Share This Author
Security Patterns - Integrating Security and Systems Engineering
This book discusses the development of security patterns in the enterprise, the history of Security Patterns, and some of the strategies used to develop and apply these patterns.
An analysis of security issues for cloud computing
- K. Hashizume, D. G. Rosado, E. Fernández-Medina, E. Fernández
- Computer ScienceJournal of Internet Services and Applications
- 27 February 2013
This work identifies the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions.
Security patterns in practice : designing secure architectures using software patterns
- E. Fernández
- Computer Science
This unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML.
Secure and efficient key management in mobile ad hoc networks
Bounds on the Number of Processors and Time for Multiprocessor Optimal Schedules
A unified formulation for lower bounds on the minimum number of processors and on time is presented and these lower bounds are sharper than previously known values and provide a general framework that gives insight for deriving simplified expressions.
A pattern language for security models
Three patterns that correspond to the most common models for security are discussed: Authorization, Role-Based Access Control, and Multilevel Security, which can be applied in all the levels of the system.
A Model for Evaluation and Administration of Security in Object-Oriented Databases
This work develops an authorization model for object-oriented databases that consists of a set of policies, a structure for authorization rules, and algorithms to evaluate access requests against the authorization rules.
An extensible pattern-based library and taxonomy of security threats for distributed systems
A Methodology for Secure Software Design
- E. Fernández
- Computer ScienceSoftware Engineering Research and Practice
The Authenticator Pattern
The Authenticator pattern describes a general mechanism for providing identification and authentication to a server from a client using an authentication negotiation object which then provides the protected object only after authentication is successful.