• Publications
  • Influence
Security Patterns - Integrating Security and Systems Engineering
Chapter 1: The Pattern Approach. Patterns at a Glance. No Pattern is an Island. Patterns Everywhere. Humans are the Target. Patterns Resolve Problems and Shape Environments. Towards PatternExpand
  • 611
  • 64
  • PDF
An analysis of security issues for cloud computing
Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of riskExpand
  • 598
  • 39
  • PDF
A pattern language for security models
Security is a serious problem in the Internet and it is necessary to build new systems incorporating security as integral part of their design. The use of patterns is a good tool to help designersExpand
  • 180
  • 12
  • PDF
Secure and efficient key management in mobile ad hoc networks
In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network environment. UsuallyExpand
  • 255
  • 12
  • PDF
Bounds on the Number of Processors and Time for Multiprocessor Optimal Schedules
Two problems of importance for the scheduling of multiprocessing systems composed of identical units are discussed in this paper. 1) Given a partially ordered set of computations represented by theExpand
  • 165
  • 9
A Methodology for Secure Software Design
  • E. Fernández
  • Computer Science
  • Software Engineering Research and Practice
  • 2004
  • 71
  • 7
Semantic Analysis Patterns
The development of object-oriented software starts from requirements expressed commonly as Use Cases. The requirements are then converted into a conceptual or analysis model. Analysis is aExpand
  • 105
  • 6
  • PDF
A Model for Evaluation and Administration of Security in Object-Oriented Databases
The integration of object-oriented programming concepts with databases is one of the most significant advances in the evolution of database systems. Many aspects of such a combination have beenExpand
  • 91
  • 5
  • PDF
Classifying Security Patterns
Patterns combine experience and good practices to develop basic models that can be used for new designs. Security patterns join the extensive knowledge accumulated about security with the structureExpand
  • 44
  • 5