2012
158A practical application of our MDD approach for modeling secure XML data warehouses. Belén Vela, Carlos Blanco, Eduardo Fernández-Medina, Esperanza Marcos. Decision Support Systems (52): 899-925 (2012). Web SearchBibTeXDownload
157Security Analysis in the Migration to Cloud Environments. David G. Rosado, Rafael Gómez, Daniel Mellado, Eduardo Fernández-Medina. Future Internet (4): 469-487 (2012). Web SearchBibTeXDownload
156HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management. Ismael Caballero, Luís Enrique Sanchez, Alberto Freitas, Eduardo Fernández-Medina. J. UCS (18): 1703-720 (2012). Web SearchBibTeXDownload
155Security in Information Systems: New Challenges and Opportunities. David G. Rosado, Luís Enrique Sanchez, Eduardo Fernández-Medina, Jan Jürjens. J. UCS (18): 728-731 (2012). Web SearchBibTeXDownload
154A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment. Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina. J. UCS (18): 798-815 (2012). Web SearchBibTeXDownload
2011
153Analysis of Application of Security Patterns to Build Secure Systems. Roberto Ortiz, Javier Garzás, Eduardo Fernández-Medina. CAiSE Workshops 2011, 652-659. Web SearchBibTeXDownload
152Basis for an integrated security ontology according to a systematic review of existing proposals. Carlos Blanco, Joaquín Lasheras, Eduardo Fernández-Medina, Rafael Valencia-García, José Ambrosio Toval Álvarez. Computer Standards & Interfaces (33): 372-388 (2011). Web SearchBibTeXDownload
151Secure business process model specification through a UML 2.0 activity diagram profile. Alfonso Rodríguez, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. Decision Support Systems (51): 446-465 (2011). Web SearchBibTeXDownload
150Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems. David G. Rosado, Eduardo Fernández-Medina, Javier López. IEICE Transactions (94-D): 243-254 (2011). Web SearchBibTeXDownload
149A Pattern for Web-based WSN Monitoring (Invited Paper). Anthony Marcus, Mihaela Cardei, Ionut Cardei, Eduardo Fernández-Medina, Fulvio Frati, Ernesto Damiani. JCM (6): 393-399 (2011). Web SearchBibTeXDownload
148Systematic design of secure Mobile Grid systems. David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini. J. Network and Computer Applications (34): 1168-1183 (2011). Web SearchBibTeXDownload
147Security services architecture for Secure Mobile Grid Systems. David G. Rosado, Eduardo Fernández-Medina, Javier López. Journal of Systems Architecture - Embedded Systems Design (57): 240-258 (2011). Web SearchBibTeXDownload
146Desirable Characteristics for an ISMS oriented to SMEs. Antonio Santos-Olmo Parra, Luís Enrique Sanchez, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2011, 151-158. Web SearchBibTeX
145Security Pattern Mining: Systematic Review and Proposal. Santiago Moral-García, Santiago Moral-Rubio, Eduardo Fernández-Medina. WOSIS 2011, 13-24. Web SearchBibTeX
144Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs. Angel Gallego, Antonio Santos-Olmo Parra, Luís Enrique Sanchez, Eduardo Fernández-Medina. WOSIS 2011, 159-166. Web SearchBibTeX
143A Comparative Review of Cloud Security Proposals with ISO/IEC 27002. Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina. WOSIS 2011, 3-12. Web SearchBibTeX
142Towards a Pattern-based Security Methodology to Build Secure Information Systems. Roberto Ortiz, Santiago Moral-Rubio, Javier Garzás, Eduardo Fernández-Medina. WOSIS 2011, 59-69. Web SearchBibTeX
2010
141Managing the Asset Risk of SMEs. Luís Enrique Sanchez, Carlos Ruiz, Eduardo Fernández-Medina, Mario Piattini. ARES 2010, 422-429. Web SearchBibTeXDownload
140Security Culture in Small and Medium-Size Enterprise. Luís Enrique Sanchez, Antonio Santos-Olmo Parra, Eduardo Fernández-Medina, Mario Piattini. CENTERIS (2) 2010, 315-324. Web SearchBibTeXDownload
139A systematic review of security requirements engineering. Daniel Mellado, Carlos Blanco, Luís Enrique Sanchez, Eduardo Fernández-Medina. Computer Standards & Interfaces (32): 153-165 (2010). Web SearchBibTeXDownload
138A Personal Data Audit Method through Requirements Engineering. Miguel A. Martínez, Joaquín Lasheras, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini. Computer Standards & Interfaces (32): 166-178 (2010). Web SearchBibTeXDownload
137A comparison of software design security metrics. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. ECSA Companion Volume 2010, 236-242. Web SearchBibTeXDownload
136Model driven development of secure XML data warehouses: a case study. Belén Vela, Carlos Blanco, Eduardo Fernández-Medina, Esperanza Marcos. EDBT/ICDT Workshops 2010. Web SearchBibTeXDownload
135A Study of Security Approaches for the Development of Mobile Grid Systems. David G. Rosado, Eduardo Fernández-Medina, Javier López. ICSOFT (1) 2010, 133-138. Web SearchBibTeX
134Defining and transforming security rules in an MDA approach for DWs. Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. IJBIDM (5): 116-133 (2010). Web SearchBibTeXDownload
133Analysis of Secure Mobile Grid Systems: A systematic approach. David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini. Information & Software Technology (52): 517-536 (2010). Web SearchBibTeXDownload
132Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach. Alfonso Rodríguez, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Mario Piattini. Information & Software Technology (52): 945-971 (2010). Web SearchBibTeXDownload
131Security requirements engineering framework for software product lines. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. Information & Software Technology (52): 1094-1117 (2010). Web SearchBibTeXDownload
130The practical application of a process for eliciting and designing security in web service systems. Carlos Gutiérrez, David G. Rosado, Eduardo Fernández-Medina. JISBD 2010, 143-143. Web SearchBibTeX
129Developing a Secure Mobile Grid System through a UML Extension. David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini. J. UCS (16): 2333-2352 (2010). Web SearchBibTeXDownload
128Applicability of Security Patterns. Roberto Ortiz, Santiago Moral-García, Santiago Moral-Rubio, Belén Vela, Javier Garzás, Eduardo Fernández-Medina. OTM Conferences (1) 2010, 672-684. Web SearchBibTeXDownload
127Towards the Secure Modelling of OLAP Users' Behaviour. Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Jan Jürjens. Secure Data Management 2010, 101-112. Web SearchBibTeXDownload
126Building ISMS through the Reuse of Knowledge. Luís Enrique Sanchez, Antonio Santos-Olmo Parra, Eduardo Fernández-Medina, Mario Piattini. TrustBus 2010, 190-201. Web SearchBibTeXDownload
2009
125Including Security Rules Support in an MDA Approach for Secure DWs. Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. ARES 2009, 516-521. Web SearchBibTeXDownload
124Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. Daniel Mellado, Jesús Rodríguez, Eduardo Fernández-Medina, Mario Piattini. ARES 2009, 224-231. Web SearchBibTeXDownload
123Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. ARES 2009, 528-533. Web SearchBibTeXDownload
122Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros. David G. Rosado, Eduardo Fernández-Medina, Javier López. CIbSE 2009, 388-393. Web SearchBibTeX
121A UML 2.0 profile to define security requirements for Data Warehouses. Juan Trujillo, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini. Computer Standards & Interfaces (31): 969-983 (2009). Web SearchBibTeXDownload
120An MDA Compliant Approach for Designing Secure Data Warehouses. Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009, 637-647. Web SearchBibTeXDownload
119Towards a Modernization Process for Secure Data Warehouses. Carlos Blanco, Ricardo Pérez-Castillo, Arnulfo Hernández, Eduardo Fernández-Medina, Juan Trujillo. DaWaK 2009, 24-35. Web SearchBibTeXDownload
118Data Warehouse Security. Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. Encyclopedia of Database Systems 2009, 675-679. Web SearchBibTeXDownload
117Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application. David G. Rosado, Eduardo Fernández-Medina, Javier López. ER Workshops 2009, 126-136. Web SearchBibTeXDownload
116Obtaining Security Requirements for a Mobile Grid System. David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini. IJGHPC (1): 1-17 (2009). Web SearchBibTeXDownload
115An engineering process for developing Secure Data Warehouses. Juan Trujillo, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini. Information & Software Technology (51): 1033-1051 (2009). Web SearchBibTeXDownload
114The practical application of a process for eliciting and designing security in web service systems. Carlos Gutiérrez, David G. Rosado, Eduardo Fernández-Medina. Information & Software Technology (51): 1712-1738 (2009). Web SearchBibTeXDownload
113Model-Driven Development for secure information systems. Eduardo Fernández-Medina, Jan Jürjens, Juan Trujillo, Sushil Jajodia. Information & Software Technology (51): 809-814 (2009). Cited by 3Web SearchBibTeXDownload
112Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros. David G. Rosado, Eduardo Fernández-Medina, Javier López. JISBD 2009, 331-342. Web SearchBibTeX
111Towards security requirements management for software product lines: a security domain requirements engineering process. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. JISBD 2009, 267-267. Web SearchBibTeX
110Reingeniería sobre Almacenes de Datos Seguros aplicando ADM. Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo. JISBD 2009, 146-157. Web SearchBibTeX
109Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services. Carlos Blanco, Ignacio García Rodríguez de Guzmán, David G. Rosado, Eduardo Fernández-Medina, Juan Trujillo. Journal of Research and Practice in Information Technology (41): 135-154 (2009). Web SearchBibTeXDownload
108Guest Editorial. Darrell Conklin, Tadeusz A. Wysocki, Hamid Sharif, L. C. Gundersen, P. P. Leahy, W. Hill, Jyh-Horng Wen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Keh-Ming Lu. Journal of Research and Practice in Information Technology (41): 85 (2009). Cited by 2Web SearchBibTeXDownload
107Designing Secure Data Warehouses by Using MDA and QVT. Emilio Soler, Juan Trujillo, Carlos Blanco, Eduardo Fernández-Medina. J. UCS (15): 1607-1641 (2009). Web SearchBibTeXDownload
106Security in Information Systems: New Advances and Tendencies. Eduardo Fernández-Medina, Alfonso Rodríguez. J. UCS (15): 2912-2915 (2009). Web SearchBibTeXDownload
105MMSM-SME: Methodology for the Management of Security and its Maturity in SME. Luís Enrique Sanchez, Antonio Santos-Olmo Parra, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2009, 67-78. Web SearchBibTeX
2008
104Implementing Multidimensional Security into OLAP Tools. Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. ARES 2008, 1248-1253. Web SearchBibTeXDownload
103PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices. David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini. ARES 2008, 136-143. Web SearchBibTeXDownload
102Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements. Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. ARES 2008, 104-111. Web SearchBibTeXDownload
101A Systematic Review and Comparison of Security Ontologies. Carlos Blanco, Joaquín Lasheras, Rafael Valencia-García, Eduardo Fernández-Medina, José Ambrosio Toval Álvarez, Mario Piattini. ARES 2008, 813-820. Web SearchBibTeXDownload
100Security Requirements Variability for Software Product Lines. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. ARES 2008, 1413-1420. Web SearchBibTeXDownload
99Modelado de Requisitos de Seguridad para Almacenes de Datos. Emilio Soler, Veronika Stefanov, Jose-Norberto Mazón, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. CIbSE 2008, 281-294. Web SearchBibTeX
98Aplicando un Proceso de Ingeniería de Requisitos de Seguridad de Dominio para Líneas de Producto Software. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. CIbSE 2008, 141-154. Web SearchBibTeX
97Building a secure star schema in data warehouses by an extension of the relational package from CWM. Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. Computer Standards & Interfaces (30): 341-350 (2008). Web SearchBibTeXDownload
96State of standards in the information systems security area. Eduardo Fernández-Medina, Mariemma Inmaculada Yagüe del Valle. Computer Standards & Interfaces (30): 339-340 (2008). Web SearchBibTeXDownload
95Towards security requirements management for software product lines: A security domain requirements engineering process. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. Computer Standards & Interfaces (30): 361-371 (2008). Web SearchBibTeXDownload
94Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. ER Workshops 2008, 103-112. Web SearchBibTeXDownload
93Security Requirements Engineering Process for Software Product Lines: A Case Study. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. ICSEA 2008, 1-6. Web SearchBibTeXDownload
92Engineering Process Based on Grid Use Cases for Mobile Grid Systems. David G. Rosado, Eduardo Fernández-Medina, Mario Piattini, Javier López. ICSOFT (SE/MUSE/GSDCA) 2008, 146-151. Web SearchBibTeX
91How to implement multidimensional security into OLAP tools. Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. IJBIDM (3): 255-276 (2008). Web SearchBibTeXDownload
90Gestión de la Variabilidad de los Requisitos de Seguridad en Líneas de Producto. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. JISBD 2008, 39-50. Web SearchBibTeX
89Construcción de Modelos Lógicos Multidimensionales Seguros para su Implementación en Herramientas OLAP Mediante MDA y QVT. Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. JISBD 2008, 373-378. Web SearchBibTeX
88Hacia la Implementación Automática de Almacenes de Datos Seguros en Herramientas OLAP. Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. JISBD 2008, 205-216. Web SearchBibTeX
87Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach. Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. OTM Conferences (2) 2008, 1052-1068. Web SearchBibTeXDownload
86Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas. Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini. SECRYPT 2008, 391-398. Web SearchBibTeX
85Security Requirements in Software Product Lines. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. SECRYPT 2008, 442-449. Web SearchBibTeX
84Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT. Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. WOSIS 2008, 38-48. Web SearchBibTeX
2007
83A Framework for the Development of Secure Data Warehouses based on MDA and QVT. Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. ARES 2007, 294-300. Web SearchBibTeXDownload
82Application of QVT for the Development of Secure Data Warehouses: A case study. Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. ARES 2007, 829-836. Web SearchBibTeXDownload
81A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses. Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. ARES 2007, 644-654. Web SearchBibTeXDownload
80Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. BPM 2007, 408-415. Web SearchBibTeXDownload
79Aplicación de QVT al Desarrollo de Almacenes de Datos Seguros: Un caso de Estudio. Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. CIbSE 2007, 209-222. Web SearchBibTeX
78Soporte Automatizado a la Ingeniería de Requisitos de Seguridad. Daniel Mellado, Moisés Rodríguez, Eduardo Fernández-Medina, Mario Piattini. CIbSE 2007, 17-30. Web SearchBibTeX
77A common criteria based security requirements engineering process for the development of secure information systems. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. Computer Standards & Interfaces (29): 244-253 (2007). Web SearchBibTeXDownload
76An MDA. appproach to develop secure business processes through a UML 2.0 extension. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. Comput. Syst. Sci. Eng. (22) (2007). Web SearchBibTeX
75CIM to PIM Transformation: A Reality. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. CONFENIS (2) 2007, 1239-1249. Web SearchBibTeXDownload
74Model-driven multidimensional modeling of secure data warehouses. Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. EJIS (16): 374-389 (2007). Web SearchBibTeXDownload
73M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. ER Workshops 2007, 106-115. Web SearchBibTeXDownload
72Defining Security Architectural Patterns Based on Viewpoints. David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. ICCSA (3) 2007, 262-272. Web SearchBibTeXDownload
71Data Quality in XML Databases - A Methodology for Semi-Structured Database Design Supporting Data Quality Issues. Eugenio Verbo, Ismael Caballero, Eduardo Fernández-Medina, Mario Piattini. ICSOFT (ISDM/EHST/DC) 2007, 117-122. Web SearchBibTeX
70Scmm-Tool - Tool for Computer Automation of the Information Security Management Systems. Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini. ICSOFT (SE) 2007, 311-318. Web SearchBibTeX
69Web Services-Based Security Requirement Elicitation. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. IEICE Transactions (90-D): 1374-1387 (2007). Web SearchBibTeXDownload
68A BPMN Extension for the Modeling of Security Requirements in Business Processes. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. IEICE Transactions (90-D): 745-752 (2007). Web SearchBibTeXDownload
67Developing secure data warehouses with a UML extension. Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini. Inf. Syst. (32): 826-856 (2007). Web SearchBibTeXDownload
66Transformaciones QVT para la obtención de Clases de Análisis a partir de un Modelo de Proceso de Negocio Seguro. Alfonso Rodríguez, Ignacio García, Eduardo Fernández-Medina, Mario Piattini. JISBD 2007, 361-366. Web SearchBibTeXDownload
65Una extensión del metamodelo relacional de CWM para representar Almacenes de Datos Seguros a nivel lógico. Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. JISBD 2007, 83-92. Web SearchBibTeXDownload
64Especificación de Procesos de Negocio Seguros a través de una extensión de UML 2.0. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo. JISBD 2007, 336-345. Web SearchBibTeXDownload
63Gestión Integral de Requisitos de Seguridad en Líneas de Producto Software. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. JISBD 2007, 177-186. Web SearchBibTeXDownload
62Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises. Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini. SECRYPT 2007, 355-362. Web SearchBibTeX
61Analysis-Level Classes from Secure Business Processes Through Model Transformations. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. TrustBus 2007, 104-114. Web SearchBibTeXDownload
60SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2007, 220-232. Web SearchBibTeX
59SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level. Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2007, 245-256. Web SearchBibTeX
2006
58A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. ARES 2006, 654-661. Web SearchBibTeXDownload
57Security Requirement with a UML 2.0 Profile. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. ARES 2006, 670-677. Web SearchBibTeXDownload
56Representing levels of abstraction to facilitate the Secure Multidimensional Modeling. Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo. ARES 2006, 678-684. Web SearchBibTeXDownload
55Practical Approach of a Secure Management System based on ISO/IEC 17799. Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini. ARES 2006, 585-592. Web SearchBibTeXDownload
54A Study of Security Architectural Patterns. David G. Rosado, Eduardo Fernández-Medina, Mario Piattini, Carlos Gutiérrez. ARES 2006, 358-365. Web SearchBibTeXDownload
53Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel. Emilio Soler, Rodolfo Villarroel, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. ARES 2006, 914-921. Web SearchBibTeXDownload
52Quality of Password Management Policy. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini. ARES 2006, 544-550. Web SearchBibTeXDownload
51Análisis Comparativo de Propuestas de Establecimiento de Requisitos de Seguridad para el Desarrollo de Sistemas de Información Seguros. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. CIbSE 2006, 345-358. Web SearchBibTeX
50Extensión de UML 2.0 para especificar Requisitos de Seguridad en Procesos de Negocios. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. CIbSE 2006, 375-388. Web SearchBibTeX
49Una Aproximación Dirigida por Modelos para el Diseño de Bases de Datos XML Seguras. Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini. CIbSE 2006, 229-242. Web SearchBibTeX
48Access control and audit model for the multidimensional modeling of data warehouses. Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini. Decision Support Systems (42): 1270-1289 (2006). Web SearchBibTeXDownload
47Un Conjunto de Transformaciones QVT para el Modelado de Almacenes de Datos Seguros. Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini. DSDM 2006. Web SearchBibTeXDownload
46Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. ER (Workshops) 2006, 32-42. Web SearchBibTeXDownload
45Applying a Security Requirements Engineering Process. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. ESORICS 2006, 192-206. Web SearchBibTeXDownload
44A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. ICCSA (3) 2006, 1044-1053. Web SearchBibTeXDownload
43Using UML Packages for Designing Secure Data Warehouses. Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. ICCSA (3) 2006, 1024-1034. Web SearchBibTeXDownload
42Metrics of Password Management Policy. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini. ICCSA (3) 2006, 1013-1023. Web SearchBibTeXDownload
41PWSSec: Process for Web Services Security. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. ICWS 2006, 213-222. Web SearchBibTeXDownload
40Security patterns and requirements for internet-based applications. David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. Internet Research (16): 519-536 (2006). Web SearchBibTeXDownload
39Developing web services security systems: a case study. Eduardo Fernández-Medina, Carlos A. Gutiérrez, Mario Piattini. Int. J. Web Eng. Technol. (2): 292-306 (2006). Web SearchBibTeXDownload
38Aplicación práctica de un proceso de ingeniería de requisitos de seguridad. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. JISBD 2006, 315-324. Web SearchBibTeX
37Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. JISBD 2006, 347-356. Web SearchBibTeX
36A UML 2.0/OCL Extension for Designing Secure Data Warehouses. Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini, Juan Trujillo. Journal of Research and Practice in Information Technology (38) (2006). Web SearchBibTeXDownload
35Towards a Process for Web Services Security. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. Journal of Research and Practice in Information Technology (38) (2006). Web SearchBibTeXDownload
34Security Risk Analysis in Web Services Systems. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. SECRYPT 2006, 425-430. Web SearchBibTeX
33Secure Information Systems Development - Based on a Security Requirements Engineering Process. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. SECRYPT 2006, 467-470. Web SearchBibTeX
32Defining Viewpoints for Security Architectural Patterns. David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. SECRYPT 2006, 419-424. Web SearchBibTeX
31Model driven development of secure XML databases. Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini. SIGMOD Record (35): 22-27 (2006). Web SearchBibTeXDownload
30Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. TrustBus 2006, 51-61. Web SearchBibTeXDownload
29Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises. Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2006, 256-266. Web SearchBibTeX
28Security Patterns Related to Security Requirements. David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2006, 163-173. Web SearchBibTeX
27A Model Driven Approach for Secure XML Database Development. Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini. WOSIS 2006, 33-46. Web SearchBibTeX
26Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2006, 174-184. Web SearchBibTeX
25SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2006, 135-145. Web SearchBibTeX
2005
24Un Modelo de Seguridad para Almacenes de Datos e Implementación Semiautomática con OLS10g. Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. CIbSE 2005, 243-254. Web SearchBibTeX
23Representación de Requisitos de Seguridad en el Modelado de Procesos de Negocios. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. CIbSE 2005, 255-266. Web SearchBibTeX
22Secure information systems development - a survey and comparison. Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini. Computers & Security (24): 308-321 (2005). Web SearchBibTeXDownload
21Designing secure databases. Eduardo Fernández-Medina, Mario Piattini. Information & Software Technology (47): 463-477 (2005). Web SearchBibTeXDownload
20PWSSEC: Proceso de Desarrollo para Seguridad de Servicios. Carlos Gutiérrez García, Eduardo Fernández-Medina, Mario Piattini. JISBD 2005, 203-210. Web SearchBibTeX
19Web services enterprise security architecture: a case study. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. SWS 2005, 10-19. Web SearchBibTeXDownload
18Towards a UML 2.0/OCL extension for designing Secure Data Warehouses. Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. WOSIS 2005, 217-228. Web SearchBibTeX
17Towards an integration of Security Requirements into Business Process Modeling. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2005, 287-297. Web SearchBibTeX
16Towards a Process for Web Services Security. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2005, 298-308. Web SearchBibTeX
2004
15A Comparison of Secure Information Systems Design Methodologies. Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini. CAiSE Workshops (1) 2004, 189-198. Web SearchBibTeX
14Incorporating Security Issues in the Information Systems Design. Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini. ENC 2004, 345-352. Web SearchBibTeXDownload
13Extending UML for Designing Secure Data Warehouses. Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini. ER 2004, 217-230. Web SearchBibTeXDownload
12A Survey of Web Services Security. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. ICCSA (1) 2004, 968-977. Web SearchBibTeXDownload
11Web Services Security: Is the Problem Solved?. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. Information Systems Security (13): 22-31 (2004). Web SearchBibTeXDownload
10Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini. Security and Management 2004, 109-117. Web SearchBibTeX
9General Considerations on Data Warehouse Security. Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini. Security and Management 2004, 242-248. Web SearchBibTeX
8Extending OCL for Secure Database Development. Eduardo Fernández-Medina, Mario Piattini. UML 2004, 380-394. Web SearchBibTeXDownload
7Web Services Security: is the problem solved?. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2004, 293-304. Web SearchBibTeX
6Towards a Classification of Security Metrics. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini. WOSIS 2004, 342-350. Web SearchBibTeX
2003
5A Methodology for Multilevel Database Design. Eduardo Fernández-Medina, Mario Piattini. CAiSE Short Paper Proceedings 2003. Web SearchBibTeXDownload
4Designing Secure Databases for OLS. Eduardo Fernández-Medina, Mario Piattini. DEXA 2003, 886-895. Web SearchBibTeXDownload
3Implementing an Access Control System for SVG Documents. Eduardo Fernández-Medina, G. Ruiz, Sabrina De Capitani di Vimercati. OTM Workshops 2003, 741-753. Web SearchBibTeXDownload
2002
2Access Control of SVG Documents. Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati. DBSec 2002, 219-230. Cited by 19Web SearchBibTeX
1UML for the Design of Secure Databases. Eduardo Fernández-Medina, Mario Piattini. SIS 2002, 25-38. Web SearchBibTeX
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research