Book Chapters



  • M. VanHilst and E. B. Fernandez, “A Construct Grid Approach to Security Classification and Analysis”, accepted as a chapter in Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, Manish Gupta, John Walp, and Raj Sharman, IGI Global 2011.
  • E. B. Fernandez, “Wireless network security for health applications”, to appear in the Pervasive Communication Handbook, M. Ilyas (Ed.), CRC Press 2011.
  • E. B. Fernandez, N. Yoshioka, H. Washizaki, J. Jurjens, M.VanHilst , and G. Pernul, “Using security patterns to develop secure systems”, in H. Mouratidis, Ed., Software engineering for secure systems: Industrial and Research Perspectives, IGI Global Group, 2010
    http://www.igi-global.com
  • E. B. Fernandez, K. Hashizume, I. Buckley, M. M. Larrondo-Petrie, and M. VanHilst, “Web services security: Standards and products”, Chapter 8 in Web Services Security Development and Architecture: Theoretical and Practical Issues, Carlos A. Gutierrez, Eduardo Fernandez-Medina, and Mario Piattini (Eds.), IGI Global Group 2010. 152-177.
  • E. B. Fernandez, C. Marin, and M. M. Larrondo-Petrie, “Security requirements for social networks in Web 2.0″, in the Handbook of Social Networks: Technologies and Applications, B. Furht (Editor), Springer 2010.
    http://www.springer.com/computer/swe/book/978-1-4419-7141-8
  • E. B. Fernandez, “Security patterns and a methodology to apply them”, to appear in Security and Dependability for Ambient Intelligence, G. Spanoudakis and A. Maña (Eds.), Springer Verlag, 2009.
  • E. B. Fernandez, N. Yoshioka (NII, Japan), H. Washizaki (Waseda U., Japan), J. Jurjens (Open U., UK), M. VanHilst , and G. Pernul (U. of Regensburg, Germany), “Using security patterns to develop secure systems”, to appear in Software engineering for secure systems: Industrial and Research Perspectives, H. Mouratidis, Ed., IGI Global Group, 2009.
  • J. Jurjens and E. B. Fernandez, “Secure database development”, to appear in the Encyclopedia of Database Systems, Ling Liu and Tamer Oszu (eds.), Springer Verlag, Berlin, Germany, 2009.
  • E. B. Fernandez and M. VanHilst, “An overview of WiMax security”, Chapter 10 in the Handbook of WiMax security and QoS, S. Ahson and M. Ilyas (Eds.), CRC Press, Taylor and Francis Group, Boca Raton, FL, 2008, 197-204.
  • E. B. Fernandez and M. M. Larrondo Petrie, “Securing design patterns for distributed systems”, Chapter 3 in Security in Distributed, Grid, and Pervasive Computing, Y. Xiao (Ed.)., Auerbach Pubs., Taylor & Francis Group, LLC, 2007, 53-66.
  • E. B. Fernandez, M. M. Larrondo-Petrie, T. Sorgente, and M. VanHilst, “A methodology to develop secure systems using patterns”, Chapter 5 in “Integrating security and software engineering: Advances and future vision”, H. Mouratidis and P. Giorgini (Eds.), IDEA Press, 2006, 107-126.
  • E. B. Fernandez, M. Thomsen, and M. H. Fernandez, “Comparing the security architectures of Sun ONE and Microsoft .NET”, Chapter 9 in Information security policies and actions in modern integrated systems, C. Bellettini and M.G. Fugini (Eds.), Idea Group Publishing, 2004, pp.317-330.
  • E. B. Fernandez, “Building complex object-oriented systems with patterns and XP”, Chapter 47 in Extreme Programming Perspectives, M. Marchesi, G. Succi, D. Wells, and L. Williams, (Eds.) , Addison-Wesley, 2003, pp. 591-600.
  • E. B. Fernandez, “Web services security”, chapter in Web Services Business Strategies and Architectures, P. Fletcher and M. Waterhouse (Eds.), Expert Press, UK, 2002, 290-302.
  • E. B. Fernandez, J. Wu, and D. Hancock, “A design method for real-time object-oriented systems using Communicating Real-Time State Machines”, Chapter 11 in Successful Software Reengineering, S. Valenti (Ed.), IRM Press, 2002, 171-185.
  • R. Z. Xue and E. B. Fernandez, “Accessing legacy databases from the web using CORBA”, Chapter 13 in Handbook of Internet Computing, B. Furht (Ed.), CRC Press, Boca Raton, FL, 2000.
  • M. Ancona, W. Cazzola, and E. B. Fernandez, “Reflective authorization systems: Possibilities, benefits, and drawbacks”, in J. Vitek and C. Jensen (Eds.), Springer Verlag, Lecture Notes in Computer Science No 1603, 1999, 35-49.
  • E. B. Fernandez, “Formal specifications for real-time fault-tolerant systems”, in Real Time Computing, W. A. Halang and A. D. Stoyenko (Eds.), NATO ASI Series, vol. 127, 1994, 687–688.
  • E. B. Fernandez, M. M. Larrondo-Petrie, and E. Gudes, “A method-based authorization model for object-oriented databases”, in Security for Object-Oriented Systems, book of Springer Verlag, London, 1994.
  • E. Gudes, H. Song, and E. B. Fernandez, “Evaluation of negative and predicate based authorization in object-oriented databases”, in Database Security IV, North Holland, 1991, 85–98.
  • M. M. Larrondo-Petrie, E. Gudes, H. Song, E. B. Fernandez, “Security Policies in Object-Oriented Databases”, in Database Security III, North-Holland 1990, 257-268. Œ
  • J. Wu, and E. B. Fernandez, “The extended G network, a fault tolerant interconnection network for multiprocessors”, in Parallel Architectures, N. Rishe, S. Navathe, and D. Tal (Eds.) IEEE Computer Society Press, 1990, pp. 250–259.
  • M. Ancona, A. Clematis, G. Dodero, E. B. Fernandez, and V. Gianuzzi, “Using different language levels for implementing fault tolerant programs”, Microprocessing and Microprogramming, Vol. 20 (1987), 33-38.
  • B. Bussell, E. B. Fernandez, H. C. Levy, “Optimal Scheduling for Homogeneous Multiprocessors”, Information Processings 74, Vol, 2, 286-290, North Holland 1974.