Search filters

List of works by Eduardo Fernandez-Medina

A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems

article

A Framework for the Development of Secure Data Warehouses based on MDA and QVT

article

A Personal Data Audit Method through Requirements Engineering

A Security Requirements Engineering Process in Practice

A Security Requirements Engineering Tool for Domain Engineering in Software Product Lines

A UML 2.0 profile to define security requirements for Data Warehouses

A common criteria based security requirements engineering process for the development of secure information systems

article

A comparison of software design security metrics

article published in 2010

A comparison of the Common Criteria with proposals of information systems security requirements

article published in 2006

A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses

A study of security architectural patterns

scholarly article published 2006

Access control and audit model for the multidimensional modeling of data warehouses

An MDA Compliant Approach for Designing Secure Data Warehouses

An architecture for automatically developing secure OLAP applications from models

scientific article published in 2015

An engineering process for developing Secure Data Warehouses

Analysis of Secure Mobile Grid Systems: A systematic approach

article published in 2010

Application of QVT for the Development of Secure Data Warehouses: A case study

article

Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs

article

Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems

Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering

Basis for an integrated security ontology according to a systematic review of existing proposals

scholarly article by Carlos Blanco published in June 2011

Building ISMS through the Reuse of Knowledge

Building a secure star schema in data warehouses by an extension of the relational package from CWM

CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems

scientific article published in 2021

CIM to PIM Transformation: A Reality

Content Related to Computing Security on Computer Engineering Degree According to International Professional Certificates

scientific article published in 2015

Content related to Computing Security on Computer Engineering Degree according to International Professional Certificates

scientific article published in 2015

Defining and transforming security rules in an MDA approach for DWs

Designing Secure Data Warehouses

Designing secure databases

Developing Secure Business Processes

Developing secure data warehouses with a UML extension

Developing web services security systems: a case study

Empirical evaluation of a cloud computing information security governance framework

scholarly article by Oscar Rebollo et al published February 2015 in Information and Software Technology

How to implement multidimensional security into OLAP tools

ISGcloud: a Security Governance Framework for Cloud Computing

scientific article published in 2014

ISMS Building for SMEs through the Reuse of Knowledge

ISMS Building for SMEs through the Reuse of Knowledge

Including Security Rules Support in an MDA Approach for Secure DWs

Management of scorecards and metrics to manage security in SMEs

Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern

scientific article published in 2022

Managing the Asset Risk of SMEs

Metrics of Password Management Policy

Minimizing incident response time in real-world scenarios using quantum computing

scientific article published in 2023

Model driven development of secure XML databases

article

Model-Driven Development for secure information systems

scientific article published in 2009

Model-driven multidimensional modeling of secure data warehouses

Onto-CARMEN: Ontology-driven approach for Cyber–Physical System Security Requirements meta-modelling and reasoning

scientific article published in 2023

PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices

article

Practical approach of a secure management system based on ISO/IEC 17799

Representing levels of abstraction to facilitate the secure multidimensional modeling

Representing security and audit rules for data warehouses at the logical level by using the common warehouse metamodel

article

Secure Tropos framework for software product lines requirements engineering

scholarly article by Daniel Mellado published in June 2014

Secure business process model specification through a UML 2.0 activity diagram profile

Secure information systems development – a survey and comparison

article

Security Culture in Small and Medium-Size Enterprise

article

Security Requirements Engineering Process for Software Product Lines: A Case Study

Security Requirements Management in Software Product Line Engineering

article published in 2009

Security Requirements Variability for Software Product Lines

Security requirement with a UML 2.0 profile

Security requirements engineering framework for software product lines

Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach

Systematic design of secure Mobile Grid systems

The practical application of a process for eliciting and designing security in web service systems

scientific article published on 10 June 2009

Towards security requirements management for software product lines: A security domain requirements engineering process

scholarly article by Daniel Mellado et al published August 2008 in Computer Standards and Interfaces

Using UML Packages for Designing Secure Data Warehouses

Web services enterprise security architecture