{"id":218,"date":"2010-01-16T16:01:15","date_gmt":"2010-01-16T21:01:15","guid":{"rendered":"http:\/\/faculty.eng.fau.edu\/fernande\/?page_id=218"},"modified":"2013-01-13T17:19:21","modified_gmt":"2013-01-13T22:19:21","slug":"book-chapters","status":"publish","type":"page","link":"https:\/\/faculty.eng.fau.edu\/fernande\/publications\/book-chapters\/","title":{"rendered":"Book Chapters"},"content":{"rendered":"<p><code><br \/><\/code><br \/>\n<span style=\"font-size: small\"><\/p>\n<li> M. VanHilst and E. B. Fernandez, &#8220;A Construct Grid Approach to Security Classification and Analysis&#8221;, accepted as a chapter in <em>Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions,<\/em> Manish Gupta, John Walp, and  Raj Sharman, IGI Global 2011.<\/li>\n<li> E. B. Fernandez, &#8220;Wireless network security for health applications&#8221;, to appear in the <em>Pervasive Communication Handbook,<\/em> M. Ilyas (Ed.), CRC Press 2011.<\/li>\n<li> E. B. Fernandez, N. Yoshioka, H. Washizaki, J. Jurjens, M.VanHilst , and G. Pernul, &#8220;Using security patterns to develop secure systems&#8221;,  in H. Mouratidis, Ed., <em>Software engineering for secure systems: Industrial and Research Perspectives,<\/em> IGI Global Group,  2010<br \/>\n<a href=\"http:\/\/www.igi-global.com\">http:\/\/www.igi-global.com<\/a><\/li>\n<li> E. B. Fernandez, K. Hashizume, I. Buckley, M. M. Larrondo-Petrie, and M. VanHilst, &#8220;Web services security: Standards and products&#8221;,  Chapter 8 in <em>Web Services Security Development and Architecture: Theoretical and Practical Issues,<\/em> Carlos A. Gutierrez, Eduardo Fernandez-Medina, and Mario Piattini (Eds.), IGI Global Group 2010. 152-177.<\/li>\n<li> E. B. Fernandez, C. Marin, and M. M. Larrondo-Petrie, &#8220;Security requirements for social networks in Web 2.0&#8221;, in the <em>Handbook of Social Networks: Technologies and Applications,<\/em> B. Furht (Editor),  Springer 2010.<br \/>\n<a href=\"http:\/\/www.springer.com\/computer\/swe\/book\/978-1-4419-7141-8\">http:\/\/www.springer.com\/computer\/swe\/book\/978-1-4419-7141-8<\/a><\/li>\n<li>E. B. Fernandez, &#8220;Security patterns and a methodology to apply them&#8221;, to appear in <em>Security and Dependability for Ambient Intelligence<\/em>, G. Spanoudakis and A. Ma\u00f1a (Eds.), Springer Verlag, 2009.<\/li>\n<li>E. B. Fernandez, N. Yoshioka (NII, Japan), H. Washizaki (Waseda U., Japan), J. Jurjens (Open U., UK), M. VanHilst , and G. Pernul (U. of Regensburg, Germany), &#8220;Using security patterns to develop secure systems&#8221;, to appear in <em>Software engineering for secure systems: Industrial and Research Perspectives<\/em>, H. Mouratidis, Ed., IGI Global Group, 2009.<\/li>\n<li>J. Jurjens and E. B. Fernandez, &#8220;Secure database development&#8221;, to appear in the <em>Encyclopedia of Database Systems<\/em>, Ling Liu and Tamer Oszu (eds.), Springer Verlag, Berlin, Germany, 2009.<\/li>\n<li>E. B. Fernandez and M. VanHilst, &#8220;An overview of WiMax security&#8221;, Chapter 10 in  the  <em>Handbook of WiMax security and QoS<\/em>, S. Ahson and M. Ilyas (Eds.),  CRC Press, Taylor and Francis Group, Boca Raton, FL, 2008, 197-204.<\/li>\n<li>E. B. Fernandez and M. M. Larrondo Petrie, &#8220;Securing design patterns for distributed systems&#8221;, Chapter 3 in <em>Security in Distributed, Grid, and Pervasive Computing<\/em>, Y. Xiao (Ed.)., Auerbach Pubs., Taylor &amp; Francis Group, LLC, 2007, 53-66.<\/li>\n<li>E. B. Fernandez, M. M. Larrondo-Petrie, T. Sorgente, and M. VanHilst, &#8220;A methodology to develop secure systems using patterns&#8221;, Chapter 5 in <em>&#8220;Integrating security and software engineering: Advances and future vision&#8221;,<\/em> H. Mouratidis and P. Giorgini (Eds.), IDEA Press, 2006, 107-126.<\/li>\n<li>E. B. Fernandez, M. Thomsen, and M. H. Fernandez, &#8220;Comparing the security architectures of Sun ONE and Microsoft .NET&#8221;, Chapter 9 in <em>Information security policies and actions in modern integrated systems<\/em>, C. Bellettini and M.G. Fugini (Eds.), Idea Group Publishing, 2004, pp.317-330.<\/li>\n<li>E. B. Fernandez, &#8220;Building complex object-oriented systems with patterns and XP&#8221;, Chapter 47 in <em>Extreme Programming Perspectives,<\/em> M. Marchesi, G. Succi, D. Wells,  and L. Williams, (Eds.) , Addison-Wesley, 2003, pp. 591-600.<\/li>\n<li>E. B. Fernandez, &#8220;Web services security&#8221;, chapter in <em>Web Services Business Strategies and Architectures<\/em>, P. Fletcher and M. Waterhouse (Eds.), Expert Press, UK, 2002, 290-302.<\/li>\n<li>E. B. Fernandez, J. Wu, and D. Hancock, &#8220;A design method for real-time object-oriented systems using Communicating Real-Time State Machines&#8221;, Chapter 11 in <em> Successful Software Reengineering<\/em>, S. Valenti (Ed.), IRM Press, 2002, 171-185.<\/li>\n<li>R. Z. Xue and E. B. Fernandez, &#8220;Accessing legacy databases from the web using CORBA&#8221;, Chapter 13 in <em> Handbook of Internet Computing<\/em>, B. Furht (Ed.), CRC Press, Boca Raton, FL, 2000.<\/li>\n<li>M. Ancona, W. Cazzola, and E. B. Fernandez, &#8220;Reflective authorization systems: Possibilities, benefits, and drawbacks&#8221;, in J. Vitek and C. Jensen (Eds.), Springer Verlag, Lecture Notes in Computer Science No 1603, 1999, 35-49.<\/li>\n<li>E. B. Fernandez, &#8220;Formal specifications for real-time fault-tolerant systems&#8221;, in <em>Real Time Computing<\/em>, W. A. Halang and A. D. Stoyenko (Eds.), NATO ASI Series, vol. 127, 1994, 687&#8211;688.<\/li>\n<li>E. B. Fernandez, M. M. Larrondo-Petrie, and E. Gudes, &#8220;A method-based authorization model for object-oriented databases&#8221;, in <em>Security for Object-Oriented Systems<\/em>, book of Springer Verlag, London, 1994.<\/li>\n<li>E. Gudes, H. Song, and E. B. Fernandez, &#8220;Evaluation of negative and predicate based authorization in object-oriented databases&#8221;, in <em>Database Security IV<\/em>, North Holland, 1991, 85&#8211;98.<\/li>\n<li>M. M. Larrondo-Petrie, E. Gudes, H. Song, E. B. Fernandez, &#8220;Security Policies in Object-Oriented Databases&#8221;, in <em>Database Security III<\/em>, North-Holland 1990, 257-268. \u0152<\/li>\n<li>J. Wu, and E. B. Fernandez, &#8220;The extended G network, a fault tolerant interconnection network for multiprocessors&#8221;, in <em>Parallel Architectures<\/em>, N. Rishe, S. Navathe, and D. Tal (Eds.) IEEE Computer Society Press, 1990, pp. 250&#8211;259.<\/li>\n<li>M. Ancona, A. Clematis, G. Dodero, E. B. Fernandez, and V. Gianuzzi, &#8220;Using different language levels for implementing fault tolerant programs&#8221;, <em>Microprocessing and Microprogramming<\/em>, Vol. 20 (1987), 33-38.<\/li>\n<li>B. Bussell, E. B. Fernandez, H. C. Levy, &#8220;Optimal Scheduling for Homogeneous Multiprocessors&#8221;, <em>Information Processings 74<\/em>, Vol, 2, 286-290, North Holland 1974.<\/li>\n<p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>M. VanHilst and E. B. Fernandez, &#8220;A Construct Grid Approach to Security Classification and Analysis&#8221;, accepted as a chapter in Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, Manish Gupta, John Walp, and Raj Sharman, IGI Global 2011. E. B. Fernandez, &#8220;Wireless network security for health applications&#8221;, to appear in the [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":0,"parent":190,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-218","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":21,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":515,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/218\/revisions\/515"}],"up":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/190"}],"wp:attachment":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}