


Остановите войну!
for scientists:


default search action
Eduardo Fernández-Medina
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j71]Luís Enrique Sanchez
, Antonio Santos-Olmo Parra
, Haralambos Mouratidis
, Eduardo Fernández-Medina
:
New Frontiers in Security Risk Management. IT Prof. 25(3): 61-67 (2023) - [j70]Maria I. Ortega, Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina:
A Systematic Analysis of Security in Blockchain. J. Inf. Sci. Eng. 39(1): 197-222 (2023) - [c125]Manuel A. Serrano, Luis Enrique Sánchez Crespo, Antonio Santos-Olmo Parra, David Garcia Rosado, Carlos Blanco Bueno, Eduardo Fernández-Medina:
Towards a Quantum World in Cybersecurity Land. IS-EUD Workshops 2023 - 2022
- [j69]David G. Rosado, Antonio Santos-Olmo Parra
, Luís Enrique Sanchez, Manuel A. Serrano, Carlos Blanco, Haralambos Mouratidis, Eduardo Fernández-Medina:
Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern. Comput. Ind. 142: 103715 (2022) - [j68]Carlos Blanco
, Diego García-Saiz, David G. Rosado, Antonio Santos-Olmo Parra
, Jesús Peral
, Alejandro Maté, Juan Trujillo, Eduardo Fernández-Medina:
Security policies by design in NoSQL document databases. J. Inf. Secur. Appl. 65: 103120 (2022) - 2021
- [j67]Ángel Jesús Varela-Vaca
, David G. Rosado, Luís Enrique Sanchez, María Teresa Gómez López, Rafael M. Gasca, Eduardo Fernández-Medina:
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems. Comput. Ind. 132: 103524 (2021) - [j66]David G. Rosado, Julio Moreno, Luís Enrique Sanchez, Antonio Santos-Olmo Parra
, Manuel A. Serrano
, Eduardo Fernández-Medina:
MARISMA-BiDa pattern: Integrated risk analysis for big data. Comput. Secur. 102: 102155 (2021) - [j65]Julio Moreno, David G. Rosado, Luís Enrique Sanchez, Manuel A. Serrano
, Eduardo Fernández-Medina:
Security Reference Architecture for Cyber-Physical Systems (CPS). J. Univers. Comput. Sci. 27(6): 609-634 (2021) - [j64]Alejandro Maté, Jesús Peral
, Juan Trujillo, Carlos Blanco
, Diego García-Saiz
, Eduardo Fernández-Medina:
Improving security in NoSQL document databases through model-driven modernization. Knowl. Inf. Syst. 63(8): 2209-2230 (2021) - 2020
- [j63]Julio Moreno
, Javier Gómez, Manuel A. Serrano
, Eduardo B. Fernández, Eduardo Fernández-Medina:
Application of security reference architecture to Big Data ecosystems in an industrial scenario. Softw. Pract. Exp. 50(8): 1520-1538 (2020) - [c124]Ángel Jesús Varela-Vaca, David G. Rosado, Luís Enrique Sanchez, María Teresa Gómez López, Rafael M. Gasca, Eduardo Fernández-Medina:
Definition and Verification of Security Configurations of Cyber-Physical Systems. CyberICPS/SECPRE/ADIoT@ESORICS 2020: 135-155
2010 – 2019
- 2019
- [j62]Julio Moreno
, Eduardo B. Fernández, Manuel A. Serrano
, Eduardo Fernández-Medina
:
Secure Development of Big Data Ecosystems. IEEE Access 7: 96604-96619 (2019) - [c123]Julio Moreno, Eduardo B. Fernández, Eduardo Fernández-Medina, Manuel A. Serrano
:
BlockBD: a security pattern to incorporate blockchain in big data ecosystems. EuroPLoP 2019: 17:1-17:8 - 2018
- [c122]Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina:
Modelado de Requisitos de Seguridad para Big Data. CIbSE 2018: 515-522 - [c121]Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina, Eduardo B. Fernández:
Towards a Security Reference Architecture for Big Data. DOLAP 2018 - [c120]Carlos Blanco, Diego García-Saiz
, Jesús Peral
, Alejandro Maté, Alejandro Oliver, Eduardo Fernández-Medina
:
How the Conceptual Modelling Improves the Security on Document Databases. ER 2018: 497-504 - [c119]Julio Moreno, Eduardo B. Fernández, Eduardo Fernández-Medina
, Manuel A. Serrano
:
A Security Pattern for Key-Value NoSQL Database Authorization. EuroPLoP 2018: 12:1-12:4 - [r2]Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo:
Data Warehouse Security. Encyclopedia of Database Systems (2nd ed.) 2018 - 2016
- [j61]Luís Enrique Sanchez, Antonio Santos-Olmo Parra
, Esther Álvarez, Monica Huerta, Sara Camacho, Eduardo Fernández-Medina
:
Development of an Expert System for the Evaluation of Students' Curricula on the Basis of Competencies. Future Internet 8(2): 22 (2016) - [j60]Antonio Santos-Olmo Parra
, Luís Enrique Sanchez, Ismael Caballero, Sara Camacho, Eduardo Fernández-Medina
:
The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets. Future Internet 8(3): 30 (2016) - [j59]Antonio Santos-Olmo Parra
, Luís Enrique Sanchez, David G. Rosado
, Eduardo Fernández-Medina
, Mario Piattini
:
Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems. Future Internet 8(3): 36 (2016) - [j58]Julio Moreno
, Manuel A. Serrano
, Eduardo Fernández-Medina
:
Main Issues in Big Data Security. Future Internet 8(3): 44 (2016) - [c118]Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina:
Securing Databases Using Big Data Technology. ICIQ 2016: 93-102 - 2015
- [j57]Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina
:
ISGcloud: a Security Governance Framework for Cloud Computing. Comput. J. 58(10): 2233-2254 (2015) - [j56]Carlos Blanco
, Eduardo Fernández-Medina
, Juan Trujillo
:
Modernizing Secure OLAP Applications with a Model-Driven Approach. Comput. J. 58(10): 2351-2367 (2015) - [j55]Carlos Blanco
, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
, Juan Trujillo
:
An MDA approach for developing secure OLAP applications: Metamodels and transformations. Comput. Sci. Inf. Syst. 12(2): 541-565 (2015) - [j54]Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina
, Haralambos Mouratidis
:
Empirical evaluation of a cloud computing information security governance framework. Inf. Softw. Technol. 58: 44-57 (2015) - [j53]Carlos Blanco
, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
, Juan Trujillo
:
An architecture for automatically developing secure OLAP applications from models. Inf. Softw. Technol. 59: 1-16 (2015) - [c117]Luis Márquez Alcañiz, David G. Rosado
, Haralambos Mouratidis, Daniel Mellado, Eduardo Fernández-Medina
:
A Framework for Secure Migration Processes of Legacy Systems to the Cloud. CAiSE Workshops 2015: 507-517 - [c116]Nikolaos Argyropoulos, Luis Márquez Alcañiz, Haralambos Mouratidis, Andrew Fish
, David G. Rosado
, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
:
Eliciting Security Requirements for Business Processes of Legacy Systems. PoEM 2015: 91-107 - [c115]Shaun Shei, Luis Márquez Alcañiz, Haralambos Mouratidis, Aidan J. Delaney
, David G. Rosado
, Eduardo Fernández-Medina
:
Modelling secure cloud systems based on system requirements. ESPRE 2015: 19-24 - 2014
- [j52]Daniel Mellado, Haralambos Mouratidis
, Eduardo Fernández-Medina
:
Secure Tropos framework for software product lines requirements engineering. Comput. Stand. Interfaces 36(4): 711-722 (2014) - [j51]Santiago Moral-García, Santiago Moral-Rubio, Eduardo B. Fernández, Eduardo Fernández-Medina
:
Enterprise security pattern: A model-driven architecture instance. Comput. Stand. Interfaces 36(4): 748-758 (2014) - [j50]Carlos Blanco
, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo:
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications. J. Univers. Comput. Sci. 20(2): 79-106 (2014) - [j49]Santiago Moral-García, Santiago Moral-Rubio, David G. Rosado
, Eduardo B. Fernández, Eduardo Fernández-Medina
:
Enterprise security pattern: a new type of security pattern. Secur. Commun. Networks 7(11): 1670-1690 (2014) - [c114]Luis Márquez Alcañiz, David G. Rosado, Daniel Mellado, Eduardo Fernández-Medina:
Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study. WOSIS 2014: 26-37 - 2013
- [j48]Belén Vela
, Jose-Norberto Mazón
, Carlos Blanco
, Eduardo Fernández-Medina
, Juan Trujillo
, Esperanza Marcos
:
Development of Secure XML Data Warehouses with QVT. Inf. Softw. Technol. 55(9): 1651-1677 (2013) - [j47]Keiko Hashizume, David G. Rosado
, Eduardo Fernández-Medina
, Eduardo B. Fernández:
An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1): 5:1-5:13 (2013) - 2012
- [j46]Belén Vela
, Carlos Blanco
, Eduardo Fernández-Medina
, Esperanza Marcos
:
A practical application of our MDD approach for modeling secure XML data warehouses. Decis. Support Syst. 52(4): 899-925 (2012) - [j45]David G. Rosado
, Rafael Gómez, Daniel Mellado, Eduardo Fernández-Medina:
Security Analysis in the Migration to Cloud Environments. Future Internet 4(2): 469-487 (2012) - [j44]David G. Rosado, Luís Enrique Sanchez, Eduardo Fernández-Medina, Jan Jürjens:
Security in Information Systems: New Challenges and Opportunities. J. Univers. Comput. Sci. 18(6): 728-731 (2012) - [j43]Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina:
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment. J. Univers. Comput. Sci. 18(6): 798-815 (2012) - [j42]Ismael Caballero, Luís Enrique Sanchez, Alberto Freitas, Eduardo Fernández-Medina:
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management. J. Univers. Comput. Sci. 18(12): 1703-720 (2012) - 2011
- [j41]Carlos Blanco
, Joaquín Lasheras
, Eduardo Fernández-Medina
, Rafael Valencia-García
, José Ambrosio Toval Álvarez:
Basis for an integrated security ontology according to a systematic review of existing proposals. Comput. Stand. Interfaces 33(4): 372-388 (2011) - [j40]Alfonso Rodríguez
, Eduardo Fernández-Medina
, Juan Trujillo
, Mario Piattini
:
Secure business process model specification through a UML 2.0 activity diagram profile. Decis. Support Syst. 51(3): 446-465 (2011) - [j39]David G. Rosado
, Eduardo Fernández-Medina
, Javier López
:
Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems. IEICE Trans. Inf. Syst. 94-D(2): 243-254 (2011) - [j38]Anthony Marcus, Mihaela Cardei, Ionut Cardei, Eduardo Fernández-Medina, Fulvio Frati, Ernesto Damiani
:
A Pattern for Web-based WSN Monitoring (Invited Paper). J. Commun. 6(5): 393-399 (2011) - [j37]David G. Rosado
, Eduardo Fernández-Medina
, Javier López
, Mario Piattini
:
Systematic design of secure Mobile Grid systems. J. Netw. Comput. Appl. 34(4): 1168-1183 (2011) - [j36]David G. Rosado
, Eduardo Fernández-Medina
, Javier López
:
Security services architecture for Secure Mobile Grid Systems. J. Syst. Archit. 57(3): 240-258 (2011) - [c113]Roberto Ortiz, Javier Garzás, Eduardo Fernández-Medina
:
Analysis of Application of Security Patterns to Build Secure Systems. CAiSE Workshops 2011: 652-659 - [c112]Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina:
A Comparative Review of Cloud Security Proposals with ISO/IEC 27002. WOSIS 2011: 3-12 - [c111]Santiago Moral-García, Santiago Moral-Rubio, Eduardo Fernández-Medina:
Security Pattern Mining: Systematic Review and Proposal. WOSIS 2011: 13-24 - [c110]Roberto Ortiz, Santiago Moral-Rubio, Javier Garzás, Eduardo Fernández-Medina:
Towards a Pattern-based Security Methodology to Build Secure Information Systems. WOSIS 2011: 59-69 - [c109]Antonio Santos-Olmo Parra, Luís Enrique Sanchez, Eduardo Fernández-Medina, Mario Piattini:
Desirable Characteristics for an ISMS oriented to SMEs. WOSIS 2011: 151-158 - [c108]Angel Gallego, Antonio Santos-Olmo Parra, Luís Enrique Sanchez, Eduardo Fernández-Medina:
Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs. WOSIS 2011: 159-166 - 2010
- [j35]Daniel Mellado, Carlos Blanco
, Luís Enrique Sanchez, Eduardo Fernández-Medina
:
A systematic review of security requirements engineering. Comput. Stand. Interfaces 32(4): 153-165 (2010) - [j34]Miguel A. Martínez, Joaquín Lasheras
, Eduardo Fernández-Medina
, José Ambrosio Toval Álvarez, Mario Piattini
:
A Personal Data Audit Method through Requirements Engineering. Comput. Stand. Interfaces 32(4): 166-178 (2010) - [j33]Carlos Blanco
, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
, Juan Trujillo
, Mario Piattini
:
Defining and transforming security rules in an MDA approach for DWs. Int. J. Bus. Intell. Data Min. 5(2): 116-133 (2010) - [j32]David G. Rosado
, Eduardo Fernández-Medina
, Javier López
, Mario Piattini
:
Analysis of Secure Mobile Grid Systems: A systematic approach. Inf. Softw. Technol. 52(5): 517-536 (2010) - [j31]Alfonso Rodríguez
, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
, Mario Piattini
:
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach. Inf. Softw. Technol. 52(9): 945-971 (2010) - [j30]Daniel Mellado, Eduardo Fernández-Medina
, Mario Piattini
:
Security requirements engineering framework for software product lines. Inf. Softw. Technol. 52(10): 1094-1117 (2010) - [j29]David G. Rosado
, Eduardo Fernández-Medina, Javier López, Mario Piattini:
Developing a Secure Mobile Grid System through a UML Extension. J. Univers. Comput. Sci. 16(17): 2333-2352 (2010) - [c107]Luís Enrique Sanchez, Carlos Ruiz, Eduardo Fernández-Medina
, Mario Piattini
:
Managing the Asset Risk of SMEs. ARES 2010: 422-429 - [c106]Luís Enrique Sanchez, Antonio Santos-Olmo Parra
, Eduardo Fernández-Medina
, Mario Piattini
:
Security Culture in Small and Medium-Size Enterprise. CENTERIS (2) 2010: 315-324 - [c105]Daniel Mellado, Eduardo Fernández-Medina
, Mario Piattini
:
A comparison of software design security metrics. ECSA Companion Volume 2010: 236-242 - [c104]Belén Vela
, Carlos Blanco
, Eduardo Fernández-Medina
, Esperanza Marcos
:
Model driven development of secure XML data warehouses: a case study. EDBT/ICDT Workshops 2010 - [c103]David G. Rosado, Eduardo Fernández-Medina, Javier López:
A Study of Security Approaches for the Development of Mobile Grid Systems. ICSOFT (1) 2010: 133-138 - [c102]Carlos Gutiérrez, David G. Rosado, Eduardo Fernández-Medina:
The practical application of a process for eliciting and designing security in web service systems. JISBD 2010: 143-143 - [c101]Roberto Ortiz, Santiago Moral-García, Santiago Moral-Rubio, Belén Vela
, Javier Garzás, Eduardo Fernández-Medina
:
Applicability of Security Patterns. OTM Conferences (1) 2010: 672-684 - [c100]Carlos Blanco, Eduardo Fernández-Medina
, Juan Trujillo
, Jan Jürjens:
Towards the Secure Modelling of OLAP Users' Behaviour. Secure Data Management 2010: 101-112 - [c99]Luís Enrique Sanchez, Antonio Santos-Olmo Parra
, Eduardo Fernández-Medina
, Mario Piattini
:
Building ISMS through the Reuse of Knowledge. TrustBus 2010: 190-201
2000 – 2009
- 2009
- [j28]Eduardo Fernández-Medina, Alfonso Rodríguez, Mariemma Yague:
Guest Editorial. J. Res. Pract. Inf. Technol. 41(2): 85 (2009) - [j27]Carlos Blanco
, Ignacio García Rodríguez de Guzmán, David G. Rosado, Eduardo Fernández-Medina, Juan Trujillo:
Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services. J. Res. Pract. Inf. Technol. 41(2): 135-154 (2009) - [j26]Juan Trujillo
, Emilio Soler
, Eduardo Fernández-Medina
, Mario Piattini
:
A UML 2.0 profile to define security requirements for Data Warehouses. Comput. Stand. Interfaces 31(5): 969-983 (2009) - [j25]David G. Rosado, Eduardo Fernández-Medina
, Javier López, Mario Piattini:
Obtaining Security Requirements for a Mobile Grid System. Int. J. Grid High Perform. Comput. 1(3): 1-17 (2009) - [j24]Eduardo Fernández-Medina
, Jan Jürjens, Juan Trujillo
, Sushil Jajodia:
Model-Driven Development for secure information systems. Inf. Softw. Technol. 51(5): 809-814 (2009) - [j23]Juan Trujillo
, Emilio Soler
, Eduardo Fernández-Medina
, Mario Piattini
:
An engineering process for developing Secure Data Warehouses. Inf. Softw. Technol. 51(6): 1033-1051 (2009) - [j22]Carlos Gutiérrez, David G. Rosado
, Eduardo Fernández-Medina
:
The practical application of a process for eliciting and designing security in web service systems. Inf. Softw. Technol. 51(12): 1712-1738 (2009) - [j21]Emilio Soler, Juan Trujillo, Carlos Blanco
, Eduardo Fernández-Medina:
Designing Secure Data Warehouses by Using MDA and QVT. J. Univers. Comput. Sci. 15(8): 1607-1641 (2009) - [j20]Eduardo Fernández-Medina, Alfonso Rodríguez:
Security in Information Systems: New Advances and Tendencies. J. Univers. Comput. Sci. 15(15): 2912-2915 (2009) - [c98]Daniel Mellado, Jesús Rodríguez, Eduardo Fernández-Medina
, Mario Piattini
:
Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. ARES 2009: 224-231 - [c97]Carlos Blanco
, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
, Juan Trujillo
, Mario Piattini
:
Including Security Rules Support in an MDA Approach for Secure DWs. ARES 2009: 516-521 - [c96]Carlos Blanco
, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
, Juan Trujillo
, Mario Piattini
:
Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. ARES 2009: 528-533 - [c95]David G. Rosado, Eduardo Fernández-Medina, Javier López:
Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros. CIbSE 2009: 388-393 - [c94]Carlos Blanco, Ricardo Pérez-Castillo
, Arnulfo Hernández, Eduardo Fernández-Medina
, Juan Trujillo
:
Towards a Modernization Process for Secure Data Warehouses. DaWaK 2009: 24-35 - [c93]David G. Rosado
, Eduardo Fernández-Medina
, Javier López
:
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application. ER Workshops 2009: 126-136 - [c92]David G. Rosado
, Eduardo Fernández-Medina
, Javier López
:
Reusable security use cases for mobile grid environments. SESS@ICSE 2009: 1-8 - [c91]Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo:
Reingeniería sobre Almacenes de Datos Seguros aplicando ADM. JISBD 2009: 146-157 - [c90]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Towards security requirements management for software product lines: a security domain requirements engineering process. JISBD 2009: 267-267 - [c89]David G. Rosado, Eduardo Fernández-Medina, Javier López:
Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros. JISBD 2009: 331-342 - [c88]Luís Enrique Sanchez, Antonio Santos-Olmo Parra, Eduardo Fernández-Medina, Mario Piattini:
MMSM-SME: Methodology for the Management of Security and its Maturity in SME. WOSIS 2009: 67-78 - [p1]Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
An MDA Compliant Approach for Designing Secure Data Warehouses. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 637-647 - [e11]Eduardo Fernández-Medina, Manu Malek, Javier Hernando:
SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2009, ISBN 978-989-674-005-4 [contents] - [e10]Alfonso Rodríguez, Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina:
Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009. INSTICC Press 2009, ISBN 978-989-8111-91-3 [contents] - [r1]Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Data Warehouse Security. Encyclopedia of Database Systems 2009: 675-679 - 2008
- [j19]Eduardo Fernández-Medina
, Mariemma Inmaculada Yagüe del Valle
:
State of standards in the information systems security area. Comput. Stand. Interfaces 30(6): 339-340 (2008) - [j18]Emilio Soler
, Juan Trujillo
, Eduardo Fernández-Medina
, Mario Piattini
:
Building a secure star schema in data warehouses by an extension of the relational package from CWM. Comput. Stand. Interfaces 30(6): 341-350 (2008) - [j17]Daniel Mellado, Eduardo Fernández-Medina
, Mario Piattini
:
Towards security requirements management for software product lines: A security domain requirements engineering process. Comput. Stand. Interfaces 30(6): 361-371 (2008) - [j16]Carlos Blanco
, Eduardo Fernández-Medina
, Juan Trujillo
, Mario Piattini
:
How to implement multidimensional security into OLAP tools. Int. J. Bus. Intell. Data Min. 3(3): 255-276 (2008) - [c87]Emilio Soler
, Veronika Stefanov, Jose-Norberto Mazón
, Juan Trujillo
, Eduardo Fernández-Medina
, Mario Piattini
:
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. ARES 2008: 104-111 - [c86]David G. Rosado
, Eduardo Fernández-Medina
, Javier López
, Mario Piattini
:
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. ARES 2008: 136-143 - [c85]Carlos Blanco
, Joaquín Lasheras
, Rafael Valencia-García
, Eduardo Fernández-Medina
, José Ambrosio Toval Álvarez, Mario Piattini
:
A Systematic Review and Comparison of Security Ontologies. ARES 2008: 813-820 - [c84]Carlos Blanco
, Eduardo Fernández-Medina
, Juan Trujillo
, Mario Piattini
:
Implementing Multidimensional Security into OLAP Tools. ARES 2008: 1248-1253 - [c83]Daniel Mellado, Eduardo Fernández-Medina
, Mario Piattini
:
Security Requirements Variability for Software Product Lines. ARES 2008: 1413-1420 - [c82]Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Aplicando un Proceso de Ingeniería de Requisitos de Seguridad de Dominio para Líneas de Producto Software. CIbSE 2008: 141-154 - [c81]Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Modelado de Requisitos de Seguridad para Almacenes de Datos. CIbSE 2008: 281-294 - [c80]Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models. ER Workshops 2008: 103-112 - [c79]Daniel Mellado, Eduardo Fernández-Medina
, Mario Piattini
:
Security Requirements Management in Software Product Line Engineering. ICETE (Selected Papers) 2008: 250-263 - [c78]Daniel Mellado, Eduardo Fernández-Medina
, Mario Piattini
:
Security Requirements Engineering Process for Software Product Lines: A Case Study. ICSEA 2008: 1-6 - [c77]David G. Rosado, Eduardo Fernández-Medina, Mario Piattini, Javier López:
Engineering Process Based on Grid Use Cases for Mobile Grid Systems. ICSOFT (SE/MUSE/GSDCA) 2008: 146-151 - [c76]