default search action
Eduardo B. Fernández
Eduardo B. Fernández-Buglioni
Person information
- affiliation: Florida Atlantic University, Boca Raton, Florida, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j63]Eduardo B. Fernández, Andrei Brazhuk:
A critical analysis of Zero Trust Architecture (ZTA). Comput. Stand. Interfaces 89: 103832 (2024) - 2023
- [j62]Bijayita Thapa, Eduardo B. Fernández, Ionut Cardei, Maria M. Larrondo-Petrie:
Abstract Entity Patterns for Sensors and Actuators. Comput. 12(5): 93 (2023) - [j61]Ingrid A. Buckley, Eduardo B. Fernández:
Dependability Patterns: A Survey. Comput. 12(10): 214 (2023) - [j60]Virginia M. Romero, Eduardo B. Fernández:
Towards a Reference Architecture for Cargo Ports. Future Internet 15(4): 139 (2023) - 2022
- [j59]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns and the design of secure systems. Cybersecur. 5(1): 7 (2022) - [j58]Abdulrahman Khalid Alnaim, Ahmed Mahmoud Alwakeel, Eduardo B. Fernández:
Towards a Security Reference Architecture for NFV. Sensors 22(10): 3750 (2022) - 2021
- [j57]Anelis Pereira Vale, Eduardo B. Fernández, Raúl Monge, Hernán Astudillo, Gastón Márquez:
Security in microservice-based systems: A Multivocal literature review. Comput. Secur. 103: 102200 (2021) - [j56]Tian Xia, Hironori Washizaki, Yoshiaki Fukazawa, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández, Takehisa Kato, Hideyuki Kanuka, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development. Int. J. Syst. Softw. Secur. Prot. 12(2): 68-85 (2021) - [j55]Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Takao Okubo:
The design of secure IoT applications using patterns: State of the art and directions for research. Internet Things 15: 100408 (2021) - [c138]Eduardo B. Fernández, Hernán Astudillo, Cristian Orellana:
A pattern for a Secure IoT Thing. EuroPLoP 2021: 16:1-16:6 - [c137]Cristian Orellana, Hernán Astudillo, Eduardo B. Fernández:
A Pattern for a Secure Actuator Node. EuroPLoP 2021: 29:1-29:6 - [e1]Nobukazu Yoshioka, Hironori Washizaki, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto, Fuyuki Ishikawa, Foutse Khomh, Giuliano Antoniol:
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), Nara, Japan, December 4, 2018. CEUR Workshop Proceedings 2809, CEUR-WS.org 2021 [contents] - 2020
- [j54]Hironori Washizaki, Shinpei Ogata, Atsuo Hazeyama, Takao Okubo, Eduardo B. Fernández, Nobukazu Yoshioka:
Landscape of Architecture and Design Patterns for IoT Systems. IEEE Internet Things J. 7(10): 10091-10101 (2020) - [j53]Julio Moreno, Javier Gómez, Manuel A. Serrano, Eduardo B. Fernández, Eduardo Fernández-Medina:
Application of security reference architecture to Big Data ecosystems in an industrial scenario. Softw. Pract. Exp. 50(8): 1520-1538 (2020) - [c136]Olga Villagrán-Velasco, Eduardo B. Fernández, Jorge L. Ortega-Arjona:
Refining the evaluation of the degree of security of a system built using security patterns. ARES 2020: 36:1-36:7 - [c135]Antonio Muñoz, Eduardo B. Fernández:
TPM, a pattern for an architecture for trusted computing. EuroPLoP 2020: 14:1-14:8 - [c134]Raghdah Saemaldahr, Bijayita Thapa, Kristopher Maikoo, Eduardo B. Fernández:
Reference Architectures for the IoT: A Survey. IRICT 2020: 635-646
2010 – 2019
- 2019
- [j52]Julio Moreno, Eduardo B. Fernández, Manuel A. Serrano, Eduardo Fernández-Medina:
Secure Development of Big Data Ecosystems. IEEE Access 7: 96604-96619 (2019) - [c133]Ahmed Mahmoud Alwakeel, Abdulrahman Khalid Alnaim, Eduardo B. Fernández:
A Pattern for a Virtual Network Function (VNF). ARES 2019: 31:1-31:7 - [c132]Abdulrahman Khalid Alnaim, Ahmed Mahmoud Alwakeel, Eduardo B. Fernández:
A Misuse Pattern for Compromising VMs via Virtual Machine Escape in NFV. ARES 2019: 77:1-77:6 - [c131]Anelis Pereira Vale, Gastón Márquez, Hernán Astudillo, Eduardo B. Fernández:
Security Mechanisms Used in Microservices-Based Systems: A Systematic Mapping. CLEI 2019: 1-10 - [c130]Julio Moreno, Eduardo B. Fernández, Eduardo Fernández-Medina, Manuel A. Serrano:
BlockBD: a security pattern to incorporate blockchain in big data ecosystems. EuroPLoP 2019: 17:1-17:8 - [c129]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT patterns. SERP4IoT@ICSE 2019: 57-60 - [c128]Anelis Pereira Vale, Eduardo B. Fernández:
An Ontology for Security Patterns. SCCC 2019: 1-8 - [c127]Abdulrahman Khalid Alnaim, Ahmed Mahmoud Alwakeel, Eduardo B. Fernández:
A Pattern for an NFV Virtual Machine Environment. SysCon 2019: 1-6 - [c126]Ahmed Mahmoud Alwakeel, Abdulrahman Khalid Alnaim, Eduardo B. Fernández:
Analysis of threats and countermeasures in NFV use cases. SysCon 2019: 1-6 - [i3]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT Patterns. CoRR abs/1902.09718 (2019) - 2018
- [j51]Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka:
Using Security Patterns to Develop Secure Systems - Ten Years Later. Int. J. Syst. Softw. Secur. Prot. 9(4): 46-57 (2018) - [j50]Matías Zapata-Barra, Alfonso Rodríguez, Angélica Caro, Eduardo B. Fernández:
Towards Obtaining UML Class Diagrams from Secure Business Processes Using Security Patterns. J. Univers. Comput. Sci. 24(10): 1472-1492 (2018) - [j49]Anton V. Uzunov, Eduardo B. Fernández, Katrina Falkner:
Assessing and improving the quality of security methodologies for distributed systems. J. Softw. Evol. Process. 30(11) (2018) - [c125]Madiha H. Syed, Eduardo B. Fernández:
A reference architecture for the container ecosystem. ARES 2018: 31:1-31:6 - [c124]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki:
Evaluating the degree of security of a system built using security patterns. ARES 2018: 43:1-43:8 - [c123]Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto:
Report of WESPr-18: the International Workshop on Evidence-based Security and Privacy in the Wild. WESPr-iMLSE@APSEC 2018: 1-2 - [c122]Eduardo B. Fernández, Nobukazu Yoshioka:
Using a variety of patterns in a secure software development methodology. WESPr-iMLSE@APSEC 2018: 26-32 - [c121]Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina, Eduardo B. Fernández:
Towards a Security Reference Architecture for Big Data. DOLAP 2018 - [c120]Julio Moreno, Eduardo B. Fernández, Eduardo Fernández-Medina, Manuel A. Serrano:
A Security Pattern for Key-Value NoSQL Database Authorization. EuroPLoP 2018: 12:1-12:4 - [c119]Madiha H. Syed, Eduardo B. Fernández, Julio Moreno:
A misuse Pattern for DDoS in the IoT. EuroPLoP 2018: 34:1-34:5 - [c118]Tian Xia, Hironori Washizaki, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández, Hideyuki Kanuka, Masayuki Yoshino, Dan Yamamoto, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services. MODELSWARD 2018: 379-386 - [r2]Jan Jürjens, Eduardo B. Fernández:
Secure Database Development. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [c117]Madiha H. Syed, Eduardo B. Fernández:
The Container Manager Pattern. EuroPLoP 2017: 28:1-28:9 - [c116]Eduardo B. Fernández, Brahim Hamid:
Two safety patterns: Safety Assertion and Safety Assertion Enforcer. EuroPLoP 2017: 30:1-30:9 - [c115]Paulo Realpe-Muñoz, César A. Collazos, Toni Granollers, Jaime Muñoz Arteaga, Eduardo B. Fernández:
Design process for usable security and authentication using a user-centered approach. Interacción 2017: 42:1-42:8 - 2016
- [j48]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Madiha H. Syed:
Modeling and Security in Cloud Ecosystems. Future Internet 8(2): 13 (2016) - [j47]Eduardo B. Fernández:
Introduction to the Special Issue on Evaluating the Security of Complex Systems. Inf. 7(3): 46 (2016) - [j46]Dereje Yimam, Eduardo B. Fernández:
A survey of compliance issues in cloud computing. J. Internet Serv. Appl. 7(1): 5:1-5:12 (2016) - [j45]Eduardo B. Fernández, Raúl Monge, Keiko Hashizume:
Building a security reference architecture for cloud systems. Requir. Eng. 21(2): 225-249 (2016) - [c114]Eduardo B. Fernández:
Threat Modeling in Cyber-Physical Systems. DASC/PiCom/DataCom/CyberSciTech 2016: 448-453 - [c113]Gilberto Pedraza-Garcia, René Noël, Santiago Matalonga, Hernán Astudillo, Eduardo B. Fernández:
Mitigating security threats using tactics and patterns: a controlled experiment. ECSA Workshops 2016: 37 - [c112]Paulina Silva, Raúl Monge, Eduardo B. Fernández:
A reference architecture for web browsers: part II, a pattern for web browser content renderer. EuroPLoP 2016: 27 - [c111]Eduardo B. Fernández:
Preventing and unifying threats in cyberphysical systems. HASE 2016: 292-293 - [c110]Dereje Yimam, Eduardo B. Fernández:
Building Compliance and Security Reference Architectures (CSRA) for Cloud Systems. IC2E 2016: 147-150 - [c109]Eduardo B. Fernández:
Building Secure Cloud Architectures Using Patterns. IC2E Workshops 2016: 194 - [c108]Madiha H. Syed, Eduardo B. Fernández:
Cloud Ecosystems Support for Internet of Things and DevOps Using Patterns. IoTDI 2016: 301-304 - [c107]Hironori Washizaki, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Takehisa Kato, Shinpei Ogata, Haruhiko Kaiya, Eduardo B. Fernández, Hideyuki Kanuka, Yuki Kondo, Nobukazu Yoshioka, Takao Okubo, Atsuo Hazeyama:
A Metamodel for Security and Privacy Knowledge in Cloud Services. SERVICES 2016: 142-143 - [c106]Madiha H. Syed, Eduardo B. Fernández, Mohammad Ilyas:
A Pattern for Fog Computing. VikingPLoP 2016: 13:1-13:10 - 2015
- [j44]Anton V. Uzunov, Eduardo B. Fernández, Katrina Falkner:
Security solution frames and security patterns for authorization in distributed, collaborative systems. Comput. Secur. 55: 193-234 (2015) - [j43]Anton V. Uzunov, Eduardo B. Fernández, Katrina Falkner:
ASE: A comprehensive pattern-driven security methodology for distributed systems. Comput. Stand. Interfaces 41: 112-137 (2015) - [j42]Anton V. Uzunov, Katrina Falkner, Eduardo B. Fernández:
A comprehensive pattern-oriented approach to engineering security methodologies. Inf. Softw. Technol. 57: 217-247 (2015) - [c105]Eduardo B. Fernández, Hernán Astudillo, Gilberto Pedraza-Garcia:
Revisiting Architectural Tactics for Security. ECSA 2015: 55-69 - [c104]Rohini Sulatycki, Eduardo B. Fernández:
Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities. EuroPLoP 2015: 46:1-46:11 - [c103]Eduardo B. Fernández, Brahim Hamid:
A pattern for network functions virtualization. EuroPLoP 2015: 47:1-47:9 - [c102]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki:
Patterns for security and privacy in cloud ecosystems. ESPRE 2015: 13-18 - [c101]Eduardo B. Fernández, Dereje Yimam:
Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations. SECRYPT 2015: 435-440 - 2014
- [j41]Anton V. Uzunov, Eduardo B. Fernández:
An extensible pattern-based library and taxonomy of security threats for distributed systems. Comput. Stand. Interfaces 36(4): 734-747 (2014) - [j40]Santiago Moral-García, Santiago Moral-Rubio, Eduardo B. Fernández, Eduardo Fernández-Medina:
Enterprise security pattern: A model-driven architecture instance. Comput. Stand. Interfaces 36(4): 748-758 (2014) - [j39]Santiago Moral-García, Santiago Moral-Rubio, David Garcia Rosado, Eduardo B. Fernández, Eduardo Fernández-Medina:
Enterprise security pattern: a new type of security pattern. Secur. Commun. Networks 7(11): 1670-1690 (2014) - [c100]Anton V. Uzunov, Eduardo B. Fernández, Katrina Falkner:
A Comprehensive Pattern-Driven Security Methodology for Distributed Systems. Australian Software Engineering Conference 2014: 142-151 - [c99]René Noël, Gilberto Pedraza-Garcia, Hernán Astudillo, Eduardo B. Fernández:
An exploratory comparison of security patterns and tactics to harden systems. CIbSE 2014: 378-391 - [c98]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements and analysis of secure systems. CIbSE 2014: 437-450 - [c97]Oscar Encina, Eduardo B. Fernández, A. Raúl Monge:
Threat analysis and misuse patterns of federated inter-cloud systems. EuroPLoP 2014: 13:1-13:8 - [c96]Eduardo B. Fernández, A. Raúl Monge, René Carvajal, Oscar Encina, Juan Hernández, Paulina Silva:
Patterns for content-dependent and context-enhanced authorization. EuroPLoP 2014: 32:1-32:10 - [c95]Oscar Encina, Eduardo B. Fernández, Raúl Monge:
Towards Secure Inter-Cloud Architectures. VikingPLoP 2014: 2:1-2:10 - [c94]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns for requirements specification and analysis of secure systems. WER 2014 - [c93]Eduardo B. Fernández, Raúl Monge:
A security reference architecture for cloud systems. WICSA Companion 2014: 3:1-3:5 - [i2]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). CoRR abs/1409.6608 (2014) - 2013
- [j38]Eduardo B. Fernández, David L. La Red, José Ignacio Peláez:
A conceptual approach to secure electronic elections based on patterns. Gov. Inf. Q. 30(1): 64-73 (2013) - [j37]Keiko Hashizume, David Garcia Rosado, Eduardo Fernández-Medina, Eduardo B. Fernández:
An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1): 5:1-5:13 (2013) - [c92]Anton V. Uzunov, Katrina Falkner, Eduardo B. Fernández:
Decomposing Distributed Software Architectures for the Determination and Incorporation of Security and Other Non-functional Requirements. Australian Software Engineering Conference 2013: 30-39 - 2012
- [j36]Anton V. Uzunov, Eduardo B. Fernández, Katrina Falkner:
Securing distributed systems using patterns: A survey. Comput. Secur. 31(5): 681-703 (2012) - [j35]Eduardo B. Fernández, Ola Ajaj, Ingrid A. Buckley, Nelly Delessy-Gassant, Keiko Hashizume, Maria M. Larrondo-Petrie:
A Survey of Patterns for Web Services Security and Reliability Standards. Future Internet 4(2): 430-450 (2012) - [j34]Eduardo B. Fernández:
Introduction to the Special Issue on Recent Advances in Web Services. Future Internet 4(3): 618-620 (2012) - [j33]Anton V. Uzunov, Eduardo B. Fernández, Katrina Falkner:
Engineering Security into Distributed Systems: A Survey of Methodologies. J. Univers. Comput. Sci. 18(20): 2920-3006 (2012) - [c91]Eduardo B. Fernández, Anton V. Uzunov:
Secure Middleware Patterns. CSS 2012: 470-482 - 2011
- [j32]Eduardo B. Fernández, Sergio Mujica:
Model-based development of security requirements. CLEI Electron. J. 14(3) (2011) - [j31]David La Red, Jesús M. Doña, José Ignacio Peláez, Eduardo B. Fernández:
Wkc-OWA, a New Neat-OWA Operator to Aggregate Information in Democratic Decision Problems. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 19(5): 759-779 (2011) - [c90]Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Michael VanHilst:
An Approach to Model-based Development of Secure and Reliable Systems. ARES 2011: 260-265 - [c89]Ingrid A. Buckley, Eduardo B. Fernández:
Enumerating Software Failures to Build Dependable Distributed Applications. HASE 2011: 120-123 - [c88]Ingrid A. Buckley, Eduardo B. Fernández, Marco Anisetti, Claudio A. Ardagna, Seyed Masoud Sadjadi, Ernesto Damiani:
Towards Pattern-Based Reliability Certification of Services. OTM Conferences (2) 2011: 560-576 - [c87]Eduardo B. Fernández, Nobukazu Yoshioka:
Two patterns for distributed systems: enterprise service bus (ESB) and distributed publish/subscribe. PLoP 2011: 8:1-8:10 - [c86]Zhen Jiang, Eduardo B. Fernández, Liang Cheng:
P2N: a pedagogical <u>p</u>attern for teaching computer <u>p</u>rogramming to <u>n</u>on-CS majors. PLoP 2011: 25:1-25:9 - [c85]Keiko Hashizume, Eduardo B. Fernández, Nobukazu Yoshioka:
Misuse Patterns for Cloud Computing. SEKE 2011: 683-686 - [i1]Xiaohong Yuan, Eduardo B. Fernández:
Patterns for Business-to-consumer E-Commerce Applications. CoRR abs/1108.3342 (2011) - 2010
- [c84]Michael Netter, Eduardo B. Fernández, Günther Pernul:
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. ARES 2010: 560-564 - [c83]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Michael VanHilst:
Measuring the Level of Security Introduced by Security Patterns. ARES 2010: 565-568 - [c82]Eduardo B. Fernández, María M. Larrondo-Petrie:
Designing Secure SCADA Systems Using Security Patterns. HICSS 2010: 1-8 - [c81]Anupama Sahu, Eduardo B. Fernández, Mihaela Cardei, Michael VanHilst:
A pattern for a sensor node. PLoP 2010: 7:1-7:7 - [c80]Michael Van Hilst, Eduardo B. Fernández:
A pattern system of underlying theories for process improvement. PLoP 2010: 8:1-8:24 - [c79]Eduardo B. Fernández, Sergio Mujica:
Building Secure Systems: From Threats to Security Patterns. SCCC 2010: 66-70 - [c78]Ola Ajaj, Eduardo B. Fernández:
The WS-policy standard pattern. SugarLoafPLoP 2010: 4:1-4:12 - [p2]Eduardo B. Fernández, Carolina Marin, Maria M. Larrondo-Petrie:
Security Requirements for Social Networks in Web 2.0. Handbook of Social Network Technologies 2010: 569-582
2000 – 2009
- 2009
- [j30]Michael VanHilst, Eduardo B. Fernández, Fabrício A. Braz:
A Multi-Dimensional Classification for Users of Security Patterns. J. Res. Pract. Inf. Technol. 41(2): 87-118 (2009) - [j29]Juan C. Pelaez, Eduardo B. Fernández, María M. Larrondo-Petrie:
Misuse patterns in VoIP. Secur. Commun. Networks 2(6): 635-653 (2009) - [c77]Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki:
Modeling Misuse Patterns. ARES 2009: 566-571 - [c76]Luanna Lopes Lobato, Eduardo B. Fernández, Sérgio Donizetti Zorzo:
Patterns to Support the Development of Privacy Policies. ARES 2009: 744-749 - [c75]Eduardo B. Fernández, Jie Wu, María M. Larrondo-Petrie, Yifeng Shao:
On building secure SCADA systems using security patterns. CSIIRW 2009: 17 - [c74]Hironori Washizaki, Eduardo B. Fernández, Katsuhisa Maruyama, Atsuto Kubo, Nobukazu Yoshioka:
Improving the Classification of Security Patterns. DEXA Workshops 2009: 165-170 - [c73]Miguel Solinas, Eduardo B. Fernández, Leandro Antonelli:
Embedding Security Patterns into a Domain Model. DEXA Workshops 2009: 176-180 - [c72]Eduardo B. Fernández, Jorge L. Ortega-Arjona:
The Secure Pipes and Filters Pattern. DEXA Workshops 2009: 181-185 - [c71]Keiko Hashizume, Eduardo B. Fernández, Shihong Huang:
Digital Signature with Hashing and XML Signature patterns. EuroPLoP 2009 - [c70]Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Jan Jürjens:
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). OOPSLA Companion 2009: 713-714 - [c69]Ingrid A. Buckley, Eduardo B. Fernández, Gustavo Rossi, Seyed Masoud Sadjadi:
Web Services Reliability Patterns. SEKE 2009: 4-9 - [p1]Eduardo B. Fernández:
Security Patterns and A Methodology to Apply them. Security and Dependability for Ambient Intelligence 2009: 37-46 - [r1]Jan Jürjens, Eduardo B. Fernández:
Secure Database Development. Encyclopedia of Database Systems 2009: 2528-2534 - 2008
- [c68]Nelly A. Delessy, Eduardo B. Fernández:
A Pattern-Driven Security Process for SOA Applications. ARES 2008: 416-421 - [c67]Eduardo B. Fernández, Hironori Washizaki, Nobukazu Yoshioka, Atsuto Kubo, Yoshiaki Fukazawa:
Classifying Security Patterns. APWeb 2008: 342-347 - [c66]