Follow
Eduardo Fernández-Medina (ORCID: 0000-0003-2553-9320)
Eduardo Fernández-Medina (ORCID: 0000-0003-2553-9320)
Verified email at uclm.es - Homepage
Title
Cited by
Cited by
Year
An analysis of security issues for cloud computing
K Hashizume, DG Rosado, E Fernández-Medina, EB Fernandez
Journal of internet services and applications 4, 1-13, 2013
11222013
A BPMN extension for the modeling of security requirements in business processes
A Rodríguez, E Fernández-Medina, M Piattini
IEICE transactions on information and systems 90 (4), 745-752, 2007
4172007
A common criteria based security requirements engineering process for the development of secure information systems
D Mellado, E Fernández-Medina, M Piattini
Computer standards & interfaces 29 (2), 244-253, 2007
3432007
A systematic review of security requirements engineering
D Mellado, C Blanco, LE Sánchez, E Fernández-Medina
Computer Standards & Interfaces 32 (4), 153-165, 2010
2862010
A systematic review and comparison of security ontologies
C Blanco, J Lasheras, R Valencia-García, E Fernández-Medina, A Toval, ...
2008 Third International Conference on Availability, Reliability and …, 2008
1672008
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach
A Rodríguez, IGR de Guzmán, E Fernández-Medina, M Piattini
Information and Software Technology 52 (9), 945-971, 2010
1352010
Access control and audit model for the multidimensional modeling of data warehouses
E Fernández-Medina, J Trujillo, R Villarroel, M Piattini
Decision Support Systems 42 (3), 1270-1289, 2006
1292006
Empirical evaluation of a cloud computing information security governance framework
O Rebollo, D Mellado, E Fernández-Medina, H Mouratidis
Information and Software Technology 58, 44-57, 2015
1262015
Developing secure data warehouses with a UML extension
E Fernández-Medina, J Trujillo, R Villarroel, M Piattini
Information Systems 32 (6), 826-856, 2007
1262007
Security analysis in the migration to cloud environments
DG Rosado, R Gómez, D Mellado, E Fernández-Medina
Future Internet 4 (2), 469-487, 2012
1212012
Applying a security requirements engineering process
D Mellado, E Fernández-Medina, M Piattini
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
1212006
Main issues in big data security
J Moreno, MA Serrano, E Fernández-Medina
Future Internet 8 (3), 44, 2016
1052016
Secure business process model specification through a UML 2.0 activity diagram profile
A Rodríguez, E Fernández-Medina, J Trujillo, M Piattini
Decision Support Systems 51 (3), 446-465, 2011
1052011
Basis for an integrated security ontology according to a systematic review of existing proposals
C Blanco, J Lasheras, E Fernández-Medina, R Valencia-García, A Toval
Computer Standards & Interfaces 33 (4), 372-388, 2011
1002011
Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases
A Rodríguez, E Fernández-Medina, M Piattini
Business Process Management: 5th International Conference, BPM 2007 …, 2007
1002007
Towards a UML 2.0 extension for the modeling of security requirements in business processes
A Rodríguez, E Fernández-Medina, M Piattini
Trust and Privacy in Digital Business: Third International Conference …, 2006
872006
Análisis y revisión de la literatura en el contexto de proyectos de fin de carrera: Una propuesta
MAC Gutiérrez, AR Ríos, C Calero, E Fernández-Medina, M Piattini
Revista Sociedad Chilena de Ciencia de la Computación 6 (1), 2005
782005
Secure information systems development–a survey and comparison
R Villarroel, E Fernández-Medina, M Piattini
Computers & Security 24 (4), 308-321, 2005
772005
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment.
O Rebollo, D Mellado, E Fernandez-Medina
J. Univers. Comput. Sci. 18 (6), 798-815, 2012
712012
Security requirements engineering framework for software product lines
D Mellado, E Fernández-Medina, M Piattini
Information and Software Technology 52 (10), 1094-1117, 2010
702010
The system can't perform the operation now. Try again later.
Articles 1–20