{"id":221,"date":"2010-01-16T16:02:42","date_gmt":"2010-01-16T21:02:42","guid":{"rendered":"http:\/\/faculty.eng.fau.edu\/fernande\/?page_id=221"},"modified":"2014-12-21T21:30:07","modified_gmt":"2014-12-22T02:30:07","slug":"recent","status":"publish","type":"page","link":"https:\/\/faculty.eng.fau.edu\/fernande\/publications\/recent\/","title":{"rendered":"Recent"},"content":{"rendered":"<h2><a class=\"vt-p\" href=\"http:\/\/scholar.google.com\/citations?hl=en&amp;user=OAfHG7QAAAAJ&amp;view_op=list_works\"><span style=\"text-decoration: underline\">Publications at\u00a0Google Scholar<\/span><\/a><\/h2>\n<p>&nbsp;<\/p>\n<h3><strong>Books<\/strong><\/h3>\n<ul>\n<li>E.B. Fernandez,\u00a0<em>Security Patterns in Practice: Designing Secure Architectures Using Software Patterns<\/em>, Wiley Series on Software Design Patterns, 2013.<\/li>\n<li>M. Schumacher, E. B.Fernandez, D. Hybertson,\u00a0 F. Buschmann, and P. Sommerlad, <em>Security Patterns: Integrating security and systems engineering&#8221;,\u00a0<\/em>\u00a0Wiley Series on Software Design Patterns, 2006.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>Journal papers<\/strong><\/h3>\n<ul>\n<li>E.B.Fernandez, Raul Monge, and Keiko Hashizume, \u201cBuilding a security reference architecture for cloud systems\u201d, accepted for publication in<em> Requirements Engineering<\/em>. (ISI)<\/li>\n<li>Santiago Moral-Garc\u00eda, Santiago Moral-Rubio, E.B. Fernandez, E. Fernandez-Medina, &#8220;Enterprise Security Pattern: A New Type of Security Pattern&#8221;, accepted for <em>Security and Communication Networks <\/em>(ISI)<\/li>\n<li>S. Moral-Garcia, S. Moral-Rubio, E. B. Fernandez, and E. Fernandez-Medina &#8220;Enterprise Security Pattern: A Model-Driven Architecture Instance&#8221;, <em>The Journal of Computer Standards &amp; Interfaces (<\/em> Special Issue on Security in Information Systems), vol. 36, No 4,748-758, 2014. (Elsevier).\u00a0 (SCOPUS)<\/li>\n<li>A. Uzunov and E.B.Fernandez, \u201cAn Extensible Pattern-based Library and Taxonomy of Security Threats for Distributed Systems\u201d- Special Issue on Security in Information Systems of the <em>Journal of Computer Standards &amp; Interfaces<\/em>. \u00a0(SCOPUS) <a class=\"vt-p\" href=\"http:\/\/dx.doi.org\/10.1016\/j.csi.2013.12.008\">http:\/\/dx.doi.org\/10.1016\/j.csi.2013.12.008<\/a><\/li>\n<li>Keiko Hashizume, David G. Rosado, Eduardo Fern\u00e1ndez-Medina, Eduardo B. Fernandez \u201cAn Analysis of Security issues for Cloud Computing\u201d, <em>Journal of Internet Services and Applications<\/em> 2013, <strong>4<\/strong>:5 (27 February 2013) (SCOPUS)<\/li>\n<li><strong>\u00a0<\/strong>Anton V. Uzunov, E.B.Fernandez, and K. Falkner, \u201cEngineering Security into Distributed Systems: A Survey of Methodologies\u201d, \u00a0<em>Journal of Universal Computer Science, \u00a0<\/em>Vol. 18, No. 20, 2013, pp. 2920-3006. (ISI)\u00a0<a class=\"vt-p\" href=\"http:\/\/www.jucs.org\/jucs_18_20\/engineering_security_into_distributed\">http:\/\/www.jucs.org\/jucs_18_20\/engineering_security_into_distributed<\/a><\/li>\n<li>\u00a0E.B. Fernandez, David La Red Martinez, and J. I. Pelaez, &#8220;A conceptual approach to voting based on patterns&#8221;, <em>Government Information Quarterly<\/em>.\u00a0 30 (2013), 64-73 (ISI, Impact factor: 1.425.)<\/li>\n<li>\u00a0A.V. Uzunov, E.B. Fernandez &amp; K. Falkner (2012), &#8220;Securing distributed systems using patterns: A survey&#8221;, <em>Computers &amp; Security,<\/em> <strong>31<\/strong>(5), 681 &#8211; 703. (ISI, IF= 0.868)) doi:<a class=\"vt-p\" href=\"http:\/\/dx.doi.org\/10.1016\/j.cose.2012.04.005\">10.1016\/j.cose.2012.04.005<\/a><\/li>\n<li><strong>\u00a0<\/strong>Eduardo B. Fernandez, \u201cEditorial: Introduction to the Special Issue on Recent Advances in Web Services\u201d, <em>Future Internet<\/em> 2012, 4(3), 618-620; doi:10.3390\/fi4030618\u00a0<a class=\"vt-p\" href=\"http:\/\/www.mdpi.com\/1999-5903\/4\/3\/618\/?utm_source=article_link&amp;utm_medium=email&amp;utm_campaign=releaseIssue_futureinternet\">http:\/\/www.mdpi.com\/1999-5903\/4\/3\/618\/<\/a><\/li>\n<li>\u00a0E.B.Fernandez, O.Ajaj, I.Buckley, N.Delessy-Gassant, K.Hashizume, M.M. Larrondo-Petrie, \u201c A Survey of Patterns for Web Services Security and Reliability Standards\u201d. <em>Future Internet<\/em> 2012, <em>4<\/em>, 430-450. <a class=\"vt-p\" href=\"http:\/\/www.mdpi.com\/1999-5903\/4\/2\/430\/\">http:\/\/www.mdpi.com\/1999-5903\/4\/2\/430\/<\/a><\/li>\n<li>\u00a0E.B.Fernandez and Sergio Mujica, \u201cModel-based development of security requirements\u201d, <em>CLEI (Latin-American Center for Informatics Studies) Journal. Vol. 14, No 3, paper 2, <\/em>December 2011 Special issue of best papers presented at SCCC 2010, Antofagasta, Chile<\/li>\n<li>\u00a0A. Marcus, M. Cardei, I. Cardei, E. Fernandez, F. Frati, E. Damiani, &#8220;A Pattern for Web-based WSN Monitoring&#8221; , <em>Journal of Communications<\/em> , Special Issue on New Advances in Wireless Sensor Networks Vol 6, No 5,\u00a0 393-399, Aug 2011.\u00a0<a class=\"vt-p\" href=\"http:\/\/ojs.academypublisher.com\/index.php\/jcm\/issue\/view\/289\">http:\/\/ojs.academypublisher.com\/index.php\/jcm\/issue\/view\/289<\/a><\/li>\n<li>D. L. La Red, J.I. Pel\u00e1ez, J.M. Do\u00f1a, and E.B. Fern\u00e1ndez, \u201cWKC-OWA, a new neat-OWA operator to aggregate information in democratic decision problems\u201d,\u00a0 <em>International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (IJUFKS).<\/em> Volume No.19, No. 5. 759-779, DOI: <a class=\"vt-p\" href=\"http:\/\/dx.doi.org\/10.1142\/S0218488511007222\">10.1142\/S0218488511007222<\/a>. (ISI)<\/li>\n<li>Xiaohong Yuan and E. B. Fernandez, &#8221; Patterns for Business-to-Consumer E-Commerce Applications&#8221;, <em>International Journal of Software Engineering &amp; Applications (IJSEA), <\/em>vol. 2 No 3, July 2011, 1-20, http:\/\/airccse.org\/journal\/ijsea\/papers\/0711ijsea01.pdf<\/li>\n<li><strong>\u00a0<\/strong>Juan C. Pelaez and Eduardo B. Fernandez, &#8220;Network Forensics Models for Converged Architectures&#8221;, <em>Int. Journal on Advances in Security<\/em>, IARIA, 2010, vol. 3 No 1 &amp; 2, 2010. <a class=\"vt-p\" href=\"http:\/\/www.iariajournals.org\/security\/tocv3n12.html\">http:\/\/www.iariajournals.org\/security\/tocv3n12.html<\/a><\/li>\n<li>\u00a0A. Agarwal and E.B. Fernandez, \u201cSystem Level Power Management for Embedded RTOS: an Object-Oriented Approach\u201d<strong>, <\/strong><em>International Journal of Engineering (IJE)<\/em> , Vol. 3, No 5, 2010<\/li>\n<li>\u00a0J. Pelaez, E.B.Fernandez, and M.M. Larrondo-Petrie, &#8220;Misuse patterns in VoIP&#8221;,\u00a0 <em>Security and Communication Networks Journal.<\/em> Wiley, vol. 2, No 2, 635-653, published online: 15\u00a0Apr\u00a02009 <a class=\"vt-p\" href=\"http:\/\/www3.interscience.wiley.com\/journal\/122324463\/abstract\">http:\/\/www3.interscience.wiley.com\/journal\/122324463\/abstract<\/a>\u00a0 \u00a0<a class=\"vt-p\" href=\"http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.105\/pdf\">http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.105\/pdf<\/a>\u00a0\u00a0 (ISI)<\/li>\n<li>M. VanHilst, E.B.Fernandez, and F. Braz, &#8220;A multidimensional classification for users of security patterns&#8221;, \u00a0<em>Journal of Research and Practice in Information Technology, <\/em>vol. 41, No 2, May 2009, 87-97.\u00a0 (ISI)<\/li>\n<li><strong>\u00a0<\/strong>E.B.Fernandez, J.C. Pelaez,\u00a0 and M.M. Larrondo-Petrie, &#8220;Security patterns for voice over IP networks&#8221;,\u00a0 <em>Journal of Software, <\/em>Vol. 2, No 2, August 2007, 19-29(<a class=\"vt-p\" href=\"http:\/\/www.academypublisher.com\/jsw\">http:\/\/www.academypublisher.com\/jsw<\/a>)<\/li>\n<li>\u00a0B. Wu, J. Wu, E.B.Fernandez, M. Ilyas, and S. Magliveras, \u201cSecure and efficient key management in mobile ad hoc networks\u201c, <em>Journal of Network and Computer Applications, <\/em>vol. 30, 2007, 937-954.<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><strong>\u00a0<\/strong><\/p>\n<h3>Book chapters (refereed)<\/h3>\n<ul>\n<li>\u00a0Keiko Hashizume, Nobukazu Yoshioka, Eduardo B. Fernandez, &#8220;Three misuse patterns for Cloud Computing&#8221;, in <em>Security Engineering for Cloud Computing: Approaches and Tools<\/em> , edited by David Garcia Rosado and Eduardo Fernandez-Medina, IGI Global. 2012<\/li>\n<li>\u00a0M. VanHilst and E.B.Fernandez, &#8220;A Construct Grid Approach to Security Classification and Analysis&#8221;,\u00a0 in &#8220;Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions &#8220;, Manish Gupta, John Walp, and\u00a0 Raj Sharman., IGI Global 2011.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Book chapters (by invitation)<\/h3>\n<ul>\n<li>\u00a0E.B.Fernandez, &#8220;Security in Data Intensive Computing Systems&#8221;, chapter in the Handbook of Data Intensive Computing, B. Furht and A. Escalante (Eds.)<\/li>\n<li>\u00a0E. B. Fernandez, &#8220;Wireless network security for health applications&#8221;, Chapter 15 in the &#8220;Pervasive Communication Handbook\u201d, S. Shah, M. Ilyas, H.T. Mouftah (Eds.), CRC Press 2012.<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<h3>Conference papers<\/h3>\n<h4>\u00a02014<\/h4>\n<ul>\n<li><strong>\u00a0<\/strong>E. B. Fernandez, Raul Monge, and Rene Carvajal, &#8220;A pattern for a secure and safe port loading facility&#8221;, was accepted for the <em>10th Latin American Conference on Pattern Languages of Programs &#8211; SugarLoafPLoP 2014.<\/em><\/li>\n<li><em>\u00a0<\/em>Ali Alkazimi and E.B.Fernandez, &#8220;Change Cipher Specification Message Drop Attack: A Misuse Pattern for the SSL\/TLS Server Authentication Handshake Protocol&#8221;, was accepted for the <em>10th Latin American Conference on Pattern Languages of Programs &#8211; SugarLoafPLoP 2014.<\/em><\/li>\n<li>\u00a0E.B.Fernandez and M. VanHilst, &#8221;The Secure Domain Name System pattern&#8221;, <em>21st Conf. on Pattern Languages of Programs (PLoP 2014)<\/em><\/li>\n<li>\u00a0Ali Alkazimi and E.B.Fernandez. &#8221;Cipher Suite Rollback Attack: A Misuse Pattern for TLS Server Authentication Handshake Protocol\u201d, \u00a0<em>21st Conf. on Pattern Languages of Programs (PLoP 2014)<\/em><\/li>\n<li>\u00a0E. B. Fernandez, Hernan Astudillo, Gilberto Pedraza-Garcia, Revisiting architectural tactics for security, <em>Procs. LACCEI , July 2014<\/em><\/li>\n<li>\u00a0E.B.Fernandez and Sergio Mujica, &#8220;From domain models to secure and compliant applications&#8221;, <em>Procs.12th LACCEI<\/em><\/li>\n<li>\u00a0O. Encina, E. B. Fernandez and R. Monge, \u201cThreat analysis and misuse patterns of federated Inter-Cloud systems\u201d. <em>Proceedings of 19th European Conference on Pattern Languages of Programs<\/em>, Germany, July 2014.<\/li>\n<li>\u00a0E.B.Fernandez, R. Monge, R. Carvajal, O Encina, J. Hernandez, and P. Silva, R.&#8221;Patterns for Content-Dependent and Context-Enhanced Authorization&#8221;.<em> Proceedings of 19th European Conference on Pattern Languages of Programs<\/em>, Germany, July 2014.<\/li>\n<li>\u00a0E. B.Fernandez, Nobukazu Yoshioka, Hironori\u00a0 Washizaki, and Joseph Yoder, &#8220;Abstract security patterns for requirements specification and analysis of secure systems&#8221;, <em>Procs. of the WER\u00a02014 conference, a track of the\u00a0 17<sup>th<\/sup> Ibero-American Conf. on Soft. Eng.(CIbSE 2014), <\/em>Pucon, Chile, April 2014<\/li>\n<li>\u00a0Ren\u00e9 No\u00ebl, Gilberto Pedraza-Garc\u00eda Hern\u00e1n Astudillo, E. B.Fern\u00e1ndez,, \u201cAn Exploratory Comparison of Security Patterns and Tactics to Harden Systems\u201d, <em>Procs. of the \u00a0ESELAW\u00a02014 conference, a track of the\u00a0 17<sup>th<\/sup> Ibero-American Conf. on Soft. Eng.(CIbSE 2014)<\/em><\/li>\n<li>\u00a0Oscar Encina, E.B. Fernandez, and Ra\u00fal Monge, \u201cTowards Secure Inter-Cloud Architectures\u201d. <em>Proceedings of Nordic pattern conference on Pattern Languages of Programs,<\/em> Sagadi Manor, Estonia, April 2014.<\/li>\n<li>\u00a0E.B. Fernandez and R. Monge, \u201cA Security Reference Architecture for Cloud Systems\u201d, <em>Procs. of\u00a0 the Workshop on <a class=\"vt-p\" href=\"https:\/\/sites.google.com\/site\/dascca2014\/\">Dependable and Secure Cloud Computing Architecture<\/a>\u00a0(DaSCCA<\/em>), part of \u00a0the\u00a0<em><a class=\"vt-p\" href=\"http:\/\/www.wicsa.net\/\">Working IEEE\/IFIP Conference on Software Architecture (WICSA) 2014<\/a>.<\/em><\/li>\n<li><em>\u00a0<\/em>A. Uzunov, K. Falkner, and E. B. Fernandez, \u201c A comprehensive pattern-driven\u00a0 security methodology for distributed systems\u201d, <em>Procs. of\u00a0 the\u00a0<a class=\"vt-p\" href=\"http:\/\/www.aswec.org\/\">Australasian Software Engineering Conference\u00a0<\/a>(ASWEC2014), Sydney, Australia, April 2014.\u00a0<\/em><\/li>\n<li><strong>\u00a0<\/strong>E. B. Fernandez, Nobukazu Yoshioka<em>,<\/em> and Hironori Washizaki, \u201cPatterns for cloud firewalls\u201d,\u00a0 <em>Procs. of<\/em> <em>AsianPLoP (Pattern Languages of Programs) 2014<\/em>, Tokyo, Japan, March 2014.<\/li>\n<li>\u00a0E. B. Fernandez and S. Mujica, \u201cTwo patterns for HIPAA regulations\u201d, <em>Procs. of AsianPLoP (Pattern Languages of Programs) 2014<\/em>, Tokyo, Japan, March 2014.<\/li>\n<li>\u00a0Oscar Encina, E.B. Fernandez, and Ra\u00fal Monge, \u201cA misuse pattern for Denial-of-Service\u00a0 in federated Inter-Clouds\u201d,\u00a0\u00a0 <em>Procs. of<\/em> <em>AsianPLoP (Pattern Languages of Programs) 2014<\/em>, Tokyo, Japan, March 2014.<\/li>\n<\/ul>\n<h4>\u00a0 2013<\/h4>\n<ul>\n<li>O. Ajaj and E. B. Fernandez, &#8221; A pattern for the WS-Federation standard for web services&#8221;, <em>20th Conf. on Pattern Languages of Programs (PLoP 2013)<\/em><\/li>\n<li>\u00a0E.B. Fernandez, Raul Monge, and Keiko Hashizume, &#8220;Two patterns for cloud computing: Secure Virtual Machine Image Repository and Cloud Policy Management Point&#8221;<em>20th Conf. on Pattern Languages of Programs (PLoP 2013)<\/em><\/li>\n<li>\u00a0Antonio Ma\u00f1a, E.B. Fernandez, Jose Ruiz, and Carsten Rudolph, &#8220;Towards Computer-based Security Patterns&#8221;<em>20th Conf. on Pattern Languages of Programs (PLoP 2013)<\/em><\/li>\n<li>\u00a0 Fabricio Braz, E.B. Fernandez, and Diogo C. Rispoli, &#8220;Transaction Authentication pattern&#8221;,\u00a0 MiniPLoP Brazil 2013 (Latin American Mini Conference on Pattern Languages of Programming), Bras\u00edlia, Brazil, September 28, 2013<\/li>\n<li>\u00a0Anton V. Uzunov, Katrina Falkner, Eduardo B. Fernandez , \u201cDistributed Software Architectures for the Determination and Incorporation of Security and Other Non-Functional Requirements\u201d, <em>22nd Australasian Software Engineering Conference (ASWEC 2013<\/em>), Melbourne, Australia, 4-7 June 2013<\/li>\n<\/ul>\n<h4>\u00a02012<\/h4>\n<ul>\n<li><strong>\u00a0<\/strong>Keiko Hashizume, E.B.Fernandez, and Maria M. Larrondo-Petrie, &#8220;A pattern for Software-as-a-Service in Clouds&#8221;, \u00a0RISE&#8217;12,Workshop on Redefining and Integrating Security Engineering, part of the ASE Int. Conf. on Cyber Security, Washington, DC, December 12-14 (http:\/\/www.securityengineeringforum.org\/rise12)<\/li>\n<li>\u00a0E B. Fernandez, Ernest Alder, Richard Bagley, and Swati Paghdar, \u00a0&#8220;A Misuse Pattern for Retrieving Data from a Database Using SQL Injection&#8221; , RISE&#8217;12,Workshop on Redefining and Integrating Security Engineering, part of the ASE Int. Conf. on Cyber Security, Washington, DC, December 12-14 (http:\/\/www.securityengineeringforum.org\/rise12)<\/li>\n<li><strong>\u00a0<\/strong>E.B. Fernandez and A.V. Uzunov, \u201cSecure middleware patterns\u201d, <em>4th International Symposium on Cyberspace Safety and Security (CSS 2012)<\/em>, Melbourne, Australia, Dec. 12-13, 2012.<\/li>\n<li><strong>\u00a0<\/strong>Ola Ajaj and Eduardo B. Fernandez, \u201cA pattern for the WS-SecureConversation standard for web services\u201d,\u00a0\u00a0 <em>19<sup>th<\/sup>. Int. Conference on Pattern Languages of Programs (PLoP2012<\/em>).<\/li>\n<li>\u00a0Keiko Hashizume, Eduardo B. Fernandez, Maria M. Larrondo-Petrie, \u201cCloud Service Model Patterns\u201d, \u00a0\u00a0<em>19<sup>th<\/sup>. Int. Conference on Pattern Languages of Programs (PLoP2012).<\/em><\/li>\n<li><em>\u00a0<\/em>Ajoy Kumar and E.B. Fernandez, \u201cA Security Pattern for the Transport Layer Security (TLS) Protocol\u201d, \u00a019<sup>th<\/sup>. Int. Conference on Pattern Languages of Programs (PLoP2012).<\/li>\n<li><strong>\u00a0<\/strong>Ingrid Buckley and E.B.Fernandez, &#8220;Failure patterns: A new way to analyze failures&#8221;,\u00a0<em>First International Symposium on Software Architecture and Patterns<\/em> in conjunction with the 10th Latin American and Caribbean Conference for Engineering and Technology, July 23-27, 2012, Panama City, Panama<\/li>\n<li>\u00a0Kaivan Kaighovadi and E.B.Fernandez, &#8220;A pattern for the Secure Shell protocol&#8221;, <em>First International Symposium on Software Architecture and Patterns,<\/em> in conjunction with the 10th Latin American and Caribbean Conference for Engineering and Technology, July 23-27, 2012, Panama City, Panama<\/li>\n<li>\u00a0Ajoy Kumar and E.B.Fernandez, &#8220;Security patterns for Intrusion Detection Systems&#8221;,\u00a0<em>First International Symposium on Software Architecture and Patterns<\/em> in conjunction with the 10th Latin American and Caribbean Conference for Engineering and Technology, July 23-27, 2012, Panama City, Panama<\/li>\n<li>\u00a0N. Delessy and E.B. Fernandez,\u00a0 \u201cThe Secure MVC pattern\u201d, <em>First International Symposium on Software Architecture and Patterns<\/em>, in conjunction with the 10th Latin American and Caribbean Conference for Engineering and Technology, July 23-27, 2012, Panama City, Panama.<\/li>\n<li>\u00a0E.B. Fernandez and H. Astudillo, \u201cShould we use tactics or patterns to build secure systems?\u201d, \u00a0First International Symposium on Software Architecture and Patterns, in conjunction with the 10th Latin American and Caribbean Conference for Engineering and Technology, July 23-27, 2012, Panama City, Panama<\/li>\n<li><strong>\u00a0<\/strong>K. Hashizume, E. B. Fernandez, M. Larrondo-Petrie, Cloud Infrastructure Pattern, First International Symposium on Software Architecture and Patterns, in conjunction with the 10th Latin American and Caribbean Conference for Engineering and Technology, July 23-27, 2012, Panama City, Panama<\/li>\n<li><strong>\u00a0<\/strong>Ola Ajaj and E.B. Fernandez,&#8221;Adding Security to BPEL Workflows of Web Services&#8221;, <em>Procs. of\u00a0 8th International Conference on Innovations in Information\u00a0<\/em><em>Technology (IIT&#8217;12).<\/em> March 18-20, 2012, Al Ain, UAE<\/li>\n<\/ul>\n<h4>\u00a02011<\/h4>\n<ul>\n<li>\u00a0Ingrid Buckley and Eduardo B. Fernandez, &#8220;Enumerating software failures to build dependable distributed applications&#8221;, <em>Procs. of the 13th IEEE Int.High Assurance Systems Engineering Symposium (HASE 2011<\/em>), Boca Raton, Nov. 10-12.<\/li>\n<li>\u00a0Ingrid Buckley, Eduardo Fernandez, Marco Anisetti, Claudio A. Ardagna, Masoud Sadjadi, and Ernesto Damiani, &#8220;Towards Pattern-based Reliability Certification of Services, <em>Procs<\/em>. <em>1st International Symposium on <\/em><em>Secure Virtual Infrastructures (DOA-SVI&#8217;11)<\/em>, 17-19 Oct. 2011, Crete, Greece, <em>Vol. 7045 Springer Lecture Notes in Computer Science.<\/em><\/li>\n<li>Eduardo B. Fernandez, Nobukazu Yoshioka, and Hironori Washizaki &#8220;Two patterns for distributed systems: Enterprise Service Bus (ESB) and Distributed Publish\/Subscribe&#8221;, <em>18th Conference on Pattern Languages of Programs (PLoP 2011)<\/em><\/li>\n<li>\u00a0Zhen Jiang, E.B.Fernandez, and L. Cheng, &#8220;P2N: A pedagogical pattern for teaching computer programming to non-CS majors&#8221;, <em>18th Conference on Pattern Languages of Programs (PLoP 2011)<\/em><\/li>\n<li>\u00a0Keiko Hashizume, Eduardo B. Fernandez, and Nobukazu Yoshioka, &#8220;Misuse patterns for cloud computing: Malicious virtual machine creation&#8221;&#8221;, <em>Procs. of the Twenty-Third International Conference on Software Engineering and\u00a0 Knowledge Engineering (SEKE<\/em> <em>2011),<\/em> Miami Beach, USA, July 7-9, 2011, \u00a0(Acceptance rate: 31%)<\/li>\n<li>\u00a0Carolina Marin, E.B.Fernandez, and Maria M. Larrondo-Petrie, &#8220;Secure location-based service for social networks&#8221;, <em>9th Latin American and Caribbean Conference<\/em> (LACCEI&#8217;2011).<\/li>\n<li>\u00a0E. B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki, and Michael VanHilst, &#8220;An approach to model-based development of secure and reliable systems&#8221;, <em>Sixth International Conference on Availability, Reliability and Security (ARES 2011)<\/em>, August 22-26, Vienna, Austria. \u00a0(Acceptance rate: 25%).<\/li>\n<li>\u00a0Ingrid Buckley, Eduardo B. Fernandez, and Maria M. Larrondo-Petrie, &#8220;Patterns Combining Reliability and Security&#8221;, <em>Procs. of \u00a0PATTERNS 2011:\u00a0<\/em><em>The Third International Conferences on Pervasive Patterns and Applications,\u00a0<\/em>September 25-30, 2011 &#8211; Rome, Italy \u00a0<a class=\"vt-p\" href=\"http:\/\/www.iaria.org\/conferences2011\/SubmitPATTERNS11.html\">http:\/\/www.iaria.org\/conferences2011\/SubmitPATTERNS11.html<\/a><\/li>\n<li>\u00a0K. Hashizume, N. Yoshioka, and E.B.Fernandez, &#8220;Misuse Patterns for Cloud Computing&#8221;, <em>Procs. of Asian PLoP 2011<\/em>.<\/li>\n<li>\u00a0Mihaela Cardei, E. B.Fernandez, Anupama Sahu, and Ionut Cardei, &#8220;A pattern for Wireless System Architectures&#8221;, <em>Procs. of Asian PLoP 2011<\/em>.<\/li>\n<li>\u00a0E.B.Fernandez , Sergio Mujica, and Francisca Valenzuela, &#8220;Two security patterns: Least Privilege and Security Logger\/Auditor.&#8221;, <em>Procs. of Asian PLoP 2011<\/em>.<\/li>\n<li>\u00a0Jaime Mu\u00f1oz-Arteaga, E.B. Fernandez, and Hector Caudel, &#8220;Misuse pattern: Spoofing web services&#8221;, <em>Procs. of Asian PLoP 2011<\/em>.<\/li>\n<li>\u00a0Jaime Mu\u00f1oz-Arteaga, Eduardo B. Fernandez, Ren\u00e9 Santaolaya-Salgado, &#8220;Interaction Patterns for Designing Visual Feedback in Secure Websites&#8221;, <em>Fourth International Conference on Advances in Computer-Human Interactions (ACHI 2011),<\/em> IARIA, February 23-28, 2011, Gosier, Guadeloupe, France, 95-100.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Publications at\u00a0Google Scholar &nbsp; Books E.B. Fernandez,\u00a0Security Patterns in Practice: Designing Secure Architectures Using Software Patterns, Wiley Series on Software Design Patterns, 2013. M. Schumacher, E. B.Fernandez, D. Hybertson,\u00a0 F. Buschmann, and P. Sommerlad, Security Patterns: Integrating security and systems engineering&#8221;,\u00a0\u00a0Wiley Series on Software Design Patterns, 2006. &nbsp; Journal papers E.B.Fernandez, Raul Monge, and Keiko [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":0,"parent":190,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-221","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/comments?post=221"}],"version-history":[{"count":34,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/221\/revisions"}],"predecessor-version":[{"id":591,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/221\/revisions\/591"}],"up":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/190"}],"wp:attachment":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/media?parent=221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}