Eduardo Fernández-Medina

Orcid: 0000-0003-2553-9320

According to our database1, Eduardo Fernández-Medina authored at least 201 papers between 2002 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks.
Comput. Stand. Interfaces, 2025

2024
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals.
Frontiers Comput. Sci., June, 2024

Maritime cybersecurity: protecting digital seas.
Int. J. Inf. Sec., April, 2024

Minimizing incident response time in real-world scenarios using quantum computing.
Softw. Qual. J., March, 2024

Enabling security risk assessment and management for business process models.
J. Inf. Secur. Appl., 2024

2023
Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning.
Internet Things, December, 2023

A Systematic Analysis of Security in Blockchain.
J. Inf. Sci. Eng., 2023

New Frontiers in Security Risk Management.
IT Prof., 2023

Towards a Quantum World in Cybersecurity Land.
Proceedings of the Joint Proceedings of the Workshops, 2023

2022
Security policies by design in NoSQL document databases.
J. Inf. Secur. Appl., 2022

Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern.
Comput. Ind., 2022

2021
Improving security in NoSQL document databases through model-driven modernization.
Knowl. Inf. Syst., 2021

Security Reference Architecture for Cyber-Physical Systems (CPS).
J. Univers. Comput. Sci., 2021

MARISMA-BiDa pattern: Integrated risk analysis for big data.
Comput. Secur., 2021

CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems.
Comput. Ind., 2021

2020
Application of security reference architecture to Big Data ecosystems in an industrial scenario.
Softw. Pract. Exp., 2020

Definition and Verification of Security Configurations of Cyber-Physical Systems.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
Secure Development of Big Data Ecosystems.
IEEE Access, 2019

BlockBD: a security pattern to incorporate blockchain in big data ecosystems.
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019

2018
Data Warehouse Security.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

A Security Pattern for Key-Value NoSQL Database Authorization.
Proceedings of the 23rd European Conference on Pattern Languages of Programs, 2018

How the Conceptual Modelling Improves the Security on Document Databases.
Proceedings of the Conceptual Modeling - 37th International Conference, 2018

Towards a Security Reference Architecture for Big Data.
Proceedings of the 20th International Workshop on Design, 2018

Modelado de Requisitos de Seguridad para Big Data.
Proceedings of the XXI Iberoamerican Conference on Software Engineering, 2018

2016
Development of an Expert System for the Evaluation of Students' Curricula on the Basis of Competencies.
Future Internet, 2016

Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems.
Future Internet, 2016

The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets.
Future Internet, 2016

Main Issues in Big Data Security.
Future Internet, 2016

Securing Databases Using Big Data Technology.
Proceedings of the 21st International Conference on Information Quality, 2016

2015
Empirical evaluation of a cloud computing information security governance framework.
Inf. Softw. Technol., 2015

An architecture for automatically developing secure OLAP applications from models.
Inf. Softw. Technol., 2015

An MDA approach for developing secure OLAP applications: Metamodels and transformations.
Comput. Sci. Inf. Syst., 2015

ISGcloud: a Security Governance Framework for Cloud Computing.
Comput. J., 2015

Modernizing Secure OLAP Applications with a Model-Driven Approach.
Comput. J., 2015

Modelling secure cloud systems based on system requirements.
Proceedings of the 2nd IEEE Workshop on Evolving Security and Privacy Requirements Engineering, 2015

Eliciting Security Requirements for Business Processes of Legacy Systems.
Proceedings of the Practice of Enterprise Modeling, 2015

A Framework for Secure Migration Processes of Legacy Systems to the Cloud.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2014
Enterprise security pattern: a new type of security pattern.
Secur. Commun. Networks, 2014

Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications.
J. Univers. Comput. Sci., 2014

Enterprise security pattern: A model-driven architecture instance.
Comput. Stand. Interfaces, 2014

Secure Tropos framework for software product lines requirements engineering.
Comput. Stand. Interfaces, 2014

Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study.
Proceedings of the WOSIS 2014, 2014

2013
An analysis of security issues for cloud computing.
J. Internet Serv. Appl., 2013

Development of Secure XML Data Warehouses with QVT.
Inf. Softw. Technol., 2013

2012
Security in Information Systems: New Challenges and Opportunities.
J. Univers. Comput. Sci., 2012

A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment.
J. Univers. Comput. Sci., 2012

HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management.
J. Univers. Comput. Sci., 2012

Security Analysis in the Migration to Cloud Environments.
Future Internet, 2012

A practical application of our MDD approach for modeling secure XML data warehouses.
Decis. Support Syst., 2012

2011
Security services architecture for Secure Mobile Grid Systems.
J. Syst. Archit., 2011

Systematic design of secure Mobile Grid systems.
J. Netw. Comput. Appl., 2011

A Pattern for Web-based WSN Monitoring (Invited Paper).
J. Commun., 2011

Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems.
IEICE Trans. Inf. Syst., 2011

Secure business process model specification through a UML 2.0 activity diagram profile.
Decis. Support Syst., 2011

Basis for an integrated security ontology according to a systematic review of existing proposals.
Comput. Stand. Interfaces, 2011

A Comparative Review of Cloud Security Proposals with ISO/IEC 27002.
Proceedings of the WOSIS 2011, 2011

Desirable Characteristics for an ISMS oriented to SMEs.
Proceedings of the WOSIS 2011, 2011

Towards a Pattern-based Security Methodology to Build Secure Information Systems.
Proceedings of the WOSIS 2011, 2011

Security Pattern Mining: Systematic Review and Proposal.
Proceedings of the WOSIS 2011, 2011

Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs.
Proceedings of the WOSIS 2011, 2011

Analysis of Application of Security Patterns to Build Secure Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2011

2010
Developing a Secure Mobile Grid System through a UML Extension.
J. Univers. Comput. Sci., 2010

Analysis of Secure Mobile Grid Systems: A systematic approach.
Inf. Softw. Technol., 2010

Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach.
Inf. Softw. Technol., 2010

Security requirements engineering framework for software product lines.
Inf. Softw. Technol., 2010

Defining and transforming security rules in an MDA approach for DWs.
Int. J. Bus. Intell. Data Min., 2010

A systematic review of security requirements engineering.
Comput. Stand. Interfaces, 2010

A Personal Data Audit Method through Requirements Engineering.
Comput. Stand. Interfaces, 2010

Building ISMS through the Reuse of Knowledge.
Proceedings of the Trust, 2010

Towards the Secure Modelling of OLAP Users' Behaviour.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

Applicability of Security Patterns.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

A Study of Security Approaches for the Development of Mobile Grid Systems.
Proceedings of the ICSOFT 2010, 2010

Model driven development of secure XML data warehouses: a case study.
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010

A comparison of software design security metrics.
Proceedings of the Software Architecture, 4th European Conference, 2010

Security Culture in Small and Medium-Size Enterprise.
Proceedings of the ENTERprise Information Systems - International Conference, 2010

Managing the Asset Risk of SMEs.
Proceedings of the ARES 2010, 2010

2009
Data Warehouse Security.
Proceedings of the Encyclopedia of Database Systems, 2009

Designing Secure Data Warehouses by Using MDA and QVT.
J. Univers. Comput. Sci., 2009

Security in Information Systems: New Advances and Tendencies.
J. Univers. Comput. Sci., 2009

An engineering process for developing Secure Data Warehouses.
Inf. Softw. Technol., 2009

The practical application of a process for eliciting and designing security in web service systems.
Inf. Softw. Technol., 2009

Model-Driven Development for secure information systems.
Inf. Softw. Technol., 2009

Obtaining Security Requirements for a Mobile Grid System.
Int. J. Grid High Perform. Comput., 2009

A UML 2.0 profile to define security requirements for Data Warehouses.
Comput. Stand. Interfaces, 2009

Guest Editorial.
J. Res. Pract. Inf. Technol., 2009

Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services.
J. Res. Pract. Inf. Technol., 2009

MMSM-SME: Methodology for the Management of Security and its Maturity in SME.
Proceedings of the Security in Information Systems, 2009

Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros.
Proceedings of the XIV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2009), 2009

Reingeniería sobre Almacenes de Datos Seguros aplicando ADM.
Proceedings of the XIV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2009), 2009

Reusable security use cases for mobile grid environments.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application.
Proceedings of the Advances in Conceptual Modeling - Challenging Perspectives, 2009

Towards a Modernization Process for Secure Data Warehouses.
Proceedings of the Data Warehousing and Knowledge Discovery, 11th International Conference, 2009

Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros.
Proceedings of the Memorias de la XII Conferencia Iberoamericana de Software Engineering (CIbSE 2009), 2009

Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering.
Proceedings of the The Forth International Conference on Availability, 2009

Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs.
Proceedings of the The Forth International Conference on Availability, 2009

Including Security Rules Support in an MDA Approach for Secure DWs.
Proceedings of the The Forth International Conference on Availability, 2009

An MDA Compliant Approach for Designing Secure Data Warehouses.
Proceedings of the Database Technologies: Concepts, 2009

2008
How to implement multidimensional security into OLAP tools.
Int. J. Bus. Intell. Data Min., 2008

Building a secure star schema in data warehouses by an extension of the relational package from CWM.
Comput. Stand. Interfaces, 2008

Towards security requirements management for software product lines: A security domain requirements engineering process.
Comput. Stand. Interfaces, 2008

State of standards in the information systems security area.
Comput. Stand. Interfaces, 2008

Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT.
Proceedings of the Security in Information Systems, 2008

Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas.
Proceedings of the SECRYPT 2008, 2008

Security Requirements in Software Product Lines.
Proceedings of the SECRYPT 2008, 2008

Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Automatic Generation of Secure Multidimensional Code for Data Warehouses by using QVT Transformations: an MDA Approach.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Gestión de la Variabilidad de los Requisitos de Seguridad en Líneas de Producto.
Proceedings of the XIII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2008), 2008

Construcción de Modelos Lógicos Multidimensionales Seguros para su Implementación en Herramientas OLAP Mediante MDA y QVT.
Proceedings of the XIII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2008), 2008

Hacia la Implementación Automática de Almacenes de Datos Seguros en Herramientas OLAP.
Proceedings of the XIII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2008), 2008

Engineering Process Based on Grid Use Cases for Mobile Grid Systems.
Proceedings of the ICSOFT 2008, 2008

Security Requirements Engineering Process for Software Product Lines: A Case Study.
Proceedings of the Third International Conference on Software Engineering Advances, 2008

Security Requirements Management in Software Product Line Engineering.
Proceedings of the e-Business and Telecommunications - International Conference, 2008

Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models.
Proceedings of the Advances in Conceptual Modeling - Challenges and Opportunities, 2008

Modelado de Requisitos de Seguridad para Almacenes de Datos.
Proceedings of the Memorias de la XI Conferencia Iberoamericana de Software Engineering (CIbSE 2008), 2008

Aplicando un Proceso de Ingeniería de Requisitos de Seguridad de Dominio para Líneas de Producto Software.
Proceedings of the Memorias de la XI Conferencia Iberoamericana de Software Engineering (CIbSE 2008), 2008

Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements.
Proceedings of the The Third International Conference on Availability, 2008

PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices.
Proceedings of the The Third International Conference on Availability, 2008

Security Requirements Variability for Software Product Lines.
Proceedings of the The Third International Conference on Availability, 2008

A Systematic Review and Comparison of Security Ontologies.
Proceedings of the The Third International Conference on Availability, 2008

Implementing Multidimensional Security into OLAP Tools.
Proceedings of the The Third International Conference on Availability, 2008

2007
Developing secure data warehouses with a UML extension.
Inf. Syst., 2007

A BPMN Extension for the Modeling of Security Requirements in Business Processes.
IEICE Trans. Inf. Syst., 2007

Web Services-Based Security Requirement Elicitation.
IEICE Trans. Inf. Syst., 2007

Model-driven multidimensional modeling of secure data warehouses.
Eur. J. Inf. Syst., 2007

An MDA. appproach to develop secure business processes through a UML 2.0 extension.
Comput. Syst. Sci. Eng., 2007

A common criteria based security requirements engineering process for the development of secure information systems.
Comput. Stand. Interfaces, 2007

Analysis-Level Classes from Secure Business Processes Through Model Transformations.
Proceedings of the Trust, 2007

SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level.
Proceedings of the Security in Information Systems, 2007

SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines.
Proceedings of the Security in Information Systems, 2007

Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises.
Proceedings of the SECRYPT 2007, 2007

Una extensión del metamodelo relacional de CWM para representar Almacenes de Datos Seguros a nivel lógico.
Proceedings of the XII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2007), 2007

Transformaciones QVT para la obtención de Clases de Análisis a partir de un Modelo de Proceso de Negocio Seguro.
Proceedings of the XII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2007), 2007

Especificación de Procesos de Negocio Seguros a través de una extensión de UML 2.0.
Proceedings of the XII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2007), 2007

Gestión Integral de Requisitos de Seguridad en Líneas de Producto Software.
Proceedings of the XII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2007), 2007

CIM to PIM Transformation: A Reality.
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007

Data Quality in XML Databases - A Methodology for Semi-Structured Database Design Supporting Data Quality Issues.
Proceedings of the ICSOFT 2007, 2007

Scmm-Tool - Tool for Computer Automation of the Information Security Management Systems.
Proceedings of the ICSOFT 2007, 2007

Defining Security Architectural Patterns Based on Viewpoints.
Proceedings of the Computational Science and Its Applications, 2007

M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification.
Proceedings of the Advances in Conceptual Modeling - Foundations and Applications, 2007

Aplicación de QVT al Desarrollo de Almacenes de Datos Seguros: Un caso de Estudio.
Proceedings of the Memorias de la X Conferencia Iberoamericana de Software Engineering (CIbSE 2007), 2007

Soporte Automatizado a la Ingeniería de Requisitos de Seguridad.
Proceedings of the Memorias de la X Conferencia Iberoamericana de Software Engineering (CIbSE 2007), 2007

Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases.
Proceedings of the Business Process Management, 5th International Conference, 2007

Application of QVT for the Development of Secure Data Warehouses: A case study.
Proceedings of the The Second International Conference on Availability, 2007

A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses.
Proceedings of the The Second International Conference on Availability, 2007

A Framework for the Development of Secure Data Warehouses based on MDA and QVT.
Proceedings of the The Second International Conference on Availability, 2007

2006
Model driven development of secure XML databases.
SIGMOD Rec., 2006

Security patterns and requirements for internet-based applications.
Internet Res., 2006

Developing web services security systems: a case study.
Int. J. Web Eng. Technol., 2006

Access control and audit model for the multidimensional modeling of data warehouses.
Decis. Support Syst., 2006

A UML 2.0/OCL Extension for Designing Secure Data Warehouses.
J. Res. Pract. Inf. Technol., 2006

Towards a Process for Web Services Security.
J. Res. Pract. Inf. Technol., 2006

Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

A Model Driven Approach for Secure XML Database Development.
Proceedings of the Security in Information Systems, 2006

Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises.
Proceedings of the Security in Information Systems, 2006

Security Patterns Related to Security Requirements.
Proceedings of the Security in Information Systems, 2006

Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams.
Proceedings of the Security in Information Systems, 2006

SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems.
Proceedings of the Security in Information Systems, 2006

Defining Viewpoints for Security Architectural Patterns.
Proceedings of the SECRYPT 2006, 2006

Secure Information Systems Development - Based on a Security Requirements Engineering Process.
Proceedings of the SECRYPT 2006, 2006

Security Risk Analysis in Web Services Systems.
Proceedings of the SECRYPT 2006, 2006

Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio.
Proceedings of the XI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2006), 2006

Aplicación práctica de un proceso de ingeniería de requisitos de seguridad.
Proceedings of the XI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2006), 2006

PWSSec: Process for Web Services Security.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Metrics of Password Management Policy.
Proceedings of the Computational Science and Its Applications, 2006

Using UML Packages for Designing Secure Data Warehouses.
Proceedings of the Computational Science and Its Applications, 2006

A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems.
Proceedings of the Computational Science and Its Applications, 2006

Applying a Security Requirements Engineering Process.
Proceedings of the Computer Security, 2006

Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile.
Proceedings of the Advances in Conceptual Modeling - Theory and Practice, 2006

Un Conjunto de Transformaciones QVT para el Modelado de Almacenes de Datos Seguros.
Proceedings of the Actas del Taller sobre Desarrollo de Software Dirigido por Modelos. MDA y Aplicaciones. Sitges, 2006

Una Aproximación Dirigida por Modelos para el Diseño de Bases de Datos XML Seguras.
Proceedings of the Memorias de la IX Conferenci a Iberoamericana de Software Engineering (CIbSE 2006), 2006

Extensión de UML 2.0 para especificar Requisitos de Seguridad en Procesos de Negocios.
Proceedings of the Memorias de la IX Conferenci a Iberoamericana de Software Engineering (CIbSE 2006), 2006

Análisis Comparativo de Propuestas de Establecimiento de Requisitos de Seguridad para el Desarrollo de Sistemas de Información Seguros.
Proceedings of the Memorias de la IX Conferenci a Iberoamericana de Software Engineering (CIbSE 2006), 2006

Quality of Password Management Policy.
Proceedings of the The First International Conference on Availability, 2006

Representing levels of abstraction to facilitate the Secure Multidimensional Modeling.
Proceedings of the The First International Conference on Availability, 2006

Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel.
Proceedings of the The First International Conference on Availability, 2006

Practical Approach of a Secure Management System based on ISO/IEC 17799.
Proceedings of the The First International Conference on Availability, 2006

A Study of Security Architectural Patterns.
Proceedings of the The First International Conference on Availability, 2006

Security Requirement with a UML 2.0 Profile.
Proceedings of the The First International Conference on Availability, 2006

A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements.
Proceedings of the The First International Conference on Availability, 2006

2005
Designing secure databases.
Inf. Softw. Technol., 2005

Secure information systems development - a survey and comparison.
Comput. Secur., 2005

Web services enterprise security architecture: a case study.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

Towards a UML 2.0/OCL extension for designing Secure Data Warehouses.
Proceedings of the Security in Information Systems, 2005

Towards an integration of Security Requirements into Business Process Modeling.
Proceedings of the Security in Information Systems, 2005

PWSSEC: Proceso de Desarrollo para Seguridad de Servicios.
Proceedings of the Actas de las X Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2005), 2005

Un Modelo de Seguridad para Almacenes de Datos e Implementación Semiautomática con OLS10g.
Proceedings of the Memorias de la VIII Conferencia Iberoamericana de Software Engineering (CIbSE 2005), 2005

Representación de Requisitos de Seguridad en el Modelado de Procesos de Negocios.
Proceedings of the Memorias de la VIII Conferencia Iberoamericana de Software Engineering (CIbSE 2005), 2005

2004
Web Services Security: Is the Problem Solved?
Inf. Secur. J. A Glob. Perspect., 2004

Extending OCL for Secure Database Development.
Proceedings of the «UML» 2004, 2004

Towards a Classification of Security Metrics.
Proceedings of the Security In Information Systems, 2004

A Survey of Web Services Security.
Proceedings of the Computational Science and Its Applications, 2004

Extending UML for Designing Secure Data Warehouses.
Proceedings of the Conceptual Modeling, 2004

Incorporating Security Issues in the Information Systems Design.
Proceedings of the 5th Mexican International Conference on Computer Science (ENC 2004), 2004

Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics.
Proceedings of the International Conference on Security and Management, 2004

General Considerations on Data Warehouse Security.
Proceedings of the International Conference on Security and Management, 2004

A Comparison of Secure Information Systems Design Methodologies.
Proceedings of the CAiSE'04 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering, 2004

2003
Implementing an Access Control System for SVG Documents.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

Designing Secure Databases for OLS.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

A Methodology for Multilevel Database Design.
Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE '03), 2003

2002
UML for the Design of Secure Databases.
Proceedings of the Security in Information Systems, 2002

Access Control of SVG Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002


  Loading...