{"id":223,"date":"2010-01-16T16:05:19","date_gmt":"2010-01-16T21:05:19","guid":{"rendered":"http:\/\/faculty.eng.fau.edu\/fernande\/?page_id=223"},"modified":"2014-12-20T21:38:12","modified_gmt":"2014-12-21T02:38:12","slug":"journals","status":"publish","type":"page","link":"https:\/\/faculty.eng.fau.edu\/fernande\/publications\/journals\/","title":{"rendered":"Journals"},"content":{"rendered":"<p><code><br \/>\n<\/code><\/p>\n<ul>\n<li><span style=\"color: #000000\">E.B.Fernandez, Raul Monge, and Keiko Hashizume, \u201cBuilding a security reference architecture for cloud systems\u201d, accepted for publication in\u00a0<\/span><i style=\"color: #000000\">Requirements Engineering<\/i><span style=\"color: #000000\">.\u00a0 (ISI)<\/span><\/li>\n<li>X. Yuan and E. B. Fernandez, &#8220;Patterns for Business-to-Consumer E-Commerce Applications&#8221;, accepted for the <em>International Journal of Software Engineering &amp; Applications (IJSEA).<\/em><\/li>\n<li>J. C. Pelaez and E. B. Fernandez, &#8220;Semi-formal models for VoIP network forensics&#8221;, accepted for the <em>Int. Journal on Advances in Security (IARIA),<\/em> 2010.<\/li>\n<li>E. B. Fernandez and X. Yuan, &#8220;Semantic analysis patterns and secure semantic analysis patterns&#8221;, in revision for the <em>Int. Journal of Information and Computer Security (IJICS).<\/em> Inderscience Publishers.<\/li>\n<li>A. Agarwal and E. B. Fernandez, \u201cSystem Level Power Management for Embedded RTOS: an Object-Oriented Approach\u201d, <em>International Journal of Engineering (IJE),<\/em> Volume 3, and Issue 5, 2010.<\/li>\n<li>J. Pelaez, E. B. Fernandez and M. M. Larrondo-Petrie, &#8220;Misuse Patterns in VoIP&#8221;, <em>Security and Communication Networks Journal,<\/em> Wiley, vol. 2, No 2, 635-653, published online: 15 Apr 2009.<br \/>\n<a class=\"vt-p\" href=\"http:\/\/www3.interscience.wiley.com\/journal\/122324463\/abstract\">http:\/\/www3.interscience.wiley.com\/journal\/122324463\/abstract<\/a><\/li>\n<li>M. VanHilst, E. B. Fernandez and F. Braz, &#8220;A Multidimensional Classification for Users of Security Patterns&#8221;, <em>Journal of Research and Practice in Information Technology<\/em>, vol. 41, No 2, May 2009, 87-97.<\/li>\n<li>E. B. Fernandez, J. C. Pelaez and M. M. Larrondo-Petrie, &#8220;Security Patterns for Voice Over IP Networks&#8221;, <em>Journal of Software<\/em>, Vol. 2, No. 2, August 2007, pp. 19-29.<br \/>\n<a class=\"vt-p\" href=\"http:\/\/www.academypublisher.com\/jsw\">http:\/\/www.academypublisher.com\/jsw<\/a><\/li>\n<li>B. Wu, J. Wu, E. B. Fernandez, M. Ilyas and S. Magliveras, &#8220;Secure and Efficient Key Management in Mobile Ad Hoc Networks&#8221;, <em>Journal of Network and Computer Applications<\/em>, Vol. 30, 2007, pp. 937-954.<\/li>\n<li>A. G. Delarue, S. M. Smith, P. E. An, and E. B. Fernandez, \u201cVia GIS, Internet techniques AUV visualization, data processing\u201d, <em>Sea Technology,<\/em> May 2000, 10-14.<\/li>\n<li>E. B. Fernandez, J. Wu, and H. Qian, &#8220;A combined functional and object-oriented approach to software design&#8221;, <em> Int. Journal of Computers and Applications, <\/em>vol. 22, No 2 , 2000, 51-61.<\/li>\n<li>J. Wu, E. B. Fernandez, and D. Dai, &#8220;Optimal fault-secure scheduling&#8221;, <em>The Computer Journal<\/em>, vol. 41, No 4, 1998, 207-222.<\/li>\n<li>J. Wu, E. B. Fernandez, and Y. Q. Luo, &#8220;Embedding of binomial trees in hypercubes with link faults&#8221;, <em>Journal of Parallel and Distr. Computing, <\/em>vol. 54, 1998, 59-74.<\/li>\n<li>J. Wu, E. B. Fernandez, and M. Zhang, &#8220;Design and modeling of hybrid fault-tolerant software with cost constraints&#8221;, <em>Journal of Systems and Software 33,<\/em> (2), November 1996, 141-149.<\/li>\n<li>J. Wu and E. B. Fernandez, &#8220;Using Petri nets for the design of conversation boundaries in fault-tolerant software&#8221;, <em>IEEE Trans. on Parallel and Distr. Systs.<\/em>, vol. 5, no. 10, October 1994, 1106&#8211;1113.<\/li>\n<li>J. Wu, Y. Wang, and E. B. Fernandez, &#8220;A uniform approach to software and hardware fault tolerance&#8221;, <em>Journal of Systems and Software,<\/em> vol. 26, no. 2, August 1994.<\/li>\n<li>E. B. Fernandez, E. Gudes, and H. Song, &#8220;A model for evaluation and administration of security in object-oriented databases&#8221;, <em>IEEE Trans. on Knowledge and Database Eng.,<\/em> vol. 6, no. 2, April 1994, 275&#8211;292.<\/li>\n<li>J. Wu and E. B Fernandez, &#8220;Broadcasting in faulty hypercubes&#8221;, <em>Microprocessing and Microprogramming &#8211; The Euromicro Journal,<\/em> 39, 1993, 43&#8211;53.<\/li>\n<li>K. D. Huynh, E. B. Fernandez, and T. M. Khoshgoftaar, &#8220;Defining and measuring task-to-task dispatch and interrupt response times on real-time systems&#8221;, <em>International Journal of Mini and Micro Computers,<\/em> 15(3), 1993, 122&#8211;130.<\/li>\n<li>J. Wu and E. B. Fernandez, &#8220;Fault-Tolerant Distributed Broadcast Algorithm for Cube-Connected-Cycles,&#8221; <em>Computer Systems and Engineering,<\/em> 8(4), October 1993, 224&#8211;233.<\/li>\n<li>J. Wu and E. B. Fernandez, &#8220;A Comparison Connection Assignment Under a Two-Fault Assumption,&#8221; <em>Computer System Science and Engineering,<\/em> 7, 3 (July 1992), 199&#8211;201. .<\/li>\n<li>J. Wu, E. B. Fernandez and R. Zhang, &#8220;Some Extensions to the Lattice Model in Multilevel Computer Security,&#8221; <em>Computers and Security,<\/em> 11 (1992), 357&#8211;369.<\/li>\n<li>K. D. Huynh, E. B. Fernandez, and T. M. Khoshgoftaar, &#8220;A workload model for frame-based real-time applications on distributed systems&#8221;, <em>Journal of Systems and Software,<\/em> 18, (1992), 255&#8211;271.<\/li>\n<li>S. Leu, E. B. Fernandez, and T. Khoshgoftaar, &#8220;Fault-tolerant Software Reliability Modeling Using Petri Nets&#8221;,<em> Microelectronics and Reliability,<\/em> vol. 31, No. 4, 1991, 645&#8211;665.<\/li>\n<li>T. Lunt and E. B. Fernandez, &#8220;Database Security&#8221;, <em>ACM SIGMOD Record,<\/em> 19, 4 (Dec. 1990), 90-97; and <em>IEEE Data Engineering Bulletin,<\/em> 1990.<\/li>\n<li>M. Ancona, A. Clematis, G. Dodero, E. B. Fernandez, and V. Gianuzzi, &#8220;A System Architecture for Fault Tolerance in Concurrent Systems&#8221;, <em>IEEE Computer,<\/em> Vol.23, No. 10, October 1990, 23-32.<\/li>\n<li>M. M. Larrondo Petrie, N. S. Coulter, and E. B. Fernandez, &#8220;Factors affecting the Complexity of Parallel Programming&#8221;, <em>International Journal of Mini and Microcomputers,<\/em> Vol. 12, No. 3, 1990, 79-84.<\/li>\n<li>J. Wu and E. B. Fernandez, &#8220;A Simplification of a Conversation Design Scheme Using Petri Nets&#8221;, <em>IEEE Transactions on Software Engineering,<\/em> Vol. 15, No. 5, May 1989, 658-660.<\/li>\n<li>B. M. Ozaki, E. B. Fernandez, and E. Gudes, &#8220;Software Fault Tolerance in Architectures with Hierarchical Protection Levels, &#8221; <em>IEEE MICRO,<\/em> Vol. 8, No. 4, August 1988, 30-43.<\/li>\n<li>E. B. Fernandez, T. A. Ngo, &#8220;Scheduling of Task Graphs into Transputer Networks&#8221;, <em>Congressus Numerantium,<\/em> Vol. 59, 1987, 79-88.<\/li>\n<li>E. B. Fernandez, &#8220;VLSI and Single-Chip Software-Oriented Computer Architecture&#8221;, Chapter 9 in <em>VLSI Electronics -Microstructure Science,<\/em> Edited by N. Einspruch, Academic Press, 1985, pp. 337-365.<\/li>\n<li>E. B. Fernandez, &#8220;Microprocessor Architecture: The 32-bit Generation&#8221;,<em> VLSI Systems Design,<\/em> October 1985, 34-44 (Invited paper).<\/li>\n<li>E. B. Fernandez, &#8220;Arquitectura de Computadoras Orientadas a Objetos (Object-oriented Computer Architectures)&#8221;, <em>Novatica,<\/em> (Journal of the Spanish Informatics Association, Barcelona), Vol. X, No. 57\/58, July 1984, pp. 32-36. Spain (Invited paper).<\/li>\n<li>C. Wood, E. B. Fernandez and T. Lang, &#8220;Minimization of Demand Paging for the LRU Stack Model of Program Behavior&#8221;, <em>Information Processing Letters,<\/em> Vol. 16, No. 2, pp. 99-104, 26 February 1983.<\/li>\n<li>R. Summers, E. B. Fernandez and C. Wood, &#8220;Auditing and Controls in Database Systems&#8221;, <em>Computer Security Journal,<\/em> Vol. 1, No. 1, pp. 99-121, Spring 1981 (Invited paper).<\/li>\n<li>C. Wood, E. B. Fernandez, and R. Summers, &#8220;Database Security: Requirements, Policies and Models&#8221;, <em>IBM Systems Journal,<\/em> Vol. 19, No. 2, pp. 229-252, 1980. Also published in <em>Advances in Computer System Security,<\/em> (R. Turn, Ed.), Artech House, 1981.<\/li>\n<li>C. Wood, R. Summers, and E. B. Fernandez, &#8220;Authorization in Multilevel Database Models&#8221;, <em>Information Systems,<\/em> Vol 4, pp. 155-161, 1979.<\/li>\n<li>E. B. Fernandez and B. Bussell, &#8220;Bounds on the Number of Processors and Time for Multiprocessor Optimal Schedules&#8221;, <em>IEEE Transactions on Computers,<\/em> Vol. C-22, pp. 745-751, August 1973. Also reprinted in <em>Distributed System Design,<\/em> M. P. Mariani and D. F. Palmer (editors), IEEE Tutorial, 1979.<\/li>\n<li>E. B. Fernandez, R. Summers, T. Lang and C. Coleman, &#8220;Architectural Support for System Protection and Database Security&#8221;, <em>IEEE Trans. on Computers,<\/em> Vol. C-27, No. 8, pp. 767-771, August 1978.<\/li>\n<li>E. B. Fernandez, T. Lang and C. Wood, &#8220;The Effect of Main Memory Replacement Algorithms on the Performance of a Paged Buffer Database System&#8221;, <em>IBM Journal of Research and Development,<\/em> Vol. 22, No. 2, pp. 1855-196, March 1978.<\/li>\n<li>T. Lang, C. Wood, and E. B. Fernandez, &#8220;Database Buffer Paging in Virtual Storage Systems&#8221;, <em>ACM Trans. on Database Systems,<\/em> Vol. 2, Nol. 4, pp. 339-351, December 1977.<\/li>\n<li>T. Lang and E. B. Fernandez, &#8220;Improving the Computation of Lower Bounds for Optimal Schedules&#8221;, <em>IBM Journal of Research and Development,<\/em> Vol. 21, No. 3, pp. 273-280, May 1977.<\/li>\n<li>E. B. Fernandez and T. Lang, &#8220;Scheduling as a Graph Transformation&#8221;, <em>IBM Journal of Research and Development,<\/em> Vol. 20, pp. 551-559, November 1976.<\/li>\n<li>T. Lang and E. B. Fernandez, &#8220;Scheduling of Unit-length Independent Tasks \u0152 with Execution Constraints&#8221;, <em>Information Processing Letters,<\/em> Vol. 4, No. 4, pp. 95-98, January 1976.<\/li>\n<li>E. B. Fernandez and T. Lang, &#8220;Computation of Lower Bounds for Multiprocessor Schedules&#8221;, <em>IBM J. of Research and Dev.,<\/em> Vol. 19, No. 5, , pp. 435-444 , September 1975.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>E.B.Fernandez, Raul Monge, and Keiko Hashizume, \u201cBuilding a security reference architecture for cloud systems\u201d, accepted for publication in\u00a0Requirements Engineering.\u00a0 (ISI) X. Yuan and E. B. Fernandez, &#8220;Patterns for Business-to-Consumer E-Commerce Applications&#8221;, accepted for the International Journal of Software Engineering &amp; Applications (IJSEA). J. C. Pelaez and E. B. Fernandez, &#8220;Semi-formal models for VoIP network forensics&#8221;, [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":0,"parent":190,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-223","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/comments?post=223"}],"version-history":[{"count":14,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/223\/revisions"}],"predecessor-version":[{"id":578,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/223\/revisions\/578"}],"up":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/190"}],"wp:attachment":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/media?parent=223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}