. Pract. Exp.
8
https://doi.org/10.1002/spe.2829
db/journals/spe/spe50.html#MorenoGSFF20
Ángel Jesús Varela-Vaca
David Garcia Rosado
Luís Enrique Sanchez
María Teresa Gómez-López
Rafael M. Gasca
Eduardo Fernández-Medina
Definition and Verification of Security Configurations of Cyber-Physical Systems.
135-155
2020
CyberICPS/SECPRE/ADIoT@ESORICS
https://doi.org/10.1007/978-3-030-64330-0_9
conf/esorics/2020cicps
db/conf/esorics/cicps2020.html#Varela-VacaRSLG20
Julio Moreno
Eduardo B. Fernández
Manuel A. Serrano
Eduardo Fernández-Medina
Secure Development of Big Data Ecosystems.
96604-96619
2019
7
IEEE Access
https://doi.org/10.1109/ACCESS.2019.2929330
db/journals/access/access7.html#MorenoFSF19
Julio Moreno
Eduardo B. Fernández
Eduardo Fernández-Medina
Manuel A. Serrano
BlockBD: a security pattern to incorporate blockchain in big data ecosystems.
17:1-17:8
2019
EuroPLoP
https://doi.org/10.1145/3361149.3361166
conf/europlop/2019
db/conf/europlop/europlop2019.html#MorenoFFS19
Julio Moreno
Manuel A. Serrano
Eduardo Fernández-Medina
Modelado de Requisitos de Seguridad para Big Data.
515-522
2018
CIbSE
conf/cibse/2018
db/conf/cibse/cibse2018.html#MorenoSF18
Julio Moreno
Manuel A. Serrano
Eduardo Fernández-Medina
Eduardo B. Fernández
Towards a Security Reference Architecture for Big Data.
2018
DOLAP
https://ceur-ws.org/Vol-2062/paper04.pdf
conf/dolap/2018
db/conf/dolap/dolap2018.html#MorenoSFF18
Carlos Blanco 0001
Diego García-Saiz
Jesús Peral
Alejandro Maté
Alejandro Oliver
Eduardo Fernández-Medina
How the Conceptual Modelling Improves the Security on Document Databases.
497-504
2018
ER
https://doi.org/10.1007/978-3-030-00847-5_36
conf/er/2018
db/conf/er/er2018.html#BlancoGPMOF18
Julio Moreno
Eduardo B. Fernández
Eduardo Fernández-Medina
Manuel A. Serrano
A Security Pattern for Key-Value NoSQL Database Authorization.
12:1-12:4
2018
EuroPLoP
https://doi.org/10.1145/3282308.3282321
conf/europlop/2018
db/conf/europlop/europlop2018.html#MorenoFFS18
Carlos Blanco 0001
Eduardo Fernández-Medina
Juan Trujillo 0001
Data Warehouse Security.
2018
Encyclopedia of Database Systems (2nd ed.)
https://doi.org/10.1007/978-1-4614-8265-9_333
reference/db/2018
db/reference/db/d2.html#0001FT18
Luís Enrique Sanchez
Antonio Santos-Olmo Parra
Esther Álvarez
Monica Huerta
Sara Camacho
Eduardo Fernández-Medina
Development of an Expert System for the Evaluation of Students' Curricula on the Basis of Competencies.
2016
8
Future Internet
2
https://doi.org/10.3390/fi8020022
db/journals/fi/fi8.html#SanchezPAHCF16
22
Antonio Santos-Olmo Parra
Luís Enrique Sanchez
Ismael Caballero 0001
Sara Camacho
Eduardo Fernández-Medina
The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets.
2016
8
Future Internet
3
https://doi.org/10.3390/fi8030030
db/journals/fi/fi8.html#ParraSCCF16
30
Antonio Santos-Olmo Parra
Luís Enrique Sanchez
David Garcia Rosado
Eduardo Fernández-Medina
Mario Piattini
Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems.
2016
8
Future Internet
3
https://doi.org/10.3390/fi8030036
https://www.wikidata.org/entity/Q57378462
db/journals/fi/fi8.html#ParraSRFP16
36
Julio Moreno
Manuel A. Serrano
Eduardo Fernández-Medina
Main Issues in Big Data Security.
44
2016
8
Future Internet
3
https://doi.org/10.3390/fi8030044
https://www.wikidata.org/entity/Q114936879
db/journals/fi/fi8.html#MorenoSF16
Julio Moreno
Manuel A. Serrano
Eduardo Fernández-Medina
Securing Databases Using Big Data Technology.
93-102
2016
ICIQ
conf/iq/2016
db/conf/iq/iq2016.html#MorenoSF16
Oscar Rebollo
Daniel Mellado
Eduardo Fernández-Medina
ISGcloud: a Security Governance Framework for Cloud Computing.
2233-2254
2015
58
Comput. J.
10
https://doi.org/10.1093/comjnl/bxu141
https://www.wikidata.org/entity/Q115000166
db/journals/cj/cj58.html#RebolloMF15
Carlos Blanco 0001
Eduardo Fernández-Medina
Juan Trujillo 0001
Modernizing Secure OLAP Applications with a Model-Driven Approach.
2351-2367
2015
58
Comput. J.
10
https://doi.org/10.1093/comjnl/bxu070
db/journals/cj/cj58.html#BlancoFT15
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Juan Trujillo 0001
An MDA approach for developing secure OLAP applications: Metamodels and transformations.
541-565
2015
12
Comput. Sci. Inf. Syst.
2
https://doi.org/10.2298/CSIS140617007B
db/journals/comsis/comsis12.html#BlancoGFT15
Oscar Rebollo
Daniel Mellado
Eduardo Fernández-Medina
Haralambos Mouratidis
Empirical evaluation of a cloud computing information security governance framework.
44-57
2015
58
Inf. Softw. Technol.
https://doi.org/10.1016/j.infsof.2014.10.003
https://www.wikidata.org/entity/Q59277674
db/journals/infsof/infsof58.html#RebolloMFM15
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Juan Trujillo 0001
An architecture for automatically developing secure OLAP applications from models.
1-16
2015
59
Inf. Softw. Technol.
https://doi.org/10.1016/j.infsof.2014.10.008
https://www.wikidata.org/entity/Q121009936
db/journals/infsof/infsof59.html#BlancoGFT15
Luis Márquez Alcañiz
David Garcia Rosado
Haralambos Mouratidis
Daniel Mellado
Eduardo Fernández-Medina
A Framework for Secure Migration Processes of Legacy Systems to the Cloud.
507-517
2015
CAiSE Workshops
https://doi.org/10.1007/978-3-319-19243-7_46
conf/caise/2015w
db/conf/caise/caisews2015.html#AlcanizRMMF15
Nikolaos Argyropoulos
Luis Márquez Alcañiz
Haralambos Mouratidis
Andrew Fish
David Garcia Rosado
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Eliciting Security Requirements for Business Processes of Legacy Systems.
91-107
2015
PoEM
https://doi.org/10.1007/978-3-319-25897-3_7
conf/ifip8-1/2015
db/conf/ifip8-1/poem2015.html#ArgyropoulosAMF15
Shaun Shei
Luis Márquez Alcañiz
Haralambos Mouratidis
Aidan J. Delaney
David Garcia Rosado
Eduardo Fernández-Medina
Modelling secure cloud systems based on system requirements.
19-24
2015
ESPRE
https://doi.org/10.1109/ESPRE.2015.7330163
https://doi.ieeecomputersociety.org/10.1109/ESPRE.2015.7330163
conf/re/2015espre
db/conf/re/espre2015.html#SheiAMDRF15
Daniel Mellado
Haralambos Mouratidis
Eduardo Fernández-Medina
Secure Tropos framework for software product lines requirements engineering.
711-722
2014
36
Comput. Stand. Interfaces
4
https://doi.org/10.1016/j.csi.2013.12.006
https://www.wikidata.org/entity/Q59277681
db/journals/csi/csi36.html#MelladoMF14
Santiago Moral-García
Santiago Moral-Rubio
Eduardo B. Fernández
Eduardo Fernández-Medina
Enterprise security pattern: A model-driven architecture instance.
748-758
2014
36
Comput. Stand. Interfaces
4
https://doi.org/10.1016/j.csi.2013.12.009
https://www.wikidata.org/entity/Q115045054
db/journals/csi/csi36.html#Moral-GarciaMFF14
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Juan Trujillo 0001
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications.
79-106
2014
20
J. Univers. Comput. Sci.
2
https://doi.org/10.3217/jucs-020-02-0079
db/journals/jucs/jucs20.html#BlancoGFT14
Santiago Moral-García
Santiago Moral-Rubio
David Garcia Rosado
Eduardo B. Fernández
Eduardo Fernández-Medina
Enterprise security pattern: a new type of security pattern.
1670-1690
2014
7
Secur. Commun. Networks
11
https://doi.org/10.1002/sec.863
db/journals/scn/scn7.html#Moral-GarciaMRFF14
Luis Márquez Alcañiz
David Garcia Rosado
Daniel Mellado
Eduardo Fernández-Medina
Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study.
26-37
2014
WOSIS
https://doi.org/10.5220/0004979900260037
conf/sis/2014
db/conf/sis/wosis2014.html#AlcanizRMF14
Belén Vela
Jose-Norberto Mazón
Carlos Blanco 0001
Eduardo Fernández-Medina
Juan Trujillo 0001
Esperanza Marcos
Development of Secure XML Data Warehouses with QVT.
1651-1677
2013
55
Inf. Softw. Technol.
9
https://doi.org/10.1016/j.infsof.2013.03.003
db/journals/infsof/infsof55.html#VelaMBFTM13
Keiko Hashizume
David Garcia Rosado
Eduardo Fernández-Medina
Eduardo B. Fernández
An analysis of security issues for cloud computing.
2013
5:1-5:13
4
J. Internet Serv. Appl.
1
https://doi.org/10.1186/1869-0238-4-5
https://www.wikidata.org/entity/Q59317603
db/journals/jisa/jisa4.html#HashizumeRFF13
Belén Vela
Carlos Blanco 0001
Eduardo Fernández-Medina
Esperanza Marcos
A practical application of our MDD approach for modeling secure XML data warehouses.
899-925
2012
52
Decis. Support Syst.
4
https://doi.org/10.1016/j.dss.2011.11.008
db/journals/dss/dss52.html#VelaBFM12
David Garcia Rosado
Rafael Gómez
Daniel Mellado
Eduardo Fernández-Medina
Security Analysis in the Migration to Cloud Environments.
469-487
2012
4
Future Internet
2
https://doi.org/10.3390/fi4020469
db/journals/fi/fi4.html#RosadoGMF12
David Garcia Rosado
Luís Enrique Sanchez
Eduardo Fernández-Medina
Jan Jürjens
Security in Information Systems: New Challenges and Opportunities.
728-731
2012
18
J. Univers. Comput. Sci.
6
http://www.jucs.org/jucs_18_6/security_in_information_systems
db/journals/jucs/jucs18.html#RosadoSFJ12
Oscar Rebollo
Daniel Mellado
Eduardo Fernández-Medina
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment.
798-815
2012
18
J. Univers. Comput. Sci.
6
https://doi.org/10.3217/jucs-018-06-0798
db/journals/jucs/jucs18.html#RebolloMF12
Ismael Caballero 0001
Luís Enrique Sanchez
Alberto Freitas
Eduardo Fernández-Medina
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management.
1703-720
2012
18
J. Univers. Comput. Sci.
12
https://doi.org/10.3217/jucs-018-12-1703
db/journals/jucs/jucs18.html#CaballeroSFF12
Carlos Blanco 0001
Joaquín Lasheras
Eduardo Fernández-Medina
Rafael Valencia-García
José Ambrosio Toval Álvarez
Basis for an integrated security ontology according to a systematic review of existing proposals.
372-388
2011
33
Comput. Stand. Interfaces
4
https://doi.org/10.1016/j.csi.2010.12.002
https://www.wikidata.org/entity/Q60584371
db/journals/csi/csi33.html#BlancoLFVA11
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Secure business process model specification through a UML 2.0 activity diagram profile.
446-465
2011
51
Decis. Support Syst.
3
https://doi.org/10.1016/j.dss.2011.01.018
https://www.wikidata.org/entity/Q57378727
db/journals/dss/dss51.html#RodriguezFTP11
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems.
243-254
2011
94-D
IEICE Trans. Inf. Syst.
2
https://doi.org/10.1587/transinf.E94.D.243
http://search.ieice.org/bin/summary.php?id=e94-d_2_243
db/journals/ieicet/ieicet94d.html#RosadoFL11
Anthony Marcus
Mihaela Cardei
Ionut Cardei
Eduardo Fernández-Medina
Fulvio Frati
Ernesto Damiani
A Pattern for Web-based WSN Monitoring (Invited Paper).
393-399
2011
6
J. Commun.
5
https://doi.org/10.4304/jcm.6.5.393-399
db/journals/jcm/jcm6.html#MarcusCCFFD11
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
Mario Piattini
Systematic design of secure Mobile Grid systems.
1168-1183
2011
34
J. Netw. Comput. Appl.
4
https://doi.org/10.1016/j.jnca.2011.01.001
https://www.wikidata.org/entity/Q57378735
db/journals/jnca/jnca34.html#RosadoFLP11
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
Security services architecture for Secure Mobile Grid Systems.
240-258
2011
57
J. Syst. Archit.
3
https://doi.org/10.1016/j.sysarc.2010.05.009
db/journals/jsa/jsa57.html#RosadoFL11
Roberto Ortiz
Javier Garzás
Eduardo Fernández-Medina
Analysis of Application of Security Patterns to Build Secure Systems.
652-659
2011
CAiSE Workshops
https://doi.org/10.1007/978-3-642-22056-2_66
conf/caise/2011w
db/conf/caise/caisews2011.html#OrtizGF11
Oscar Rebollo
Daniel Mellado
Eduardo Fernández-Medina
A Comparative Review of Cloud Security Proposals with ISO/IEC 27002.
3-12
2011
WOSIS
conf/sis/2011
db/conf/sis/wosis2011.html#RebolloMF11
Santiago Moral-García
Santiago Moral-Rubio
Eduardo Fernández-Medina
Security Pattern Mining: Systematic Review and Proposal.
13-24
2011
WOSIS
conf/sis/2011
db/conf/sis/wosis2011.html#Moral-GarciaMF11
Roberto Ortiz
Santiago Moral-Rubio
Javier Garzás
Eduardo Fernández-Medina
Towards a Pattern-based Security Methodology to Build Secure Information Systems.
59-69
2011
WOSIS
conf/sis/2011
db/conf/sis/wosis2011.html#OrtizMGF11
Antonio Santos-Olmo Parra
Luís Enrique Sanchez
Eduardo Fernández-Medina
Mario Piattini
Desirable Characteristics for an ISMS oriented to SMEs.
151-158
2011
WOSIS
conf/sis/2011
db/conf/sis/wosis2011.html#ParraSFP11
Angel Gallego
Antonio Santos-Olmo Parra
Luís Enrique Sanchez
Eduardo Fernández-Medina
Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs.
159-166
2011
WOSIS
conf/sis/2011
db/conf/sis/wosis2011.html#GallegoPSF11
Daniel Mellado
Carlos Blanco 0001
Luís Enrique Sanchez
Eduardo Fernández-Medina
A systematic review of security requirements engineering.
153-165
2010
32
Comput. Stand. Interfaces
4
https://doi.org/10.1016/j.csi.2010.01.006
db/journals/csi/csi32.html#MelladoBSF10
Miguel A. Martínez 0002
Joaquín Lasheras
Eduardo Fernández-Medina
José Ambrosio Toval Álvarez
Mario Piattini
A Personal Data Audit Method through Requirements Engineering.
166-178
2010
32
Comput. Stand. Interfaces
4
https://doi.org/10.1016/j.csi.2010.01.001
https://www.wikidata.org/entity/Q57378747
db/journals/csi/csi32.html#MartinezLFAP10
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Defining and transforming security rules in an MDA approach for DWs.
116-133
2010
5
Int. J. Bus. Intell. Data Min.
2
https://doi.org/10.1504/IJBIDM.2010.031283
https://www.wikidata.org/entity/Q57378809
db/journals/ijbidm/ijbidm5.html#BlancoGFTP10
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
Mario Piattini
Analysis of Secure Mobile Grid Systems: A systematic approach.
517-536
2010
52
Inf. Softw. Technol.
5
https://doi.org/10.1016/j.infsof.2010.01.002
https://www.wikidata.org/entity/Q57378795
db/journals/infsof/infsof52.html#RosadoFLP10
Alfonso Rodríguez 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Mario Piattini
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach.
945-971
2010
52
Inf. Softw. Technol.
9
https://doi.org/10.1016/j.infsof.2010.03.015
https://www.wikidata.org/entity/Q57378843
db/journals/infsof/infsof52.html#RodriguezGFP10
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Security requirements engineering framework for software product lines.
1094-1117
2010
52
Inf. Softw. Technol.
10
https://doi.org/10.1016/j.infsof.2010.05.007
https://www.wikidata.org/entity/Q57378841
db/journals/infsof/infsof52.html#MelladoFP10
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
Mario Piattini
Developing a Secure Mobile Grid System through a UML Extension.
2333-2352
2010
16
J. Univers. Comput. Sci.
17
https://doi.org/10.3217/jucs-016-17-2333
db/journals/jucs/jucs16.html#RosadoFLP10
Luís Enrique Sanchez
Carlos Ruiz
Eduardo Fernández-Medina
Mario Piattini
Managing the Asset Risk of SMEs.
422-429
2010
ARES
https://doi.org/10.1109/ARES.2010.52
https://doi.ieeecomputersociety.org/10.1109/ARES.2010.52
https://www.wikidata.org/entity/Q57378821
conf/IEEEares/2010
db/conf/IEEEares/ares2010.html#SanchezRFP10
Luís Enrique Sanchez
Antonio Santos-Olmo Parra
Eduardo Fernández-Medina
Mario Piattini
Security Culture in Small and Medium-Size Enterprise.
315-324
2010
CENTERIS (2)
https://doi.org/10.1007/978-3-642-16419-4_32
https://www.wikidata.org/entity/Q57378837
conf/centeris/2010-2
db/conf/centeris/centeris2010-2.html#SanchezPFP10
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
A comparison of software design security metrics.
236-242
2010
ECSA Companion Volume
https://doi.org/10.1145/1842752.1842797
https://www.wikidata.org/entity/Q57378749
conf/ecsa/2010c
db/conf/ecsa/ecsa2010c.html#MelladoFP10
Belén Vela
Carlos Blanco 0001
Eduardo Fernández-Medina
Esperanza Marcos
Model driven development of secure XML data warehouses: a case study.
2010
EDBT/ICDT Workshops
https://doi.org/10.1145/1754239.1754251
conf/edbtw/2010
db/conf/edbtw/edbtw2010.html#VelaBFM10
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
A Study of Security Approaches for the Development of Mobile Grid Systems.
133-138
2010
ICSOFT (1)
conf/icsoft/2010-1
db/conf/icsoft/icsoft2010-1.html#RosadoFL10
Carlos Gutiérrez
David Garcia Rosado
Eduardo Fernández-Medina
The practical application of a process for eliciting and designing security in web service systems.
143-143
2010
JISBD
conf/jisbd/2010
db/conf/jisbd/jisbd2010.html#GutierrezRF10
Roberto Ortiz
Santiago Moral-García
Santiago Moral-Rubio
Belén Vela
Javier Garzás
Eduardo Fernández-Medina
Applicability of Security Patterns.
672-684
2010
OTM Conferences (1)
https://doi.org/10.1007/978-3-642-16934-2_49
conf/otm/2010-1
db/conf/otm/otm2010-1.html#OrtizMMVGF10
Carlos Blanco 0001
Eduardo Fernández-Medina
Juan Trujillo 0001
Jan Jürjens
Towards the Secure Modelling of OLAP Users' Behaviour.
101-112
2010
Secure Data Management
https://doi.org/10.1007/978-3-642-15546-8_8
conf/sdmw/2010
db/conf/sdmw/sdmw2010.html#BlancoFTJ10
Luís Enrique Sanchez
Antonio Santos-Olmo Parra
Eduardo Fernández-Medina
Mario Piattini
Building ISMS through the Reuse of Knowledge.
190-201
2010
TrustBus
https://doi.org/10.1007/978-3-642-15152-1_17
https://www.wikidata.org/entity/Q57378807
conf/trustbus/2010
db/conf/trustbus/trustbus2010.html#SanchezPFP10
Eduardo Fernández-Medina
Alfonso Rodríguez 0001
Mariemma Yague
Guest Editorial.
85
2009
41
J. Res. Pract. Inf. Technol.
2
http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT41/JRPIT41.2.85.pdf
db/journals/acj/acj41.html#Fernandez-MedinaRY09
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
David Garcia Rosado
Eduardo Fernández-Medina
Juan Trujillo 0001
Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services.
135-154
2009
41
J. Res. Pract. Inf. Technol.
2
http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT41/JRPIT41.2.135.pdf
db/journals/acj/acj41.html#BlancoGRFT09
Juan Trujillo 0001
Emilio Soler
Eduardo Fernández-Medina
Mario Piattini
A UML 2.0 profile to define security requirements for Data Warehouses.
969-983
2009
31
Comput. Stand. Interfaces
5
https://doi.org/10.1016/j.csi.2008.09.040
https://www.wikidata.org/entity/Q57378861
db/journals/csi/csi31.html#TrujilloSFP09
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
Mario Piattini
Obtaining Security Requirements for a Mobile Grid System.
1-17
2009
1
Int. J. Grid High Perform. Comput.
3
https://doi.org/10.4018/jghpc.2009070101
db/journals/ijghpc/ijghpc1.html#RosadoFLP09
Eduardo Fernández-Medina
Jan Jürjens
Juan Trujillo 0001
Sushil Jajodia
Model-Driven Development for secure information systems.
809-814
2009
51
Inf. Softw. Technol.
5
https://doi.org/10.1016/j.infsof.2008.05.010
https://www.wikidata.org/entity/Q122395026
db/journals/infsof/infsof51.html#Fernandez-MedinaJTJ09
Juan Trujillo 0001
Emilio Soler
Eduardo Fernández-Medina
Mario Piattini
An engineering process for developing Secure Data Warehouses.
1033-1051
2009
51
Inf. Softw. Technol.
6
https://doi.org/10.1016/j.infsof.2008.12.003
https://www.wikidata.org/entity/Q57378874
db/journals/infsof/infsof51.html#TrujilloSFP09
Carlos Gutiérrez
David Garcia Rosado
Eduardo Fernández-Medina
The practical application of a process for eliciting and designing security in web service systems.
1712-1738
2009
51
Inf. Softw. Technol.
12
https://doi.org/10.1016/j.infsof.2009.05.004
https://www.wikidata.org/entity/Q113442205
db/journals/infsof/infsof51.html#GutierrezRF09
Emilio Soler
Juan Trujillo 0001
Carlos Blanco 0001
Eduardo Fernández-Medina
Designing Secure Data Warehouses by Using MDA and QVT.
1607-1641
2009
15
J. Univers. Comput. Sci.
8
https://doi.org/10.3217/jucs-015-08-1607
db/journals/jucs/jucs15.html#SolerTBF09
Eduardo Fernández-Medina
Alfonso Rodríguez 0001
Security in Information Systems: New Advances and Tendencies.
2912-2915
2009
15
J. Univers. Comput. Sci.
15
http://www.jucs.org/jucs_15_15/security_in_information_systems
db/journals/jucs/jucs15.html#Fernandez-MedinaR09
Daniel Mellado
Jesús Rodríguez
Eduardo Fernández-Medina
Mario Piattini
Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering.
224-231
2009
ARES
https://doi.org/10.1109/ARES.2009.23
https://doi.ieeecomputersociety.org/10.1109/ARES.2009.23
https://www.wikidata.org/entity/Q57378894
conf/IEEEares/2009
db/conf/IEEEares/ares2009.html#MelladoRFP09
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Including Security Rules Support in an MDA Approach for Secure DWs.
516-521
2009
ARES
https://doi.org/10.1109/ARES.2009.67
https://doi.ieeecomputersociety.org/10.1109/ARES.2009.67
https://www.wikidata.org/entity/Q57378928
conf/IEEEares/2009
db/conf/IEEEares/ares2009.html#BlancoGFTP09
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs.
528-533
2009
ARES
https://doi.org/10.1109/ARES.2009.68
https://doi.ieeecomputersociety.org/10.1109/ARES.2009.68
https://www.wikidata.org/entity/Q57378885
conf/IEEEares/2009
db/conf/IEEEares/ares2009.html#BlancoGFTP09a
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros.
388-393
2009
CIbSE
conf/cibse/2009
db/conf/cibse/cibse2009.html#RosadoFL09
Carlos Blanco 0001
Ricardo Pérez-Castillo
Arnulfo Hernández
Eduardo Fernández-Medina
Juan Trujillo 0001
Towards a Modernization Process for Secure Data Warehouses.
24-35
2009
DaWaK
https://doi.org/10.1007/978-3-642-03730-6_3
conf/dawak/2009
db/conf/dawak/dawak2009.html#BlancoPHFT09
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application.
126-136
2009
ER Workshops
https://doi.org/10.1007/978-3-642-04947-7_16
conf/er/2009w
db/conf/er/erw2009.html#RosadoFL09
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
Reusable security use cases for mobile grid environments.
1-8
2009
SESS@ICSE
https://doi.org/10.1109/IWSESS.2009.5068452
https://doi.ieeecomputersociety.org/10.1109/IWSESS.2009.5068452
conf/icse/2009sess
db/conf/icse/sess2009.html#RosadoFL09
Carlos Blanco 0001
Eduardo Fernández-Medina
Juan Trujillo 0001
Reingeniería sobre Almacenes de Datos Seguros aplicando ADM.
146-157
2009
JISBD
conf/jisbd/2009
db/conf/jisbd/jisbd2009.html#BlancoFT09
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Towards security requirements management for software product lines: a security domain requirements engineering process.
267-267
2009
JISBD
conf/jisbd/2009
db/conf/jisbd/jisbd2009.html#MelladoFP09
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros.
331-342
2009
JISBD
conf/jisbd/2009
db/conf/jisbd/jisbd2009.html#RosadoFL09
Luís Enrique Sanchez
Antonio Santos-Olmo Parra
Eduardo Fernández-Medina
Mario Piattini
MMSM-SME: Methodology for the Management of Security and its Maturity in SME.
67-78
2009
WOSIS
conf/sis/2009
db/conf/sis/wosis2009.html#SanchezPFP09
Rodolfo Villarroel
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
An MDA Compliant Approach for Designing Secure Data Warehouses.
637-647
2009
books/igi/Erickson2009
Database Technologies: Concepts, Methodologies, Tools, and Applications
http://www.igi-global.com/Bookstore/Chapter.aspx?TitleId=7935
db/books/collections/Erickson2009.html#VillarroelFTP09
Eduardo Fernández-Medina
Manu Malek
Javier Hernando
SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
2009
SECRYPT
978-989-674-005-4
INSTICC Press
db/conf/secrypt/secrypt2009.html
Alfonso Rodríguez 0001
Mariemma Inmaculada Yagüe del Valle
Eduardo Fernández-Medina
Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009
978-989-8111-91-3
INSTICC Press
WOSIS
2009
db/conf/sis/wosis2009.html
Carlos Blanco 0001
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Data Warehouse Security.
675-679
2009
Encyclopedia of Database Systems
https://doi.org/10.1007/978-0-387-39940-9_333
reference/db/2009
db/reference/db/d.html#BlancoFTP09
Eduardo Fernández-Medina
Mariemma Inmaculada Yagüe del Valle
State of standards in the information systems security area.
339-340
2008
30
Comput. Stand. Interfaces
6
https://doi.org/10.1016/j.csi.2008.03.001
db/journals/csi/csi30.html#Fernandez-MedinaV08
Emilio Soler
Juan Trujillo 0001
Eduardo Fernández-Medina
Mario Piattini
Building a secure star schema in data warehouses by an extension of the relational package from CWM.
341-350
2008
30
Comput. Stand. Interfaces
6
https://doi.org/10.1016/j.csi.2008.03.002
https://www.wikidata.org/entity/Q57379013
db/journals/csi/csi30.html#SolerTFP08
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Towards security requirements management for software product lines: A security domain requirements engineering process.
361-371
2008
30
Comput. Stand. Interfaces
6
https://doi.org/10.1016/j.csi.2008.03.004
https://www.wikidata.org/entity/Q57379085
db/journals/csi/csi30.html#MelladoFP08
Carlos Blanco 0001
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
How to implement multidimensional security into OLAP tools.
255-276
2008
3
Int. J. Bus. Intell. Data Min.
3
https://doi.org/10.1504/IJBIDM.2008.022136
https://www.wikidata.org/entity/Q57379038
db/journals/ijbidm/ijbidm3.html#BlancoFTP08
Emilio Soler
Veronika Stefanov
Jose-Norberto Mazón
Juan Trujillo 0001
Eduardo Fernández-Medina
Mario Piattini
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements.
104-111
2008
ARES
https://doi.org/10.1109/ARES.2008.86
https://doi.ieeecomputersociety.org/10.1109/ARES.2008.86
https://www.wikidata.org/entity/Q57379083
conf/IEEEares/2008
db/conf/IEEEares/ares2008.html#SolerSMTFP08
David Garcia Rosado
Eduardo Fernández-Medina
Javier López 0001
Mario Piattini
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices.
136-143
2008
ARES
https://doi.org/10.1109/ARES.2008.52
https://doi.ieeecomputersociety.org/10.1109/ARES.2008.52
https://www.wikidata.org/entity/Q57379059
conf/IEEEares/2008
db/conf/IEEEares/ares2008.html#RosadoFLP08
Carlos Blanco 0001
Joaquín Lasheras
Rafael Valencia-García
Eduardo Fernández-Medina
José Ambrosio Toval Álvarez
Mario Piattini
A Systematic Review and Comparison of Security Ontologies.
813-820
2008
ARES
https://doi.org/10.1109/ARES.2008.33
https://doi.ieeecomputersociety.org/10.1109/ARES.2008.33
https://www.wikidata.org/entity/Q57378998
conf/IEEEares/2008
db/conf/IEEEares/ares2008.html#BlancoLVFAP08
Carlos Blanco 0001
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Implementing Multidimensional Security into OLAP Tools.
1248-1253
2008
ARES
https://doi.org/10.1109/ARES.2008.179
https://doi.ieeecomputersociety.org/10.1109/ARES.2008.179
https://www.wikidata.org/entity/Q57379043
conf/IEEEares/2008
db/conf/IEEEares/ares2008.html#BlancoFTP08
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Security Requirements Variability for Software Product Lines.
1413-1420
2008
ARES
https://doi.org/10.1109/ARES.2008.165
https://doi.ieeecomputersociety.org/10.1109/ARES.2008.165
https://www.wikidata.org/entity/Q57379069
conf/IEEEares/2008
db/conf/IEEEares/ares2008.html#MelladoFP08
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Aplicando un Proceso de Ingeniería de Requisitos de Seguridad de Dominio para Líneas de Producto Software.
141-154
2008
CIbSE
conf/cibse/2008
db/conf/cibse/cibse2008.html#MelladoFP08
Emilio Soler
Veronika Stefanov
Jose-Norberto Mazón
Juan Trujillo 0001
Eduardo Fernández-Medina
Mario Piattini
Modelado de Requisitos de Seguridad para Almacenes de Datos.
281-294
2008
CIbSE
conf/cibse/2008
db/conf/cibse/cibse2008.html#SolerSMTFP08
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models.
103-112
2008
ER Workshops
https://doi.org/10.1007/978-3-540-87991-6_15
conf/er/2008w
db/conf/er/erw2008.html#RodriguezFP08
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Security Requirements Management in Software Product Line Engineering.
250-263
2008
ICETE (Selected Papers)
https://doi.org/10.1007/978-3-642-05197-5_18
https://www.wikidata.org/entity/Q57378965
conf/icete/2008s
db/conf/icete/icete2008.html#MelladoFP08
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Security Requirements Engineering Process for Software Product Lines: A Case Study.
1-6
2008
ICSEA
https://doi.org/10.1109/ICSEA.2008.14
https://doi.ieeecomputersociety.org/10.1109/ICSEA.2008.14
https://www.wikidata.org/entity/Q57379066
conf/icsea/2008
db/conf/icsea/icsea2008.html#MelladoFP08
David Garcia Rosado
Eduardo Fernández-Medina
Mario Piattini
Javier López 0001
Engineering Process Based on Grid Use Cases for Mobile Grid Systems.
146-151
2008
ICSOFT (SE/MUSE/GSDCA)
conf/icsoft/2008-2
db/conf/icsoft/icsoft2008-2.html#RosadoFPL08
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Gestión de la Variabilidad de los Requisitos de Seguridad en Líneas de Producto.
39-50
2008
JISBD
conf/jisbd/2008
db/conf/jisbd/jisbd2008.html#MelladoFP08
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Hacia la Implementación Automática de Almacenes de Datos Seguros en Herramientas OLAP.
205-216
2008
JISBD
conf/jisbd/2008
db/conf/jisbd/jisbd2008.html#BlancoGFTP08
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Construcción de Modelos Lógicos Multidimensionales Seguros para su Implementación en Herramientas OLAP Mediante MDA y QVT.
373-378
2008
JISBD
conf/jisbd/2008
db/conf/jisbd/jisbd2008.html#BlancoGFTP08a
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Automatic Generation of Secure Multidimensional Code for Data Warehouses by using QVT Transformations: an MDA Approach.
2008
MODSEC@MoDELS
https://ceur-ws.org/Vol-413/paper22.pdf
conf/models/2008modsec
db/conf/models/modsec2008.html#BlancoGFTP08
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach.
1052-1068
2008
OTM Conferences (2)
https://doi.org/10.1007/978-3-540-88873-4_9
conf/otm/2008-2
db/conf/otm/otm2008-2.html#BlancoGFTP08
Luís Enrique Sanchez
Daniel Villafranca
Eduardo Fernández-Medina
Mario Piattini
Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas.
391-398
2008
SECRYPT
conf/secrypt/2008
db/conf/secrypt/secrypt2008.html#SanchezVFP08
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Security Requirements in Software Product Lines.
442-449
2008
SECRYPT
conf/secrypt/2008
db/conf/secrypt/secrypt2008.html#MelladoFP08
Carlos Blanco 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT.
38-48
2008
WOSIS
conf/sis/2008
db/conf/sis/wosis2008.html#BlancoGFTP08
Eduardo Fernández-Medina
Manu Malek
Javier Hernando
SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
2008
SECRYPT
978-989-8111-59-3
INSTICC Press
db/conf/secrypt/secrypt2008.html
Alfonso Rodríguez 0001
Mariemma Inmaculada Yagüe del Valle
Eduardo Fernández-Medina
Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008
978-989-8111-44-9
INSTICC Press
WOSIS
2008
db/conf/sis/wosis2008.html
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
A common criteria based security requirements engineering process for the development of secure information systems.
244-253
2007
29
Comput. Stand. Interfaces
2
https://doi.org/10.1016/j.csi.2006.04.002
https://www.wikidata.org/entity/Q57379105
db/journals/csi/csi29.html#MelladoFP07
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
An MDA. appproach to develop secure business processes through a UML 2.0 extension.
2007
22
Comput. Syst. Sci. Eng.
5
db/journals/csse/csse22.html#RodriguezFP07
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Model-driven multidimensional modeling of secure data warehouses.
374-389
2007
16
Eur. J. Inf. Syst.
4
https://doi.org/10.1057/palgrave.ejis.3000687
https://www.wikidata.org/entity/Q57379194
db/journals/ejis/ejis16.html#Fernandez-MedinaTP07
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
A BPMN Extension for the Modeling of Security Requirements in Business Processes.
745-752
2007
90-D
IEICE Trans. Inf. Syst.
4
https://doi.org/10.1093/ietisy/e90-d.4.745
https://www.wikidata.org/entity/Q57379101
db/journals/ieicet/ieicet90d.html#RodriguezFP07
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
Web Services-Based Security Requirement Elicitation.
1374-1387
2007
90-D
IEICE Trans. Inf. Syst.
9
https://doi.org/10.1093/ietisy/e90-d.9.1374
https://www.wikidata.org/entity/Q57379225
db/journals/ieicet/ieicet90d.html#GutierrezFP07
Eduardo Fernández-Medina
Juan Trujillo 0001
Rodolfo Villarroel
Mario Piattini
Developing secure data warehouses with a UML extension.
826-856
2007
32
Inf. Syst.
6
https://doi.org/10.1016/j.is.2006.07.003
https://www.wikidata.org/entity/Q57379158
db/journals/is/is32.html#Fernandez-MedinaTVP07
Emilio Soler
Juan Trujillo 0001
Eduardo Fernández-Medina
Mario Piattini
A Framework for the Development of Secure Data Warehouses based on MDA and QVT.
294-300
2007
ARES
https://doi.org/10.1109/ARES.2007.4
https://doi.ieeecomputersociety.org/10.1109/ARES.2007.4
https://www.wikidata.org/entity/Q57379111
conf/IEEEares/2007
db/conf/IEEEares/ares2007.html#SolerTFP07
Emilio Soler
Juan Trujillo 0001
Eduardo Fernández-Medina
Mario Piattini
A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses.
644-654
2007
ARES
https://doi.org/10.1109/ARES.2007.27
https://doi.ieeecomputersociety.org/10.1109/ARES.2007.27
https://www.wikidata.org/entity/Q57379122
conf/IEEEares/2007
db/conf/IEEEares/ares2007.html#SolerTFP07a
Emilio Soler
Juan Trujillo 0001
Eduardo Fernández-Medina
Mario Piattini
Application of QVT for the Development of Secure Data Warehouses: A case study.
829-836
2007
ARES
https://doi.org/10.1109/ARES.2007.39
https://doi.ieeecomputersociety.org/10.1109/ARES.2007.39
https://www.wikidata.org/entity/Q57379143
conf/IEEEares/2007
db/conf/IEEEares/ares2007.html#SolerTFP07b
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases.
408-415
2007
conf/bpm/2007
BPM
https://doi.org/10.1007/978-3-540-75183-0_30
db/conf/bpm/bpm2007.html#RodriguezFP07
Daniel Mellado
Moisés Rodríguez
Eduardo Fernández-Medina
Mario Piattini
Soporte Automatizado a la Ingeniería de Requisitos de Seguridad.
17-30
2007
CIbSE
conf/cibse/2007
db/conf/cibse/cibse2007.html#MelladoRFP07
Emilio Soler
Juan Trujillo 0001
Eduardo Fernández-Medina
Mario Piattini
Aplicación de QVT al Desarrollo de Almacenes de Datos Seguros: Un caso de Estudio.
209-222
2007
CIbSE
conf/cibse/2007
db/conf/cibse/cibse2007.html#SolerTFP07
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification.
106-115
2007
conf/er/2007w
ER Workshops
https://doi.org/10.1007/978-3-540-76292-8_13
db/conf/er/erw2007.html#RodriguezFP07
David Garcia Rosado
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
Defining Security Architectural Patterns Based on Viewpoints.
262-272
2007
conf/iccsa/2007-3
ICCSA (3)
https://doi.org/10.1007/978-3-540-74484-9_23
db/conf/iccsa/iccsa2007-3.html#RosadoGFP07
Eugenio Verbo
Ismael Caballero 0001
Eduardo Fernández-Medina
Mario Piattini
Data Quality in XML Databases - A Methodology for Semi-Structured Database Design Supporting Data Quality Issues.
117-122
2007
ICSOFT (ISDM/EHST/DC)
conf/icsoft/2007-3
db/conf/icsoft/icsoft2007-3.html#VerboCFP07
Luís Enrique Sanchez
Daniel Villafranca
Eduardo Fernández-Medina
Mario Piattini
Scmm-Tool - Tool for Computer Automation of the Information Security Management Systems.
311-318
2007
ICSOFT (SE)
conf/icsoft/2007-2
db/conf/icsoft/icsoft2007-2.html#SanchezVFP07
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
CIM to PIM Transformation: A Reality.
1239-1249
2007
conf/ifip8/2007-2
CONFENIS (2)
https://doi.org/10.1007/978-0-387-76312-5_50
https://www.wikidata.org/entity/Q57379015
db/conf/ifip8/confenis2007-2.html#RodriguezFP07
Emilio Soler
Juan Trujillo 0001
Eduardo Fernández-Medina
Mario Piattini
Una extensión del metamodelo relacional de CWM para representar Almacenes de Datos Seguros a nivel lógico.
83-92
2007
JISBD
http://www.sistedes.es/sistedes/pdf/2007/JISBD-07-soler-cwm.pdf
conf/jisbd/2007
db/conf/jisbd/jisbd2007.html#SolerTFP07
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Gestión Integral de Requisitos de Seguridad en Líneas de Producto Software.
177-186
2007
JISBD
http://www.sistedes.es/sistedes/pdf/2007/JISBD-07-mellado-lps.pdf
conf/jisbd/2007
db/conf/jisbd/jisbd2007.html#MelladoFP07
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Juan Trujillo 0001
Especificación de Procesos de Negocio Seguros a través de una extensión de UML 2.0.
336-345
2007
JISBD
http://www.sistedes.es/sistedes/pdf/2007/JISBD-07-rodriguez-negocio.pdf
conf/jisbd/2007
db/conf/jisbd/jisbd2007.html#RodriguezFPT07
Alfonso Rodríguez 0001
Ignacio García Rodríguez de Guzmán
Eduardo Fernández-Medina
Mario Piattini
Transformaciones QVT para la obtención de Clases de Análisis a partir de un Modelo de Proceso de Negocio Seguro.
361-366
2007
JISBD
http://www.sistedes.es/sistedes/pdf/2007/JISBD-07-rodriguez-qvt.pdf
conf/jisbd/2007
db/conf/jisbd/jisbd2007.html#RodriguezGFP07
Luís Enrique Sanchez
Daniel Villafranca
Eduardo Fernández-Medina
Mario Piattini
Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises.
355-362
2007
SECRYPT
conf/secrypt/2007
db/conf/secrypt/secrypt2007.html#SanchezVFP07
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines.
220-232
2007
conf/sis/2007
WOSIS
db/conf/sis/wosis2007.html#MelladoFP07
Emilio Soler
Juan Trujillo 0001
Eduardo Fernández-Medina
Mario Piattini
SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level.
245-256
2007
conf/sis/2007
WOSIS
db/conf/sis/wosis2007.html#SolerTFP07
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Analysis-Level Classes from Secure Business Processes Through Model Transformations.
104-114
2007
conf/trustbus/2007
TrustBus
https://doi.org/10.1007/978-3-540-74409-2_13
db/conf/trustbus/trustbus2007.html#RodriguezFP07
Javier Hernando
Eduardo Fernández-Medina
Manu Malek
SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
2007
SECRYPT
978-989-8111-12-8
INSTICC Press
db/conf/secrypt/secrypt2007.html
Mariemma Inmaculada Yagüe del Valle
Eduardo Fernández-Medina
Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007
978-972-8865-96-2
INSTICC Press
WOSIS
2007
db/conf/sis/wosis2007.html
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
Towards a Process for Web Services Security.
2006
38
J. Res. Pract. Inf. Technol.
1
http://www.jrpit.acs.org.au/jrpit/JRPITVolumes/JRPIT38/JRPIT38.1.57.pdf
db/journals/acj/acj38.html#GutierrezFP06
Rodolfo Villarroel
Eduardo Fernández-Medina
Mario Piattini
Juan Trujillo 0001
A UML 2.0/OCL Extension for Designing Secure Data Warehouses.
2006
38
J. Res. Pract. Inf. Technol.
1
http://www.jrpit.acs.org.au/jrpit/JRPITVolumes/JRPIT38/JRPIT38.1.31.pdf
db/journals/acj/acj38.html#VillarroelFP06
Eduardo Fernández-Medina
Juan Trujillo 0001
Rodolfo Villarroel
Mario Piattini
Access control and audit model for the multidimensional modeling of data warehouses.
1270-1289
2006
42
Decis. Support Syst.
3
https://doi.org/10.1016/j.dss.2005.10.008
https://www.wikidata.org/entity/Q57379260
db/journals/dss/dss42.html#Fernandez-MedinaTVP06
Eduardo Fernández-Medina
Carlos A. Gutiérrez
Mario Piattini
Developing web services security systems: a case study.
292-306
2006
2
Int. J. Web Eng. Technol.
4
https://doi.org/10.1504/IJWET.2006.010417
https://www.wikidata.org/entity/Q57379306
db/journals/ijwet/ijwet2.html#Fernandez-MedinaGP06
David Garcia Rosado
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
Security patterns and requirements for internet-based applications.
519-536
2006
16
Internet Res.
5
https://doi.org/10.1108/10662240610710996
https://www.wikidata.org/entity/Q57379399
db/journals/intr/intr16.html#RosadoGFP06
Belén Vela
Eduardo Fernández-Medina
Esperanza Marcos
Mario Piattini
Model driven development of secure XML databases.
22-27
2006
35
SIGMOD Rec.
3
https://doi.org/10.1145/1168092.1168095
https://www.wikidata.org/entity/Q57379333
db/journals/sigmod/sigmod35.html#VelaFMP06
David Garcia Rosado
Eduardo Fernández-Medina
Mario Piattini
Carlos Gutiérrez
A Study of Security Architectural Patterns.
358-365
2006
conf/IEEEares/2006
ARES
https://doi.org/10.1109/ARES.2006.18
https://doi.ieeecomputersociety.org/10.1109/ARES.2006.18
https://www.wikidata.org/entity/Q57379255
db/conf/IEEEares/ares2006.html#RosadoFPG06
Carlos Villarrubia
Eduardo Fernández-Medina
Mario Piattini
Quality of Password Management Policy.
544-550
2006
conf/IEEEares/2006
ARES
https://doi.org/10.1109/ARES.2006.102
https://doi.ieeecomputersociety.org/10.1109/ARES.2006.102
https://www.wikidata.org/entity/Q57379385
db/conf/IEEEares/ares2006.html#VillarrubiaFP06
Luís Enrique Sanchez
Daniel Villafranca
Eduardo Fernández-Medina
Mario Piattini
Practical Approach of a Secure Management System based on ISO/IEC 17799.
585-592
2006
conf/IEEEares/2006
ARES
https://doi.org/10.1109/ARES.2006.94
https://doi.ieeecomputersociety.org/10.1109/ARES.2006.94
https://www.wikidata.org/entity/Q57379381
db/conf/IEEEares/ares2006.html#SanchezVFP06
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements.
654-661
2006
conf/IEEEares/2006
ARES
https://doi.org/10.1109/ARES.2006.2
https://doi.ieeecomputersociety.org/10.1109/ARES.2006.2
https://www.wikidata.org/entity/Q57379240
db/conf/IEEEares/ares2006.html#MelladoFP06
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Security Requirement with a UML 2.0 Profile.
670-677
2006
conf/IEEEares/2006
ARES
https://doi.org/10.1109/ARES.2006.125
https://doi.ieeecomputersociety.org/10.1109/ARES.2006.125
https://www.wikidata.org/entity/Q57379404
db/conf/IEEEares/ares2006.html#RodriguezFP06
Rodolfo Villarroel
Emilio Soler
Eduardo Fernández-Medina
Mario Piattini
Juan Trujillo 0001
Representing levels of abstraction to facilitate the Secure Multidimensional Modeling.
678-684
2006
conf/IEEEares/2006
ARES
https://doi.org/10.1109/ARES.2006.109
https://doi.ieeecomputersociety.org/10.1109/ARES.2006.109
https://www.wikidata.org/entity/Q57379389
db/conf/IEEEares/ares2006.html#VillarroelSFPT06
Emilio Soler
Rodolfo Villarroel
Juan Trujillo 0001
Eduardo Fernández-Medina
Mario Piattini
Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel.
914-921
2006
conf/IEEEares/2006
ARES
https://doi.org/10.1109/ARES.2006.110
https://doi.ieeecomputersociety.org/10.1109/ARES.2006.110
https://www.wikidata.org/entity/Q57379392
db/conf/IEEEares/ares2006.html#SolerVTFP06
Belén Vela
Eduardo Fernández-Medina
Esperanza Marcos
Mario Piattini
Una Aproximación Dirigida por Modelos para el Diseño de Bases de Datos XML Seguras.
229-242
2006
CIbSE
conf/cibse/2006
db/conf/cibse/cibse2006.html#VelaFMP06
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Análisis Comparativo de Propuestas de Establecimiento de Requisitos de Seguridad para el Desarrollo de Sistemas de Información Seguros.
345-358
2006
CIbSE
conf/cibse/2006
db/conf/cibse/cibse2006.html#MelladoFP06
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Extensión de UML 2.0 para especificar Requisitos de Seguridad en Procesos de Negocios.
375-388
2006
CIbSE
conf/cibse/2006
db/conf/cibse/cibse2006.html#RodriguezFP06
Emilio Soler
Juan Trujillo 0001
Eduardo Fernández-Medina
Mario Piattini
Un Conjunto de Transformaciones QVT para el Modelado de Almacenes de Datos Seguros.
2006
DSDM
https://ceur-ws.org/Vol-227/paper05.pdf
conf/dsdm/2006
db/conf/dsdm/dsdm2006.html#SolerTFP06
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile.
32-42
2006
conf/er/2006w
ER (Workshops)
https://doi.org/10.1007/11908883_6
db/conf/er/erw2006.html#RodriguezFP06
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Applying a Security Requirements Engineering Process.
192-206
2006
conf/esorics/2006
ESORICS
https://doi.org/10.1007/11863908_13
db/conf/esorics/esorics2006.html#MelladoFP06
Carlos Villarrubia
Eduardo Fernández-Medina
Mario Piattini
Metrics of Password Management Policy.
1013-1023
2006
conf/iccsa/2006-3
ICCSA (3)
https://doi.org/10.1007/11751595_106
https://www.wikidata.org/entity/Q57379328
db/conf/iccsa/iccsa2006-3.html#VillarrubiaFP06
Rodolfo Villarroel
Emilio Soler
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Using UML Packages for Designing Secure Data Warehouses.
1024-1034
2006
conf/iccsa/2006-3
ICCSA (3)
https://doi.org/10.1007/11751595_107
https://www.wikidata.org/entity/Q57379435
db/conf/iccsa/iccsa2006-3.html#VillarroelSFTP06
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems.
1044-1053
2006
conf/iccsa/2006-3
ICCSA (3)
https://doi.org/10.1007/11751595_109
https://www.wikidata.org/entity/Q57379233
db/conf/iccsa/iccsa2006-3.html#MelladoFP06
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
PWSSec: Process for Web Services Security.
213-222
2006
conf/icws/2006
ICWS
https://doi.org/10.1109/ICWS.2006.107
https://doi.ieeecomputersociety.org/10.1109/ICWS.2006.107
https://www.wikidata.org/entity/Q57379373
db/conf/icws/icws2006.html#GutierrezFP06
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Aplicación práctica de un proceso de ingeniería de requisitos de seguridad.
315-324
2006
conf/jisbd/2006
JISBD
db/conf/jisbd/jisbd2006.html#MelladoFP06
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio.
347-356
2006
conf/jisbd/2006
JISBD
db/conf/jisbd/jisbd2006.html#RodriguezFP06
David Garcia Rosado
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
Defining Viewpoints for Security Architectural Patterns.
419-424
2006
conf/secrypt/2006
SECRYPT
db/conf/secrypt/secrypt2006.html#RosadoGFP06
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
Security Risk Analysis in Web Services Systems.
425-430
2006
conf/secrypt/2006
SECRYPT
db/conf/secrypt/secrypt2006.html#GutierrezFP06
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
Secure Information Systems Development - Based on a Security Requirements Engineering Process.
467-470
2006
conf/secrypt/2006
SECRYPT
db/conf/secrypt/secrypt2006.html#MelladoFP06
Belén Vela
Eduardo Fernández-Medina
Esperanza Marcos
Mario Piattini
A Model Driven Approach for Secure XML Database Development.
33-46
2006
conf/sis/2006
WOSIS
db/conf/sis/wosis2006.html#VelaFMP06
Daniel Mellado
Eduardo Fernández-Medina
Mario Piattini
SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems.
135-145
2006
conf/sis/2006
WOSIS
db/conf/sis/wosis2006.html#MelladoFP06
David Garcia Rosado
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
Security Patterns Related to Security Requirements.
163-173
2006
conf/sis/2006
WOSIS
db/conf/sis/wosis2006.html#RosadoGFP06
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams.
174-184
2006
conf/sis/2006
WOSIS
db/conf/sis/wosis2006.html#RodriguezFP06
Luís Enrique Sanchez
Daniel Villafranca
Eduardo Fernández-Medina
Mario Piattini
Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises.
256-266
2006
conf/sis/2006
WOSIS
db/conf/sis/wosis2006.html#SanchezVFP06
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes.
51-61
2006
conf/trustbus/2006
TrustBus
https://doi.org/10.1007/11824633_6
db/conf/trustbus/trustbus2006.html#RodriguezFP06
Manu Malek
Eduardo Fernández-Medina
Javier Hernando
SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
2006
SECRYPT
972-8865-63-5
INSTICC Press
db/conf/secrypt/secrypt2006.html
Eduardo Fernández-Medina
Mariemma Inmaculada Yagüe del Valle
Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006
978-972-8865-52-8
INSTICC Press
WOSIS
2006
db/conf/sis/wosis2006.html
Rodolfo Villarroel
Eduardo Fernández-Medina
Mario Piattini
Secure information systems development - a survey and comparison.
308-321
2005
24
Comput. Secur.
4
https://doi.org/10.1016/j.cose.2004.09.011
https://www.wikidata.org/entity/Q57379555
db/journals/compsec/compsec24.html#VillarroelFP05
Eduardo Fernández-Medina
Mario Piattini
Designing secure databases.
463-477
2005
47
Inf. Softw. Technol.
7
https://doi.org/10.1016/j.infsof.2004.09.013
https://www.wikidata.org/entity/Q57379499
db/journals/infsof/infsof47.html#Fernandez-MedinaP05
Rodolfo Villarroel
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Un Modelo de Seguridad para Almacenes de Datos e Implementación Semiautomática con OLS10g.
243-254
2005
CIbSE
conf/cibse/2005
db/conf/cibse/cibse2005.html#VillarroelFTP05
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Representación de Requisitos de Seguridad en el Modelado de Procesos de Negocios.
255-266
2005
CIbSE
conf/cibse/2005
db/conf/cibse/cibse2005.html#RodriguezFP05
Carlos Gutiérrez García
Eduardo Fernández-Medina
Mario Piattini
PWSSEC: Proceso de Desarrollo para Seguridad de Servicios.
203-210
2005
conf/jisbd/2005
JISBD
db/conf/jisbd/jisbd2005.html#GarciaFP05
Rodolfo Villarroel
Eduardo Fernández-Medina
Juan Trujillo 0001
Mario Piattini
Towards a UML 2.0/OCL extension for designing Secure Data Warehouses.
217-228
2005
conf/sis/2005
WOSIS
db/conf/sis/wosis2005.html#VillarroelFTP05
Alfonso Rodríguez 0001
Eduardo Fernández-Medina
Mario Piattini
Towards an integration of Security Requirements into Business Process Modeling.
287-297
2005
conf/sis/2005
WOSIS
db/conf/sis/wosis2005.html#RodriguezFP05
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
Towards a Process for Web Services Security.
298-308
2005
conf/sis/2005
WOSIS
db/conf/sis/wosis2005.html#GutierrezFP05
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
Web services enterprise security architecture: a case study.
10-19
2005
SWS
https://doi.org/10.1145/1103022.1103025
https://www.wikidata.org/entity/Q57379564
conf/sws/2005
db/conf/sws/sws2005.html#GutierrezFP05
Eduardo Fernández-Medina
Julio César Hernández Castro
Luis Javier García Castro
Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, In conjunction with ICEIS2005, Miami, USA, May 2005
INSTICC Press
972-8865-25-2
WOSIS
2005
db/conf/sis/wosis2005.html
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
Web Services Security: Is the Problem Solved?
22-31
2004
13
Inf. Secur. J. A Glob. Perspect.
3
https://doi.org/10.1201/1086/44530.13.3.20040701/83066.4
db/journals/isjgp/isjgp13.html#GutierrezFP04
Rodolfo Villarroel
Eduardo Fernández-Medina
Mario Piattini
A Comparison of Secure Information Systems Design Methodologies.
189-198
2004
conf/caise/2004ws1
CAiSE Workshops (1)
db/conf/caise/caisews2004-1.html#VillarroelFP04
Carlos Villarrubia
Eduardo Fernández-Medina
Mario Piattini
Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics.
109-117
2004
conf/csreaSAM/2004
Security and Management
db/conf/csreaSAM/csreaSAM2004.html#VillarrubiaFP04
Rodolfo Villarroel
Eduardo Fernández-Medina
Mario Piattini
General Considerations on Data Warehouse Security.
242-248
2004
conf/csreaSAM/2004
Security and Management
db/conf/csreaSAM/csreaSAM2004.html#VillarroelFP04
Rodolfo Villarroel
Eduardo Fernández-Medina
Mario Piattini
Incorporating Security Issues in the Information Systems Design.
345-352
2004
conf/enc/2004
ENC
https://doi.org/10.1109/ENC.2004.1342626
https://doi.ieeecomputersociety.org/10.1109/ENC.2004.1342626
https://www.wikidata.org/entity/Q57379600
db/conf/enc/enc2004.html#VillarroelFP04
Eduardo Fernández-Medina
Juan Trujillo 0001
Rodolfo Villarroel
Mario Piattini
Extending UML for Designing Secure Data Warehouses.
217-230
https://doi.org/10.1007/978-3-540-30464-7_18
2004
conf/er/2004
ER
db/conf/er/er2004.html#Fernandez-MedinaTVP04
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
A Survey of Web Services Security.
968-977
https://doi.org/10.1007/978-3-540-24707-4_109
2004
conf/iccsa/2004-1
ICCSA (1)
db/conf/iccsa/iccsa2004-1.html#GutierrezFP04
Carlos Gutiérrez
Eduardo Fernández-Medina
Mario Piattini
Web Services Security: is the problem solved?
293-304
2004
conf/sis/2004
WOSIS
db/conf/sis/wosis2004.html#GutierrezFP04
Carlos Villarrubia
Eduardo Fernández-Medina
Mario Piattini
Towards a Classification of Security Metrics.
342-350
2004
conf/sis/2004
WOSIS
db/conf/sis/wosis2004.html#VillarrubiaFP04
Eduardo Fernández-Medina
Mario Piattini
Extending OCL for Secure Database Development.
380-394
https://doi.org/10.1007/978-3-540-30187-5_27
2004
conf/uml/2004
UML
db/conf/uml/uml2004.html#Fernandez-MedinaP04
Eduardo Fernández-Medina
Julio César Hernández Castro
L. Javier García-Villalba
Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004
WOSIS
INSTICC Press
2004
972-8865-07-4
db/conf/sis/wosis2004.html
Eduardo Fernández-Medina
Mario Piattini
A Methodology for Multilevel Database Design.
2003
conf/caise/2003fo
CAiSE Short Paper Proceedings
https://ceur-ws.org/Vol-74/files/FORUM_09.pdf
db/conf/caise/caisefo2003.html#Fernandez-MedinaP03
Eduardo Fernández-Medina
Mario Piattini
Designing Secure Databases for OLS.
886-895
https://doi.org/10.1007/978-3-540-45227-0_86
2003
conf/dexa/2003
DEXA
db/conf/dexa/dexa2003.html#Fernandez-MedinaP03
Eduardo Fernández-Medina
G. Ruiz
Sabrina De Capitani di Vimercati
Implementing an Access Control System for SVG Documents.
741-753
https://doi.org/10.1007/978-3-540-39962-9_75
2003
conf/otm/2003
OTM Workshops
db/conf/otm/otm2003.html#Fernandez-MedinaRV03
Ernesto Damiani
Sabrina De Capitani di Vimercati
Eduardo Fernández-Medina
Pierangela Samarati
Access Control of SVG Documents.
219-230
2002
conf/dbsec/2002
DBSec
db/conf/dbsec/dbsec2002.html#DamianiVFS02
Eduardo Fernández-Medina
Mario Piattini
UML for the Design of Secure Databases.
25-38
2002
conf/sis/2002
SIS
db/conf/sis/sis2002.html#Fernandez-MedinaP02
Roberto Moya
Eduardo Fernández-Medina
Security in Information Systems, Proceedings of the 1st International Workshop on Security in Information Systems, SIS 2002, In conjunction with ICEIS 2002, Ciudad Real, Spain, April 2002
SIS
ICEIS Press
2002
972-98050-9-1
db/conf/sis/sis2002.html
Luis Márquez Alcañiz
Esther Álvarez
José Ambrosio Toval Álvarez
Nikolaos Argyropoulos
Vita Santa Barletta
Carlos Blanco 0001
Ismael Caballero 0001
Danilo Caivano
Sara Camacho
Ionut Cardei
Mihaela Cardei
Julio César Hernández Castro
Luis Javier García Castro
Jesús Peral CortésJesús Peral
Luis Enrique Sánchez CrespoLuis Enrique Sánchez
Ernesto Damiani
Aidan J. Delaney
Eduardo B. Fernández
Andrew Fish
Fulvio Frati
Alberto Freitas
Angel Gallego
Carlos Gutiérrez García
Diego García-Saiz
L. Javier García-Villalba
Javier Garzás
Rafael M. Gasca
Javier Gómez
Rafael Gómez
María Teresa Gómez-López
Carlos Gutiérrez
Carlos A. Gutiérrez
Ignacio García Rodríguez de Guzmán
Keiko Hashizume
Arnulfo Hernández
Javier Hernando
Monica Huerta
Sushil Jajodia
Jan Jürjens
Joaquín Lasheras
Javier López 0001
Manu Malek
Esperanza Marcos
Anthony Marcus
Miguel A. Martínez 0002
Alejandro Maté
Jose-Norberto Mazón
Daniel Mellado
Santiago Moral-García
Santiago Moral-Rubio
Julio Moreno
Haralambos Mouratidis
Roberto Moya
Alejandro Oliver
Maria I. Ortega
Roberto Ortiz
Antonio Santos-Olmo Parra
Ricardo Pérez-Castillo
Mario Piattini
Oscar Rebollo
Alfonso Rodríguez 0001
Jesús Rodríguez
Moisés Rodríguez
David Garcia Rosado
Carlos Ruiz
G. Ruiz
Pierangela Samarati
Luís Enrique Sanchez
Manuel A. Serrano
Shaun Shei
Emilio Soler
Veronika Stefanov
Juan Trujillo 0001
Rafael Valencia-García
Mariemma Inmaculada Yagüe del Valle
Angel Jesus Varela-VacaÁngel Jesús Varela-Vaca
Belén Vela
Eugenio Verbo
Daniel Villafranca
Rodolfo Villarroel
Carlos Villarrubia
Sabrina De Capitani di Vimercati
Mariemma Yague