Conferences


  1. K. Hashizume, N. Yoshioka, and E. B. Fernandez, “Misuse Patterns for Cloud Computing”, 2011.
  2. M. Cardei, E. B. Fernandez, A. Sahu, and I. Cardei, “A pattern for Wireless System Architectures”, 2011.
  3. S. Mujica, F. Valenzuela, and E. B. Fernandez, “Two security patterns: Least Privilege and Secure Logger/Auditor”, 2011.
  4. J. Muñoz-Arteaga, E. B. Fernandez, and H. Caudel, “Misuse pattern: Spoofing web services”, sent to Asian PLoP 2011.
  5. J. Muñoz-Arteaga, E. B. Fernandez, R. Santaolaya-Salgado, “Interaction Patterns for Designing Visual Feedback in Secure Websites”, presented at the Fourth International Conference on Advances in Computer-Human Interactions (ACHI 2011), February 23-28, 2011, Gosier, Guadeloupe, France.
  6. Y. Shiroma, H. Washizaki, Y. Fukazawa , A. Kubo, N. Yoshioka, and E. B. Fernandez, “Model-driven application and validation of security patterns”, 17th Conf. on Pattern Languages of Programs (PLoP 2010).
  7. E. B. Fernandez and Sergio Mujica , “Building secure systems: From threats to security patterns”, Procs. of the XXIX International Conference of the Chilean Computer Society, Antofagasta, Chile, November 2010.
  8. A. Sahu, E. B. Fernandez, Mihaela Cardei, and M. VanHilst, “A pattern for a sensor node”, Procs. 17th Conf. on Pattern Languages of Programs (PLoP 2010).
  9. M. Van Hilst and E. B. Fernandez, “A Pattern System of Underlying Theories for Process Improvement”, Procs. 17th Conf. on Pattern Languages of Programs (PLoP 2010).
  10. E. B. Fernandez, D. laRed M., and J. I. Pelaez, “A conceptual approach to voting based on patterns”, Procs.of the 36th Latin American Conf. on Informatics (CLEI 2010), 18-22 October, Asuncion, Paraguay. (Acceptance ratio: 27%.)
  11. O. Ajaj and E. B. Fernandez, “A pattern for the WS-Policy standard”, Procs.of the 8th Latin American Conference on Pattern Languages of Programs (SugarLoafPLoP 2010), Salvador, Bahia, Brazil, Sept 23-26, 2010.
  12. A. Kumar and E. B. Fernandez, “Security patterns for Virtual Private Networks”, Procs. of the 8th Latin American Conference on Pattern Languages of Programs (SugarLoafPLoP 2010), Salvador, Bahia, Brazil, Sept 23-26, 2010.
  13. M. Solinas, J. Trad, J. Abdala, F. Capdevila, E. B. Fernandez, L. Antonelli, “Caso de éxito de método que aplica patrones de seguridad en la Ingeniería en Computación”, Congreso Argentino de Ciencias de la Computación 2010 (CACIC 2010).
  14. C. Marin, E. B. Fernandez, and M. M. Larrondo-Petrie, “Patterns for social networks in Web 2.0”, Procs. of the 8th Latin American and Caribbean Conf. for Eng. and Technology (LACCEI’2010), June 1-4, 2010, Arequipa, Peru.
  15. O. Ajaj and E. B. Fernandez, “A pattern for the WS-Trust standard of web services”, Procs. of the 1st Asian Conference on Pattern Languages of Programs (AsianPLoP 2010), Tokyo, Japan, March 16-17, 2010.
  16. E. B. Fernandez, N. Yoshioka, and H. Washizaki, “A Worm misuse pattern”, Procs. of the 1st Asian Conference on Pattern Languages of Programs (AsianPLoP 2010), Tokyo, Japan, March 16-17, 2010.
  17. M. Netter, E. B. Fernandez, and G. Pernul, “Refining the pattern-based reference model for electronic invoices by incorporating threats”, Procs. of the 4th workshop on Secure systems methodologies using patterns (SPattern 2010), in conjunction with ARES 2010, Krakow, Poland, February 2010.
  18. E. B. Fernandez, N. Yoshioka, H. Washizaki, and M. VanHilst, “Measuring the level of security introduced by security patterns”, Procs. of the 4th workshop on Secure systems methodologies using patterns (SPattern 2010), in conjunction with ARES 2010, Krakow, Poland, February 2010.
  19. E. B. Fernandez and M. M. Larrondo-Petrie, “Designing secure SCADA systems using security patterns”, Procs. of the 43rd Hawaii Conf. on Systems Science, Honolulu, Jan. 2010, 1-8.
    http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5428672
  20. K. Hashizume, E. B. Fernandez, and Shihong Huang, “The WS-Security pattern”, First IEEE Int. Workshop on Security Eng. Environments, Dec. 17-19, 2009, Shanghai, China.
  21. E. B. Fernandez, M. VanHilst, D. laRed M., and S. Mujica, “An extended reference monitor for security and safety”, Procs. of the 5th Iberoamerican Conference on Information Security (CIBSI 2009). Montevideo, Uruguay, November 2009.
  22. I. Buckley and E. B. Fernandez, “Three patterns for fault tolerance”, Procs. of the OOPSLA MiniPLoP, October 26, 2009.
    http://www.refactory.com/miniploppapers/FT_Patts.pdf
  23. E. B. Fernandez and J. L. Ortega-Arjona, “Securing the Adapter pattern”, Procs. of the OOPSLA MiniPLoP, October 26, 2009.
  24. E. B. Fernandez and J. Munoz-Arteaga, “Extending a secure software methodology with usability aspects”, position paper for the 3rd Workshop on Software Patterns and Quality (SPAQu’09), in conjunction with OOPSLA 2009.
  25. E. B. Fernandez, N. Yoshioka, and H. Washizaki, “Security patterns and quality”, position paper for the 3rd Workshop on Software Patterns and Quality (SPAQu’09), in conjuction with OOPSLA 2009. Proceedings of the Third International Workshop on Software Patterns and Quality (pp. 46-47), in conjuction with OOPSLA 2009.
    http://grace-center.jp/downloads/GRACE-TR-2009-07.pdf
  26. M. VanHilst, E. B. Fernandez, and F. Braz, “Building a Concept Grid to Classify Security Patterns”, Procs. of the 3rd Workshop on Software Patterns and Quality (SPAQu’09), in conjuction with OOPSLA 2009.
  27. E. B. Fernandez and X. Yuan, “An Analysis Pattern for Invoice Processing”, Procs. of the 16th Conf. on Pattern Languages of Programs (PLoP 2009).
  28. K. Hashizume and E. B. Fernandez, “Symmetric Encryption and XML Encryption Patterns”, Procs. of the 16th Conf. on Pattern Languages of Programs (PLoP 2009).
  29. Z. Jiang and E. B. Fernandez, “Composing analysis patterns to build complex models: Flight reservation”, Procs. of the 16th Conf. on Pattern Languages of Programs (PLoP 2009).
  30. Solinas Procs. of the 3rd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern’09), in conjunction with the 6th International Conference on Trust, Privacy & Security in Digital Busines(TrustBus’09), pp. 176-180.
  31. E. B. Fernandez and J. L. Ortega-Arjona, “The secure Pipes and Filters pattern”, Procs. of the Third Int Workshop on Secure System Methodologies using Patterns (SPattern 2009).
    http://www.matematicas.unam.mx/jloa/publicaciones/PipesFiltersMay22-09.pdf
  32. H. Washizaki, E. B. Fernandez, K. Maruyama, A. Kubo, and N. Yoshioka, “Improving the classification of security patterns”, Procs. of the Third Int. Workshop on Secure System Methodologies using Patterns (SPattern 2009).
  33. J. C. Pelaez and E. B. Fernandez. “VoIP Network Forensic Patterns”, Procs. of the Fourth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2009), Cannes, France, August 23-29.
  34. K. Hashizume, E. B. Fernandez, and S. Huang, “Digital Signature with Hashing and XML Signature patterns”, Procs. of the 14th European Conf. on Pattern Languages of Programs (EuroPLoP 2009).
  35. I. Buckley, E. B. Fernandez, G. Rossi, and M. Sadjadi, “Web services reliability patterns”, short paper in the 21st International Conference on Software Engineering and Knowledge Engineering (SEKE’2009), Boston, July 1-3, 2009, 4-9. (Acceptance rate 38%.)
  36. M. VanHilst, E. B. Fernandez, and F. Braz, “Building a Concept Grid to Classify Security Patterns”, short paper for the 21st International Conference on Software Engineering and Knowledge Engineering (SEKE’2009), July 1-3, 2009, Boston.
  37. E. B. Fernandez and M. M. Larrondo-Petrie, “A project on web services security and reliability”, 7th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2009), June 2-5, 2009, San Cristobal, Venezuela.
  38. E. B. Fernandez, J. Wu, M. M. Larrondo-Petrie and Y. Shao, “On building secure SCADA Systems using Security Patterns”, Procs. of the Cyber security and information intelligence challenges and strategies (CSIIR 2009). Oak Ridge, TN, April 13-15, 2009.
  39. L. L. Lobato and E. B. Fernandez, “Patterns to support the development of privacy policies”, Procs. of the First Int. Wokshop on Organizational Security Aspects (OSA 2009), in conjuction with ARES 2009. March 16-19, 2009, Fukuoka, Japan.
  40. E. B. Fernandez, N. Yoshioka and H. Washizaki, “Modeling misuse patterns”, Procs. of the 4th Int. Workshop on Dependability Aspects of Data Warehousing and Mining Applications (DAWAM 2009), in conjunction with the 4th Int.Conf. on Availability, Reliability, and Security (ARES 2009). March 16-19, 2009, Fukuoka, Japan.
  41. E. B. Fernandez, H. Washizaki, and N. Yoshioka, “Abstract security patterns”, Position paper in Procs. of the 2nd Workshop on Software Patterns and Quality (SPAQu’08), in conjuction with the 15th Conf. on Pattern Languages of Programs (PLoP 2008), October 18-20, 2008, Nashville, TN.
  42. E. B. Fernandez and D. laRed M., “Patterns for the secure and reliable execution of processes”. Procs. of the 15th Int. Conference on Pattern Languages of Programs (PLoP 2008), collocated with OOPSLA, Nashville, TN, Oct. 2008.
  43. J. L. Ortega-Arjona and E. B. Fernandez, “The Secure Blackboard pattern”, Procs. of the 15th Int. Conference on Pattern Languages of Programs (PLoP 2008), co-located with OOPSLA, Nashville, TN, Oct. 2008.
    http://www.matematicas.unam.mx/jloa/publicaciones/secureBlackboard.pdf
  44. E. B. Fernandez, G. Pernul, and M. M. Larrondo-Petrie, “Patterns and pattern diagrams for access control”, Procs. of the 5th Int. Conf. on Trust, Privacy, and Security in Digital Systems (Trustbus’08), Turin, Italy, Sept. 1-5, 2008. Springer LNCS 5185, 38-47 (Acceptance ratio: 53 %.)
  45. F. Braz, E. B. Fernandez, and M. VanHilst, “Eliciting security requirements through misuse activities”, Procs. of the 2nd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern’07), in conjunction with the 4th International Conference onTrust, Privacy & Security in Digital Busines(TrustBus’07), Turin, Italy, September 1-5, 2008. 328-333.
  46. E. B. Fernandez, J. Jurjens, N. Yoshioka, and H. Washizaki, “Incorporating database systems into a secure software development methodology”, Procs. of the 2nd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern’07), in conjunction with the 4th International Conference onTrust, Privacy & Security in Digital Busines(TrustBus’07), Turin, Italy, September 1-5, 2008. 310-314.
  47. M. VanHilst, E. B. Fernandez, and F. Braz, “A multidimensional classification for users of security patterns”, Procs. of the 6th Int. Workshop on Security in Information Systems (WOSIS 2008), Barcelona, Spain, June 12-13, 2008, in conjunction with ICEIS 2008, 89-98. (Acceptance ratio: 47.6%.)
  48. E. B. Fernandez and M. M. Larrondo-Petrie, “A Course on security for critical infrastructure systems”, Procs. of the 6th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008), June 4-6, 2008, Tegucigalpa, Honduras.
  49. E. B. Fernandez, H. Washizaki, N. Yoshioka, A. Kubo, and Y. Fukazawa, “Classifying security patterns”, Procs. of the 10th Asia-Pacific Web Conference (APWEB’08), April 26-28, 2008, Shenyang, China. (Acceptance ratio 37%.) Springer LNCS 4976/2008, 342-347.
  50. N. Delessy and E. B. Fernandez, “A pattern-driven security process for SOA applications”, Procs. of the ACM Symposium on Applied Computing (ACM SAC 2008), Fortaleza, Ceara, Brazil, March 16-20, 2008. Short paper.
  51. N. Delessy and E. B. Fernandez, “A pattern-driven security process for SOA applications”, Procs. of the 3rd Int. Conf. on Availability, Reliability, and Security (ARES 2008). Barcelona, Spain, March 4-7, 2008, 416-421. (Acceptance ratio: 21 %.)
  52. E. B. Fernandez, M. Fonoage, M. VanHilst, and M. Marta, “The secure three-tier architecture”, Procs. of the Second Workshop on Engineering Complex Distributed Systems (ECDS 2008), Barcelona, Spain, March 4-7, 2008. 555-560.
  53. E. B. Fernandez, M. M. Larrondo-Petrie, and M. VanHilst, “A methodology to build secure systems using patterns”, short paper in the 23rd Annual Computer Security Applications Conference (ACSAC), Miami Beach, December 10-14, 2007.
  54. E. B. Fernandez, N. Yoshioka, H. Washizaki, and J. Jurjens, “Using security patterns to build secure systems”, position paper in the 1st Int. Workshop on Software Patterns and Quality (SPAQu’07), Nagoya, Japan, December 3, 2007, collocated with the 14th Asia-Pacific Software Engineering Conference (APSEC).
  55. M. VanHilst and E. B. Fernandez, “Reverse engineering and the verification of security patterns in code”, Procs. of the 1st Int. Workshop on Software Patterns and Quality (SPAQu’07), Nagoya, Japan, December 3, 2007, collocated with the 14th Asia-Pacific Software Engineering Conference (APSEC),
  56. J. C. Pelaez, E. B. Fernandez, M. M. Larrondo-Petrie, and C. Wieser, “Attack patterns in VoIP”, Procs. of the 14th Pattern Languages of Programs Conference (PLoP2007), Monticello, Illinois, USA, September 5-8, 2007.
  57. N. Delessy. E. B. Fernandez, M. M. Larrondo-Petrie, and J. Wu, “Patterns for access control in distributed systems”, Procs. of the 14th Pattern Languages of Programs Conference (PLoP 2007), Monticello, Illinois, USA, September 5-8, 2007.
  58. E. B. Fernandez, P. Cholmondeley, and O. Zimmermann, “Extending a secure system development methodology to SOA”, Procs. of the 1st Int. Workshop on Secure Systems Methodologies Using Patterns (SPattern’07) in conjunction with the 4th International Conference on Trust, Privacy & Security in Digital Business (TrustBus’07), Regensburg, Germany, September 03-07, 2007, 749-754.
  59. E. B. Fernandez , M. VanHilst, and J. C. Pelaez, “Patterns for WiMax security”, Procs. EuroPLoP 2007.
  60. J. C. Pelaez, E. B. Fernandez, and C. Wieser, “Patterns for VoIP signaling protocol architectures”, Procs. EuroPLoP 2007.
  61. E. B. Fernandez, J. Ballesteros, A. C. Desouza-Doucet, and M. M. Larrondo-Petrie, “Security Patterns for Physical Access Control Systems”, in S. Barker and G. J. Ahn (Eds.), Data and Applications Security XXI, LNCS 4602, 259-274, Springer 2007. Procs. of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, California, U.S.A, July 8-11, 2007. (Acceptance ratio: 40%.)
  62. N. Delessy and E. B. Fernandez, “Adapting web services security standards for mobile and wireless environments”, in “Advances in Web and Network Technologies, and Information Management”, K. Chen-Chuan Chang, W. Wang, L. Chen, C.A.Ellis, C-H Hsu, A.C.Tsoi, and H. Wang (Eds.), Springer LNCS 4537, 624-633. Procs. of the 2007 International Workshop on Application and Security service in Web and pervAsive eNvironments (ASWAN 2007), June 16-18, 2007, HuangShan (Yellow Mountain), China. (Acceptance ratio: 26%.)
  63. E. B. Fernandez, D. L. laRed M., J. Forneron, V. E. Uribe, and G. Rodriguez, “A secure analysis pattern for handling legal cases”, Procs. of the 6th Latin American Conference on Pattern Languages of Programming (SugarLoafPLoP’2007), 178-187.
    http://sugarloafplop.dsc.upe.br/AnaisSugar2007_WEB.pdf
  64. M. Fullerton and E. B. Fernandez, “An analysis pattern for Customer Relationship Management (CRM)”, Procs. of the 6th Latin American Conference on Pattern Languages of Programming (SugarLoafPLoP’2007), May 27-30, 2007, Porto de Galinhas, Pernambuco, Brazil, 80-90.
  65. E. B. Fernandez and X.Y. Yuan, “Securing analysis patterns”, Procs. of the 45th ACM Southeast Conference (ACMSE 2007), March 23-24, 2007, Winston-Salem, North Carolina. (Acceptance ratio: 59%.)
    http://acmse2007.wfu.edu
  66. E. B. Fernandez, C. Pertuz, and M. M. Larrondo-Petrie, “A security pattern for Pipes and Filters”, Procs. of the 5th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2007), Tampico, MX, May 29-June 1st, 2007.
    www.laccei.org
  67. E. B. Fernandez, M. M. Larrondo-Petrie, and A. Escobar, “Contexts and context-based access control”, Procs. of the 3rd IEEE Int. Conf. on Wireless and Mobile Communications (ICWMC 2007), March 4-9, Guadeloupe, French Caribbean.
  68. E. B. Fernandez, J. C. Pelaez, and M. M. Larrondo-Petrie, “Security patterns for voice over IP networks”, Procs. of the 2nd IEEE Int. Multiconference on Computing in the Global Information Technology (ICCGI 2007), March 4-9, Guadeloupe, French Caribbean. Best paper award.
  69. N. Delessy, E. B. Fernandez, and M. M. Larrondo-Petrie, “A pattern language for identity management”, Procs. of the 2nd IEEE Int. Multiconference on Computing in the Global Information Technology (ICCGI 2007), March 4-9, Guadeloupe, French Caribbean.
    http://www.computer.org/portal/web/csdl/doi/10.1109/ICCGI.2007.5
  70. E. B. Fernandez, J. C. Pelaez, and M. M. Larrondo-Petrie, “Attack patterns: A new forensic and design tool”, Procs. of the Third Annual IFIP WG 11.9 Int. Conf. on Digital Forensics, Orlando, FL, Jan. 29-31, 2007. Chapter 24 in Advances in Digital Forensics III, P. Craiger and S. Shenoi (Eds.), Springer/IFIP, 2007, 345-357. (Acceptance ratio: 58%.)
    www.cis.utulsa.edu/ifip119
  71. E. B. Fernandez and M. M. Larrondo-Petrie, “A methodology to build secure systems using patterns”, 22nd Annual Computer Security Applications Conference (ACSAC), Works in Progress, Miami Beach, FL, Dec. 11-15.
    http://www.acsac.org
  72. E. B. Fernandez, “Security patterns”, Procs. of the Eigth International Symposium on System and Information Security – SSI’2006, Keynote talk, Sao Jose dos Campos, Brazil, November 08-10, 2006.
  73. E. B. Fernandez and G. Pernul, “Patterns for Session-Based Access Control”, Procs. of the Conference on Pattern Languages of Programs, PLoP 2006, Portland, OR, October 2006.
    http://hillside.net/plop/2006/
  74. P. Morrison and E. B. Fernandez, “The Credential pattern”, Procs. of the Conference on Pattern Languages of Programs, PLoP 2006, Portland, OR, October 2006.
    http://hillside.net/plop/2006/
  75. E. B. Fernandez, T. Sorgente, and M. M. Larrondo-Petrie, “Even more patterns for secure operating systems,” Procs. of the Conference on Pattern Languages of Programs, PLoP 2006, Portland, OR, October 2006.
    http://hillside.net/plop/2006/
  76. E. B. Fernandez, N.A.Delessy, and M. M. Larrondo-Petrie, “Patterns for web services security”, in Best Practices and Methodologies in Service-Oriented Architectures, L. A. Skar and A.A.Bjerkestrand (Eds.), 29-39, part of OOPSLA 2006, the 21st Int. Conf. on Object-Oriented Programming, Systems, Languages, and Applications, Portland, OR, ACM, October 22-26.
  77. E. B. Fernandez, M. VanHilst, M. M. Larrondo Petrie, S. Huang, “Defining Security Requirements through Misuse Actions”, in Advanced Software Engineering: Expanding the Frontiers of Software Technology, S. F. Ochoa and G.-C. Roman (Eds.), International Federation for Information Processing, Springer, 2006, 123-137. (Acceptance ratio: 40%.)
  78. E. B. Fernandez and M. M. Larrondo-Petrie, “Developing secure architectures for middleware systems”, Procs. of CLEI 2006. (XXXII Conferencia Latinoamericana de Informática). (Acceptance ratio: 45%.)
  79. P. Morrison and E. B. Fernandez, “Securing the Broker pattern”, Procs. of the 11th European Conf. on Pattern Languages of Programs (EuroPLoP 2006).
    http://hillside.net/europlop/europlop2006/
  80. E. B. Fernandez and M. M. Larrondo-Petrie, “Security patterns and secure systems design”, Procs. of the 4th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2006), Mayaguez, Puerto Rico, June 21-23, 2006.
  81. J. Pelaez and E. B. Fernandez, “Network forensics in wireless VoIP networks”, Procs. of the 4th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2006), Mayaguez, Puerto Rico, June 21-23, 2006.
  82. E. B. Fernandez, S. Huang, and M. M. Larrondo-Petrie, “A set of courses for teaching secure software development”, Workshop on Secure Software Engineering Education and Training, Hawaii, April 2006. Part of the 19th Conference on Software Engineering Education and Training, CSEET 2006, Oahu, Hawaii, USA, 2006.
  83. E. B. Fernandez and N. Delessy, “Using patterns to understand and compare web services security products and standards”, Proceedings of the Int. Conference on Web Applications and Services (ICIW’06), Guadeloupe, February 2006. IEEE Comp. Society, 2006.
  84. E. B. Fernandez, S. Huang, and M. M. Larrondo-Petrie, “Building secure middleware using patterns”, Procs. of the IEEE Int. Symposium and School on Advanced Distributed Systems (ISSADS 2006).
  85. E. B. Fernandez and David L. la Red M., “Using patterns to develop, evaluate, and teach secure operating systems”, Proceedings of the Congreso Internacional de Auditoría y Seguridad de la Información (CIASI 2005), Madrid, Spain, 125-130.
  86. E. B. Fernandez and T. Sorgente, “A pattern language for secure operating system architectures”, Proceedings of the 5th Latin American Conference on Pattern Languages of Programs, Campos do Jordao, Brazil, August 16-19, 2005, 68-88.
  87. E. B. Fernandez and M. M. Larrondo-Petrie, “A sequence of security courses based on a methodology with patterns”. VIII Congreso Chileno de Educación Superior en Computación, Valdivia, Chile, November 7-11, 2005.
  88. E. B. Fernandez, T. Anantvalee, J. Labush, and M. M. Larrondo-Petrie, “Analysis patterns for elections”, in Proceedings of the Nordic Conference on Pattern Languages of Programs, Viking PLoP 2005, Otaniemi, Finland, 23-25 September 2005.
  89. E. B. Fernandez and A. Kumar, “A security pattern for rule-based intrusion detection”, Proceedings of the Nordic Conference on Pattern Languages of Programs, Viking PLoP 2005, Otaniemi, Finland, 23-25 September 2005.
  90. E. B. Fernandez, Tami Sorgente, and M. VanHilst, “Constrained Resource Assignment Description Pattern”. Proceedings of the Nordic Conference on Pattern Languages of Programs, Viking PLoP 2005, Otaniemi, Finland, 23-25 September 2005.
  91. N. Delessy, and E. B. Fernandez, “Patterns for the eXtensible Access Control Markup Language”, in Proceedings of the 12th Pattern Languages of Programs Conference (PLoP2005), Monticello, Illinois, USA, 7-10 September 2005.
    http://hillside.net/plop/2005/proceedings/
  92. M. Sadicoff, M. M. Larrondo-Petrie, and E. B. Fernandez, “Privacy-Aware Network Client Pattern”, in Proceedings of the 12th Pattern Languages of Programs Conference (PLoP2005), Monticello, Illinois, USA, 7-10 September 2005.
    http://hillside.net/plop/2005/proceedings/PLoP2005_msadicoff0_0.pdf
  93. T. Sorgente, E. B. Fernandez, and M. M. Larrondo-Petrie, “The SOAP pattern for medical charts”, in Proceedings of the 12th Pattern Languages of Programs Conference (PLoP2005), Monticello, Illinois, 7-10 September 2005.
    http://hillside.net/plop/2005/proceedings/PLoP2005_tsorgente0_1.pdf
  94. E. B. Fernandez and M. M. Larrondo-Petrie, “Teaching a course on data and network security using UML and patterns”, Procs. of the Educators Symposium of MoDELS/UML 2005, Montego Bay, Jamaica, October 2-7, 2005.
  95. J. Pelaez and E. B. Fernandez, “Security in Voice over Internet Protocols (VoIP) networks”, Procs. of the 3rd Latin American and Caribbean Conference for Engineering and Technology (LACCEI), Cartagena, Colombia, June 8-10, 2005.
  96. E. B. Fernandez, T. Sorgente, and M. M. Larrondo-Petrie, “A UML-based methodology for secure systems: The design stage”, Procs. of the Third International Workshop on Security in Information Systems (WOSIS-2005), Miami, May 24-25, 2005, 207-216.
  97. E. B. Fernandez, and M. M. Larrondo-Petrie, “Using UML and Security Patterns to Teach Secure Systems Design,” in Proceedings of the American Society for Engineering Education Conference, ASEE’05, Portland, Oregon, USA, 12–17 June 2005.
  98. E. B. Fernandez and T. Sorgente, “An analysis of modeling flaws in HL7 and JAHIS”, in Procs. of the ACM Symposium on Applied Computing (SAC’05), Santa Fe, NM, March 2005. (Acceptance ratio: 26%.)
  99. E. B. Fernandez.,and M. M. Larrondo-Petrie, “ Security Models for Medical and Genetic Information Systems: Requirements for Access Control”, 2nd Latin American and Caribbean Conference for Engineering and Technology, Miami June 2-4, 2004.
  100. E. B. Fernandez., M. M. Larrondo-Petrie, and T. Sorgente “Security models for medical and genetic information”, IADIS International e-Society Conference, Avila, Spain, July 2004.
  101. E. B. Fernandez, “A methodology for secure software design”, 2004 Intl. Symposium on Web Services and Applications (ISWS’04), Las Vegas, NV, June 21-24, 2004.
  102. E. B. Fernandez, “Two patterns for web services security”, 2004 Intl. Symposium on Web Services and Applications (ISWS’04), Las Vegas, NV, June 21-24, 2004.
  103. T. Priebe, E. B. Fernandez, J. I. Mehlau, and G. Pernul, “A pattern system for access control “, 18th. Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sitges, Spain, July 25-28, 2004.
  104. E. B. Fernandez, “Layers and non-functional patterns”, Procs of ChiliPLoP, 2003. Phoenix, March 10-15, 2003.
  105. E. B. Fernandez and J. C. Sinibaldi, “More patterns for operating systems access control”, Procs. EuroPLoP 2003,
  106. X.Yuan and E. B. Fernandez, “An analysis pattern for course management”, Procs. EuroPLoP 2003,
  107. E. B. Fernandez, M. M. Larrondo-Petrie, N. Seliya, N. Delessy, and A. Herzberg, “A Pattern Language for Firewalls”, Procs. PLoP 2003.
  108. E. B. Fernandez and R. Warrier, “Remote Authenticator /Authorizer”, Procs. PLoP 2003.
  109. E. B. Fernandez, “Patterns for operating systems access control”, Procs. of PLoP 2002,
  110. E. B. Fernandez and R. Pan, “The Sports Manager pattern”, Procs. of PLoP (Pattern Languages of Programs) 2002,
  111. F.Dai and E. B. Fernandez, “A Pattern for the Request and Allocation of Limited Resources”, Procs. of EuroPLoP 2002.
  112. E. B. Fernandez and Y.Liu, “The Account Analysis Pattern”, Procs. of EuroPLoP (Pattern Languages of Programs).
  113. E. B. Fernandez, “Building complex object-oriented systems with patterns and XP”, Procs. of P Universe (International Conference on Extreme Programming), Raleigh, NC, July 23-25, 2001.
  114. E. B. Fernandez and X. Yuan, “An analysis pattern for the repair of an entity”, Procs. of PloP 2001.
  115. B. Dupire and E. B. Fernandez, “The Command Dispatcher Pattern”, Procs. of PloP 2001.
  116. E B. Fernandez and R.Y. Pan, “A pattern language for security models”, Procs. of PloP 2001.
  117. E. B. Fernandez, Y. Liu, and R.Y. Pan, “Patterns for Internet shops “, Procs. of PloP 2001.
  118. E. B. Fernandez, “An overview of Internet security”, Procs. of the World’s Internet & Electronic Cities Conference (WIECC 2001), May 1-3, 2001, Kish Island, Iran.
  119. E. B. Fernandez, J. Wu, and D. Hancock, “A design method for real-time object-oriented systems using Communicating Real-Time State Machines”, Procs. 2001 Information Resources Management Association Conference (IRMA), Toronto, May 2001, 792-797.
  120. E. B. Fernandez and X. Yuan, “Semantic Analysis Patterns”, Procs. 19th Int. Conf. on Conceptual Modeling, ER2000, Salt Lake City, UT, October 2000, 183-195.
  121. V. Hays, M. Loutrel, E. B. Fernandez, “The Object Filter and Access Control Framework”, Procs. of PLoP 2000,
  122. E. B. Fernandez, X. Yuan, S. Brey, “Analysis Patterns for the Order and Shipment of a Product”, Procs.of PLoP 2000,
  123. E. B. Fernandez, “Stock manager: An analysis pattern for inventories”, Procs. of PLoP 2000,
  124. M. Ancona, W. Cazzola, and E. B. Fernandez, ‘A history-dependent access control mechanism using reflection”, Procs. ECOOP99 Workshop on Reflection.
  125. E. B. Fernandez, “Authorization rules as metalevel constructs”, Procs. OOPSLA Workshop on Metadata and Dynamic Object-Model Pattern Mining , ACM 1999.
  126. E. B. Fernandez, “Coordination of security levels for Internet architectures”, Procs. 10th Intl. Workshop on Database and Expert systems Applications, DEXA99, 837-841.
  127. A.Delarue and E. B. Fernandez, “Extension and Java implementation of the Reactor-Acceptor-Connector pattern combination”, Procs. of PLoP99
  128. F.L. Brown and E. B. Fernandez, “The Authenticator pattern”, Procs. PLoP99.
  129. M. Heuser and E. B. Fernandez, “RPC Client: A pattern for the clent-side implementation of a pipelined request/response protocol”, Procs. PLoP99.
  130. R.Flanders and E. B. Fernandez, “Data filter architecture pattern using distributed filter components”, Procs. of PLoP99.
  131. E. B. Fernandez and X.H.Yuan, “An analysis pattern for reservation and use of entities”, Procs. of Pattern Languages of Programs Conf (PLoP99).
  132. R.M.Santos, E. B. Fernandez, J.Santos, and M.Zambon, “Object-oriented analysis of real-time telemedical systems”, Procs. of 5th Int. Conf. on Information Systs. Analysis and Synthesis (ISAS’99) vol. 2, 365-370.
  133. E. B. Fernandez, “Building systems using analysis patterns”, Procs. 3rd Int. Software Architecture Workshop (ISA W3), ACM, November 1998, 37-40.
  134. M.Ancona, W.Cazzola, and E. B. Fernandez, “Reflective authorization systems”, Procs.of ECOOP Workshop on Distributed Objects, Sept. 1998.
  135. E. B. Fernandez and K. Nair,”An abstract authorization system for the Internet”, Procs. 9th Int. Workshop on Database and Expert System Applics. , (DEXA’98), September 1998, 310-315.
  136. J. Wu, E. B. Fernandez and K.Huang, “A generalized forward recovery checkpointing scheme”, Procs.Annual IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems, April 1998.
  137. J.Wu and E. B. Fernandez, “The circular token : a novel synchronization primitive “, Procs. 4th. INFORMS Telecommunications Conf. , Boca Raton , FL, March 1998.
  138. E. B. Fernandez, “Business analysis patterns”, Procs. Software Development 98 West , February 1998.
  139. E. B. Fernandez and M.M.Anwar , “Using sequences of use cases and activities in object-oriented analysis”, Procs. 7th Wokshop on Information Technologies and Systems, Atlanta, December 1997.
  140. E. B. Fernandez and J. C. Hawkins, “Determining role rights from use cases”, Procs. 2nd. ACM Workshop on Role-Based Access Control , November 1997, 121-125.
  141. J. Wu, E. B. Fernandez, and Y. Luo, “Embedding of binomial trees in hypercubes with link faults “, Procs. Int. Conf. on Parallel Processing (ICPP’97) .
  142. E. B. Fernandez, “Object-oriented design of complex systems”, Procs. Embedded Systs. Conf. East, Boston, April 1996, 488-500.
  143. T. Woodcock and E. B. Fernandez, “The relationship between the object and behavior models”, Proc. TOOLS USA ’96.
  144. J.-M. Bruel, R. B. France, and E. B. Fernandez, “Formal specification of a multimedia conferencing authorization system”, Proc. OOPSLA ’96, Fifth Workshop on Specification of Behavorial Semantics”, l9-32.
  145. E. B. Fernandez, K. R. Nair, M. M. Larrondo-Petrie, and Y. Xu, “High-level security issues in multimedia/hypertext systems”, in Comm. and Multimedia Security II, P. Horster (Ed.), Chapman & Hall, l996, 13-24.
  146. E. B. Fernandez and R. B. France, “Formal specification of real-time dependable systems “, Proc. of First IEEE Int. Conf. on Eng. of Complex Comp. Systems, Fort Lauderdale, FL, November 6-10, 1995, 342-348.
  147. H. Qian, E. B. Fernandez, and J. Wu , “A combined functional and object-oriented approach to software design “, Proc. of First IEEE Int. Conf. on Eng. of Complex Comp. Systems, Fort Lauderdale, FL, November 6-10, 1995, 167-174.
  148. R. B. France, E. B. Fernandez, and D. Wei, “A formal specification of a user group model for data security”, Proc. of 4th Soft. Eng. Research Forum (SERF), Boca Raton, Nov. 2-3, 1995, 153-161.
  149. J. Wu, E. B. Fernandez,and D. Dai, “Optimal fault-secure scheduling”, Proc. of 8th Int. Conf. on Parallel and Dist. Computing Systems , Orlando, FL, Sept. 21-23, 1995.
  150. E. B. Fernandez and P. D. Chien, “Authorization in multimedia conferencing systems”, Proc. Int. Conf. on Comm. and Multimedia Security , Graz, Austria, Sept. 20-21, 1995, 133-147.
  151. E. B. Fernandez, R. B. France , and D. Wei, “A formal specification of an authorization model for object-oriented databases”, Proc. 9th IFIP WG11.3 Conference on Database Security, Rensselaerville, NY , August 13-16, 1995.
  152. V. Kurapati, R. Caudill, M. Zhou, and E. B. Fernandez, “A control software design method for CIM systems”, Proc. Conf. on CIM in the Process Industries (CIMPRO ’94), April 1994.
  153. B. Abou-Haidar, E. B. Fernandez, and T. Horton, “An object-oriented methodology for the design of control software of flexible manufacturing systems”, Proc. 2nd Workshop on Parallel and Distrib. Real-Time Systems , Cancun, Mex., April 1994.
  154. E. B. Fernandez, J. Wu, and M. H. Fernandez, “User group structures in object-oriented databases”, Proc. 8th Annual IFIP W.G.11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, August 1994.
  155. L. Gao and E. B. Fernandez, “Accelerating conversations for fault-tolerant concurrent software”, Proc. IEEE Southeastcon’94 , April 1994, 334-338.
  156. E. B. Fernandez and C. P. Han, “Behavior design of flexible manufacturing cells using object-oriented models”, Proc. Int. Conf. on CAD, CAM, Robotics, and Autonomous Factories (INCARF 1993), New Delhi, India, Dec. 1993, 133–146.
  157. E. B. Fernandez, M. M. Larrondo-Petrie, and E. Gudes, “A method-based authorization model for object-oriented databases”, Proc. of the OOPSLA 1993 Conference Workshop on Security in Object-Oriented Systems, 70–79.
  158. E. B. Fernandez and C. P. Han, “Object oriented design of flexible manufacturing systems”, Proc. 6th Annual Conf. on Recent Advances on Robotics , Gainesville, 1993, pp.1c/3:1-3:7.
  159. N. Gal-Oz, E. Gudes, and E. B. Fernandez, “A model of methods access authorization in object-oriented databases”, Proc. of the 19th Intl. Conference on Very Large Data Bases, Dublin, Aug. 1993, 52–61.
  160. J. Wu, Y. Wang, and E. B. Fernandez, “A uniform approach to software and hardware fault tolerance”, Proc. of the Euromicro Workshop on Parallel and Distributed Processing, IEEE, 1993, 409–416.
  161. E. B. Fernandez and M. H. Fernandez, “Authorization groups for integrated program support environments”, Proc. of the Florida SERF Conference 1992 , 203–208.
  162. J. Wu and E. B. Fernandez, “Broadcasting in faulty hypercube computers”, Proc. of the 11th Symposium on Reliable Distributed Systems, IEEE, October 1992, 122–129.
  163. J. Wu and E. B. Fernandez, “Broadcasting in faulty cube-connected cycles with minimum recovery time”, Proc. Parallel Processing: CONPAR 92 , Lecture Notes in Comp. Science 634, Springer-Verlag, 1992, 833–834.
  164. R. Zhang, E. B. Fernandez, and J. Wu, “Parallel processing in robotics”, Proc. of the Second Int. Conf. Automation Technology , vol. 3, Taipei, Taiwan, July 1992, 47–53.
  165. L. Brown, J. Wu and E. B. Fernandez, “Fault-tolerant task scheduling for hypercube multiprocessors”, Proc. 23rd Ann. Pittsburgh Modeling and Simulation Conf., 23, 3 (May 1992), 1449–1456.
  166. E. B. Fernandez and M. H. Fernandez, “Fault tolerant parallel algorithms”, Proc. of IEEE Southeastcon ’91, April 1991, pp. 466–469.
  167. R. Bealkowski and E. B. Fernandez, “A heterogeneous multiprocessor architecture for workstations”, Proc. of IEEE Southeastcon ’91, April 1991, pp. 258–262.
  168. E. Gudes, H. Song, and E. B. Fernandez, “Evaluation of negative and predicate based authorization in object oriented databases”, Proc. 4th IFIP WG 11.3 Workshop on Database Security, Halifax, UK, Sept. 1990.
  169. E. Gudes and E. B. Fernandez, “Combined Application / Database Fault Recovery”, Proc. 1990 International Conference on Computer Systems and Software Engineering, (COMPEURO 90), 1990.
  170. H. Song, E. B. Fernandez and E. Gudes “Administrative Authorization in Object-Oriented Semantic Databases,” Proceedings of E.I.S.S. Workshop on Database Security, Karlsruhe, April 1990.
  171. P.C.Buechler and E. B. Fernandez, “Extending N-Version programming to concurrent software”, Procs. Int. Conf. on Databases, Parallel Architectures, and their Applications (PARBASE-90), IEEE, 1990, 531.
  172. J. Wu and E. B. Fernandez, “Fault-Tolerant Distributed Broadcast Algorithms on Cube-Connected-Cycles Networks,” Proc. of 1990 Canadian Conference on Electrical and Computer Engineering, Sept. 1990, 51.4.1-51.4.4.
  173. R. Zhang, E. B. Fernandez and J. Wu, “A Parallel Implementation of Robot Control Equations on T414 Transputers,” Proceedings of the North American Transputer Users Group, 1990 fall meeting.
  174. J. Wu and E. B. Fernandez, “Petri Net Modeling Techniques,” Proceedings of the 21st Annual Pittsburgh Conference on Modeling and Simulation , May 1990, 1311-1317.
  175. J. Wu, and E. B. Fernandez, “A Scheduling Approach to Communication Tasks,” Proceedings of the 22nd Southeastern Symposium on System Theory , March 1990, 91-97.
  176. J. Wu and E. B. Fernandez, “Fault-Tolerant Multiprocessor Networks Through an Extended G-Network,” Proceedings of PARBASE-90, March 1990, 216-220.
  177. J. Wu and E. B. Fernandez, “Some Extensions and Applications of the Byzantine Generals Problem,” Proceedings of the ISMM International Conference on Intelligent Distributed Processing, December 1989, 94-97.
  178. S. Leu, E. B. Fernandez, and T. Khoshgoftaar, “Reliability Modeling of Fault-Tolerant Software Using Petri Nets,” Proceedings of the 20th Annual Pittsburgh Conference on Modeling and Simulation, May 1989, 1099-1104.
  179. E. B. Fernandez, E. Gudes and H. Song, “A Security Model for Object-Oriented Databases,” Proceedings of the 1989 IEEE Symposium on Security and Privacy , 110-115.
  180. P. C. Buechler and E. B. Fernandez, “The Architecture of an Ultra-Reliable Parallel Processing Robotic Control Computer,” Proceedings of the 2nd Conference on Recent Advances in Robotics, Florida Atlantic University, May 1989.
  181. R. Zhang and E. B. Fernandez, “Parallelism for Robotic Control Applications Hardware,” Proceedings of the 2nd Conference on Recent Advances in Robotics , Florida Atlantic University, May 1989.
  182. M. L. Petrie, N. S. Coulter and E. B. Fernandez, “Measuring the Logical Complexity of Parallel Programs,” Proceedings of the 27th Annual Southeast Region ACM Conference, 1989, 636-640.
  183. E. B. Fernandez and H. Song, “Authorization in Object-Oriented Databases,” Proceedings of the 37th ACM Southeast Conference, 1989, 432-435.
  184. S. Leu, E. B. Fernandez, and T. Khoshgoftaar, “Reliability of Fault -tolerant Software Based on a System Architecture with a Recovery Metaprogram,” Proceedings of the 21st Southeastern Symposium on Systems Theory , 1989, 423-426.
  185. P. Goyal and E. B. Fernandez, “Cube-Connected Cubes — A Recursively Defined Network Architecture for Parallel Computation,” Proc. 4th Conference on Hypercubes, Vol I, 1989, 321-325.
  186. D. B. Clifton ad . .B. Fernandez, “A Microprocessor Design for Multilevel Security Communications,” Proceedings of the 4th Aerospace Computer Security Applications Conference, 1988, 194-198.
  187. P. Goyal and E. B. Fernandez, “Encryption Using Random Keys — A Scheme for Security Communications,” Proceedings of the 4th Aerospace Computer SecurityŒ Applications Conference, 1988, 410-412.
  188. R. Zhang and E. B. Fernandez, “Parallel and Fault-Tolerant Implementation of Robotic Control Algorithms,” Proceedings of the 1st Florida Conference on Computer Integrated Engineering and Manufacturing (PROCIEM ’88) , 1988, 17-18.
  189. E. B. Fernandez, V. Chandra, S. Kulkarni, U. Bhathija, and S. Pendse, “A Transputer-based Fault -tolerant Robot Arm Controller,” Proceedings of the International Symposium on Mini and microcomputers (MIMI ’88) , Miami, December 1988, 336-338.
  190. S. T. Yoon and E. B. Fernandez, “Performance Evaluation of a Ridge 32 Computer System,” Proceedings of the International Symposium on Mini and Microcomputers (MIMI ’88), Miami, December 1988, 15-18.
  191. M. L. Petrie, N. S. Coulter, E. B. Fernandez, “Complexity Metrics for Parallel Programming,” Proceedings International Symposium on Mini and Microcomputers (MIMI’88), December 1988, 209-212.
  192. L. Cheng and E. B. Fernandez, “Expanding MML for Dedicated Multiple Microprocessor Applications,” Proceedings of the 21st IEEE Southeastcon ’88 Conference, 117-122.
  193. B. M. Ozaki and E. B. Fernandez, “The Implementation of Software Fault-tolerance in the Intel 286 Processor,” Proceedings of the 21st IEEE Southeastcon ’88 Conference, 75-80.
  194. J. L. Sarmiento and E. B. Fernandez, “A Knowledge-based System for the Development of Fault Tolerant Programs,” Proceedings of the Florida A.I. Research Symposium, May 1988, 119-124.
  195. J. Wu and E. B. Fernandez, “A Weighted Tree Model for Algorithms with Boolean Vector Operands,” Proceedings of the 20th Southeastern Symposium on Systems Theory, 1988, 150-154.
  196. M. Ancona, A. Clematis, G. Dodero, E. B. Fernandez, and V. Gianuzzi, “A System Architecture for Software Fault-Tolerance,” Proceedings of the 3rd International Conference on Fault Tolerant Computing Systems , Bremerhaven, 1987, 273-283.
  197. T. A. Ngo and E. B. Fernandez, “Optimal Scheduling of Processes for a Network of Transputers,” Proceedings of the 25th Annual Conference Southeast Region ACM, April 1987, 316-321.
  198. E. B. Fernandez, “An Evaluation of a RISC System,” Session Record, IEEE Midcon 1985, Chicago, September 1985 (invited paper).
  199. E. B. Fernandez, “Advances in Single-Chip Computer Architectures,” Proceedings of the 1984 IEEE International Conference on Computer Design (ICCD ’84), October 1984, pp. 216-221.
  200. E. B. Fernandez, “Comparison and Evaluation of 32-bit Microprocessors,” IEEE Southcon and Mini/Micro ’84, Orlando, Florida, January 1984, Session Record 9, pp. 9.1-9.11.
  201. C. Wood and E. B. Fernandez, “Authorization in a Decentralized Database System,” Proceedings of the 5th International Conference on Very Large Databases, pp. 352-359, Rio de Janeiro, 1979.
  202. L. Lichten and E. B. Fernandez, “Interaction with Databases through Procedural Languages,” Proceedings of the ACM 1979 Annual Conference , pp. 937-945.
  203. E. B. Fernandez and C. Wood, “The Relationship Between Operating System and Database System Security: a Survey,” Proceedings of the Computer Software Applications Conference (COMPSAC), November 1977, 453-562.
  204. R. Summers and E. B. Fernandez, “An Approach to Data Security,” Proceedings of the 8th Australian Computer Conference, September 1978.
  205. T. Lang, E. B. Fernandez and R. Summers, “A System Architecture for Compile-time Actions in Databases,” Proceedings of the ACM 1977 Annual Conference, pp. 453-462, October 1977.
  206. T. Lang, E. Nahouraii, K. Kasuga and E. B. Fernandez, “An Architectural Œ Extension for a Large Database System Incorporating a Processor for Disk Search”, Proceedings of the 3rd International Conference on Vary Large Data Bases, Tokyo, Japan, pp. 204-210, October 1977.
  207. E. B. Fernandez and R. C. Summers, “Integrity Aspects of a Shared Database”, AFIPS Conference Proceedings, Vol. 45, pp. 819-827, NCC 1976.
  208. E. B. Fernandez, R. C. Summers and T. Lang, “Definition and Evaluation of Access Rules in Data Management Systems”, Proceedings 1st International Conference on Very Large Databases, Boston, 1975, 268-285.
  209. E. B. Fernandez, R. C. Summers, and C. B. Coleman, “An Authorization Model for a Shared Data Base”, Proceedings of the 1974 SIGMOD International Conference, ACM, New York, pp. 23-31, 1975.
  210. R. C. Summers, C. D. Coleman, and E. B. Fernandez, “A programming Language Extension for Access to a Shared Data Base”, Proceedings of the 1975 ACM Pacific Conference, pp. 114-118, 1975.
  211. R. C. Summers, E. B. Fernandez and C. D. Coleman, “Shared Data Access Control with Programming Language Support”, Proceedings of the 8th Hawaii International Conference on System Science, Honolulu, January, 1975, pp. 187-190.
  212. E. B. Fernandez, “Restructuring and Scheduling of Parallel Computations”, Conference Record of the 5th Asilomar conference on Circuits and Systems, pp. 472-479, November 1971.
  213. E. B. Fernandez, “Restructuring of Graph Models of Computations,” Proceedings of the International Conference on Networks, Systems, and Computers , Oaxtepec, Mexico, pp. 664-668, 1971.
  214. H. Arango, C. Holzmann, E. B. Fernandez and S. Padin, “On the Set of Trees of an Interconnection of Graphs”, Proceedings of the International Symposium on Circuit and System Theory, Kyoto, Japan, 1970.
  215. E. B. Fernandez, “An Evaluation of Tree of Tree Generation Methods”, Proceedings of the 12th Midwest Symposium on Circuit Theory, Austin, Texas, April 1969.