Eduardo Fernández-Medina
Eduardo Fernández-Medina
Bestätigte E-Mail-Adresse bei uclm.es - Startseite
Titel
Zitiert von
Zitiert von
Jahr
An analysis of security issues for cloud computing
K Hashizume, DG Rosado, E Fernández-Medina, EB Fernandez
Journal of internet services and applications 4 (1), 1-13, 2013
7642013
A BPMN extension for the modeling of security requirements in business processes
A Rodríguez, E Fernández-Medina, M Piattini
IEICE transactions on information and systems 90 (4), 745-752, 2007
3412007
A common criteria based security requirements engineering process for the development of secure information systems
D Mellado, E Fernández-Medina, M Piattini
Computer standards & interfaces 29 (2), 244-253, 2007
2742007
A systematic review of security requirements engineering
D Mellado, C Blanco, LE Sánchez, E Fernández-Medina
Computer Standards & Interfaces 32 (4), 153-165, 2010
2112010
A systematic review and comparison of security ontologies
C Blanco, J Lasheras, R Valencia-García, E Fernández-Medina, A Toval, ...
2008 Third International Conference on Availability, Reliability and …, 2008
1332008
Analyzing security requirements as relationships among strategic actors
EY Lin Liu, J Mylopoulos
1302002
A review-based comparative study of bad smell detection tools
E Fernandes, J Oliveira, G Vale, T Paiva, E Figueiredo
Proceedings of the 20th International Conference on Evaluation and …, 2016
1222016
Developing secure data warehouses with a UML extension
E Fernández-Medina, J Trujillo, R Villarroel, M Piattini
Information Systems 32 (6), 826-856, 2007
1192007
Access control and audit model for the multidimensional modeling of data warehouses
E Fernández-Medina, J Trujillo, R Villarroel, M Piattini
Decision Support Systems 42 (3), 1270-1289, 2006
1122006
Educational data mining: Predictive analysis of academic performance of public school students in the capital of Brazil
E Fernandes, M Holanda, M Victorino, V Borges, R Carvalho, ...
Journal of Business Research 94, 335-343, 2019
1112019
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach
A Rodríguez, IGR de Guzmán, E Fernández-Medina, M Piattini
Information and Software Technology 52 (9), 945-971, 2010
1062010
Indocyanine green (ICG) fluorescent cholangiography during robotic cholecystectomy: results of 184 consecutive cases in a single institution
D Daskalaki, E Fernandes, X Wang, FM Bianco, EF Elli, S Ayloo, ...
Surgical innovation 21 (6), 615-621, 2014
982014
Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases
A Rodríguez, E Fernández-Medina, M Piattini
International Conference on Business Process Management, 408-415, 2007
882007
Empirical evaluation of a cloud computing information security governance framework
O Rebollo, D Mellado, E Fernández-Medina, H Mouratidis
Information and Software Technology 58, 44-57, 2015
872015
Helicobacter pylori: the link with gastric cancer.
E De Koster, M Buset, E Fernandes, M Deltenre
European journal of cancer prevention: the official journal of the European …, 1994
861994
Security analysis in the migration to cloud environments
DG Rosado, R Gómez, D Mellado, E Fernández-Medina
Future Internet 4 (2), 469-487, 2012
842012
Applying a security requirements engineering process
D Mellado, E Fernández-Medina, M Piattini
European Symposium on Research in Computer Security, 192-206, 2006
822006
Sectet: an extensible framework for the realization of secure inter‐organizational workflows
M Yague, E Fernandez‐Medina, M Hafner, R Breu, B Agreiter, A Nowak
Internet Research, 2006
812006
Secure business process model specification through a UML 2.0 activity diagram profile
A Rodríguez, E Fernández-Medina, J Trujillo, M Piattini
Decision Support Systems 51 (3), 446-465, 2011
792011
Towards a UML 2.0 extension for the modeling of security requirements in business processes
A Rodríguez, E Fernández-Medina, M Piattini
International Conference on Trust, Privacy and Security in Digital Business …, 2006
792006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20