Eduardo Fernández-Medina
Orcid: 0000-0003-2553-9320
According to our database1,
Eduardo Fernández-Medina
authored at least 201 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks.
Comput. Stand. Interfaces, 2025
2024
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals.
Frontiers Comput. Sci., June, 2024
Softw. Qual. J., March, 2024
J. Inf. Secur. Appl., 2024
2023
Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning.
Internet Things, December, 2023
Proceedings of the Joint Proceedings of the Workshops, 2023
2022
Comput. Ind., 2022
2021
Knowl. Inf. Syst., 2021
J. Univers. Comput. Sci., 2021
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems.
Comput. Ind., 2021
2020
Application of security reference architecture to Big Data ecosystems in an industrial scenario.
Softw. Pract. Exp., 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
2019
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the 23rd European Conference on Pattern Languages of Programs, 2018
Proceedings of the Conceptual Modeling - 37th International Conference, 2018
Proceedings of the 20th International Workshop on Design, 2018
Modelado de Requisitos de Seguridad para Big Data.
Proceedings of the XXI Iberoamerican Conference on Software Engineering, 2018
2016
Development of an Expert System for the Evaluation of Students' Curricula on the Basis of Competencies.
Future Internet, 2016
Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems.
Future Internet, 2016
The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets.
Future Internet, 2016
Securing Databases Using Big Data Technology.
Proceedings of the 21st International Conference on Information Quality, 2016
2015
Inf. Softw. Technol., 2015
Inf. Softw. Technol., 2015
An MDA approach for developing secure OLAP applications: Metamodels and transformations.
Comput. Sci. Inf. Syst., 2015
Proceedings of the 2nd IEEE Workshop on Evolving Security and Privacy Requirements Engineering, 2015
Proceedings of the Practice of Enterprise Modeling, 2015
Proceedings of the Advanced Information Systems Engineering Workshops, 2015
2014
Secur. Commun. Networks, 2014
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications.
J. Univers. Comput. Sci., 2014
Comput. Stand. Interfaces, 2014
Comput. Stand. Interfaces, 2014
Proceedings of the WOSIS 2014, 2014
2013
2012
J. Univers. Comput. Sci., 2012
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment.
J. Univers. Comput. Sci., 2012
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management.
J. Univers. Comput. Sci., 2012
Decis. Support Syst., 2012
2011
J. Syst. Archit., 2011
IEICE Trans. Inf. Syst., 2011
Secure business process model specification through a UML 2.0 activity diagram profile.
Decis. Support Syst., 2011
Basis for an integrated security ontology according to a systematic review of existing proposals.
Comput. Stand. Interfaces, 2011
A Comparative Review of Cloud Security Proposals with ISO/IEC 27002.
Proceedings of the WOSIS 2011, 2011
Desirable Characteristics for an ISMS oriented to SMEs.
Proceedings of the WOSIS 2011, 2011
Towards a Pattern-based Security Methodology to Build Secure Information Systems.
Proceedings of the WOSIS 2011, 2011
Security Pattern Mining: Systematic Review and Proposal.
Proceedings of the WOSIS 2011, 2011
Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs.
Proceedings of the WOSIS 2011, 2011
Proceedings of the Advanced Information Systems Engineering Workshops, 2011
2010
J. Univers. Comput. Sci., 2010
Inf. Softw. Technol., 2010
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach.
Inf. Softw. Technol., 2010
Inf. Softw. Technol., 2010
Int. J. Bus. Intell. Data Min., 2010
Comput. Stand. Interfaces, 2010
Comput. Stand. Interfaces, 2010
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010
A Study of Security Approaches for the Development of Mobile Grid Systems.
Proceedings of the ICSOFT 2010, 2010
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010
Proceedings of the Software Architecture, 4th European Conference, 2010
Proceedings of the ENTERprise Information Systems - International Conference, 2010
2009
J. Univers. Comput. Sci., 2009
J. Univers. Comput. Sci., 2009
Inf. Softw. Technol., 2009
The practical application of a process for eliciting and designing security in web service systems.
Inf. Softw. Technol., 2009
Int. J. Grid High Perform. Comput., 2009
Comput. Stand. Interfaces, 2009
Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services.
J. Res. Pract. Inf. Technol., 2009
MMSM-SME: Methodology for the Management of Security and its Maturity in SME.
Proceedings of the Security in Information Systems, 2009
Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros.
Proceedings of the XIV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2009), 2009
Reingeniería sobre Almacenes de Datos Seguros aplicando ADM.
Proceedings of the XIV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2009), 2009
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application.
Proceedings of the Advances in Conceptual Modeling - Challenging Perspectives, 2009
Proceedings of the Data Warehousing and Knowledge Discovery, 11th International Conference, 2009
Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros.
Proceedings of the Memorias de la XII Conferencia Iberoamericana de Software Engineering (CIbSE 2009), 2009
Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering.
Proceedings of the The Forth International Conference on Availability, 2009
Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs.
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the Database Technologies: Concepts, 2009
2008
Int. J. Bus. Intell. Data Min., 2008
Building a secure star schema in data warehouses by an extension of the relational package from CWM.
Comput. Stand. Interfaces, 2008
Towards security requirements management for software product lines: A security domain requirements engineering process.
Comput. Stand. Interfaces, 2008
Comput. Stand. Interfaces, 2008
Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT.
Proceedings of the Security in Information Systems, 2008
Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas.
Proceedings of the SECRYPT 2008, 2008
Security Requirements in Software Product Lines.
Proceedings of the SECRYPT 2008, 2008
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
Automatic Generation of Secure Multidimensional Code for Data Warehouses by using QVT Transformations: an MDA Approach.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
Gestión de la Variabilidad de los Requisitos de Seguridad en Líneas de Producto.
Proceedings of the XIII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2008), 2008
Construcción de Modelos Lógicos Multidimensionales Seguros para su Implementación en Herramientas OLAP Mediante MDA y QVT.
Proceedings of the XIII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2008), 2008
Hacia la Implementación Automática de Almacenes de Datos Seguros en Herramientas OLAP.
Proceedings of the XIII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2008), 2008
Engineering Process Based on Grid Use Cases for Mobile Grid Systems.
Proceedings of the ICSOFT 2008, 2008
Proceedings of the Third International Conference on Software Engineering Advances, 2008
Proceedings of the e-Business and Telecommunications - International Conference, 2008
Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models.
Proceedings of the Advances in Conceptual Modeling - Challenges and Opportunities, 2008
Modelado de Requisitos de Seguridad para Almacenes de Datos.
Proceedings of the Memorias de la XI Conferencia Iberoamericana de Software Engineering (CIbSE 2008), 2008
Aplicando un Proceso de Ingeniería de Requisitos de Seguridad de Dominio para Líneas de Producto Software.
Proceedings of the Memorias de la XI Conferencia Iberoamericana de Software Engineering (CIbSE 2008), 2008
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements.
Proceedings of the The Third International Conference on Availability, 2008
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices.
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
IEICE Trans. Inf. Syst., 2007
Eur. J. Inf. Syst., 2007
An MDA. appproach to develop secure business processes through a UML 2.0 extension.
Comput. Syst. Sci. Eng., 2007
A common criteria based security requirements engineering process for the development of secure information systems.
Comput. Stand. Interfaces, 2007
Proceedings of the Trust, 2007
SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level.
Proceedings of the Security in Information Systems, 2007
SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines.
Proceedings of the Security in Information Systems, 2007
Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises.
Proceedings of the SECRYPT 2007, 2007
Una extensión del metamodelo relacional de CWM para representar Almacenes de Datos Seguros a nivel lógico.
Proceedings of the XII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2007), 2007
Transformaciones QVT para la obtención de Clases de Análisis a partir de un Modelo de Proceso de Negocio Seguro.
Proceedings of the XII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2007), 2007
Proceedings of the XII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2007), 2007
Proceedings of the XII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2007), 2007
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007
Data Quality in XML Databases - A Methodology for Semi-Structured Database Design Supporting Data Quality Issues.
Proceedings of the ICSOFT 2007, 2007
Scmm-Tool - Tool for Computer Automation of the Information Security Management Systems.
Proceedings of the ICSOFT 2007, 2007
Proceedings of the Computational Science and Its Applications, 2007
M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification.
Proceedings of the Advances in Conceptual Modeling - Foundations and Applications, 2007
Aplicación de QVT al Desarrollo de Almacenes de Datos Seguros: Un caso de Estudio.
Proceedings of the Memorias de la X Conferencia Iberoamericana de Software Engineering (CIbSE 2007), 2007
Soporte Automatizado a la Ingeniería de Requisitos de Seguridad.
Proceedings of the Memorias de la X Conferencia Iberoamericana de Software Engineering (CIbSE 2007), 2007
Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases.
Proceedings of the Business Process Management, 5th International Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses.
Proceedings of the The Second International Conference on Availability, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Internet Res., 2006
Int. J. Web Eng. Technol., 2006
Decis. Support Syst., 2006
J. Res. Pract. Inf. Technol., 2006
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
A Model Driven Approach for Secure XML Database Development.
Proceedings of the Security in Information Systems, 2006
Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises.
Proceedings of the Security in Information Systems, 2006
Security Patterns Related to Security Requirements.
Proceedings of the Security in Information Systems, 2006
Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams.
Proceedings of the Security in Information Systems, 2006
SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems.
Proceedings of the Security in Information Systems, 2006
Defining Viewpoints for Security Architectural Patterns.
Proceedings of the SECRYPT 2006, 2006
Secure Information Systems Development - Based on a Security Requirements Engineering Process.
Proceedings of the SECRYPT 2006, 2006
Security Risk Analysis in Web Services Systems.
Proceedings of the SECRYPT 2006, 2006
Hacia la definición de un perfil de UML 2.0 para modelar requisitos de seguridad en procesos de negocio.
Proceedings of the XI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2006), 2006
Aplicación práctica de un proceso de ingeniería de requisitos de seguridad.
Proceedings of the XI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2006), 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computer Security, 2006
Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile.
Proceedings of the Advances in Conceptual Modeling - Theory and Practice, 2006
Proceedings of the Actas del Taller sobre Desarrollo de Software Dirigido por Modelos. MDA y Aplicaciones. Sitges, 2006
Una Aproximación Dirigida por Modelos para el Diseño de Bases de Datos XML Seguras.
Proceedings of the Memorias de la IX Conferenci a Iberoamericana de Software Engineering (CIbSE 2006), 2006
Extensión de UML 2.0 para especificar Requisitos de Seguridad en Procesos de Negocios.
Proceedings of the Memorias de la IX Conferenci a Iberoamericana de Software Engineering (CIbSE 2006), 2006
Análisis Comparativo de Propuestas de Establecimiento de Requisitos de Seguridad para el Desarrollo de Sistemas de Información Seguros.
Proceedings of the Memorias de la IX Conferenci a Iberoamericana de Software Engineering (CIbSE 2006), 2006
Proceedings of the The First International Conference on Availability, 2006
Representing levels of abstraction to facilitate the Secure Multidimensional Modeling.
Proceedings of the The First International Conference on Availability, 2006
Representing Security and Audit Rules for Data Warehouses at the Logical Level by Using the Common Warehouse Metamodel.
Proceedings of the The First International Conference on Availability, 2006
Proceedings of the The First International Conference on Availability, 2006
Proceedings of the The First International Conference on Availability, 2006
Proceedings of the The First International Conference on Availability, 2006
A Comparison of the Common Criteria with Proposals of Information Systems Security Requirements.
Proceedings of the The First International Conference on Availability, 2006
2005
Comput. Secur., 2005
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005
Towards a UML 2.0/OCL extension for designing Secure Data Warehouses.
Proceedings of the Security in Information Systems, 2005
Towards an integration of Security Requirements into Business Process Modeling.
Proceedings of the Security in Information Systems, 2005
PWSSEC: Proceso de Desarrollo para Seguridad de Servicios.
Proceedings of the Actas de las X Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2005), 2005
Un Modelo de Seguridad para Almacenes de Datos e Implementación Semiautomática con OLS10g.
Proceedings of the Memorias de la VIII Conferencia Iberoamericana de Software Engineering (CIbSE 2005), 2005
Representación de Requisitos de Seguridad en el Modelado de Procesos de Negocios.
Proceedings of the Memorias de la VIII Conferencia Iberoamericana de Software Engineering (CIbSE 2005), 2005
2004
Towards a Classification of Security Metrics.
Proceedings of the Security In Information Systems, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Conceptual Modeling, 2004
Proceedings of the 5th Mexican International Conference on Computer Science (ENC 2004), 2004
Analysis of ISO/IEC 17799: 2000 to be Used in Security Metrics.
Proceedings of the International Conference on Security and Management, 2004
General Considerations on Data Warehouse Security.
Proceedings of the International Conference on Security and Management, 2004
A Comparison of Secure Information Systems Design Methodologies.
Proceedings of the CAiSE'04 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering, 2004
2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE '03), 2003
2002
UML for the Design of Secure Databases.
Proceedings of the Security in Information Systems, 2002
Access Control of SVG Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002