{"id":225,"date":"2010-01-16T16:05:30","date_gmt":"2010-01-16T21:05:30","guid":{"rendered":"http:\/\/faculty.eng.fau.edu\/fernande\/?page_id=225"},"modified":"2013-01-13T17:22:22","modified_gmt":"2013-01-13T22:22:22","slug":"conferences","status":"publish","type":"page","link":"https:\/\/faculty.eng.fau.edu\/fernande\/publications\/conferences\/","title":{"rendered":"Conferences"},"content":{"rendered":"<p><code><br \/><\/code><\/p>\n<ol><span style=\"font-size: small\"><\/p>\n<li>K. Hashizume, N. Yoshioka, and E. B. Fernandez, &#8220;Misuse Patterns for Cloud Computing&#8221;, 2011.<\/li>\n<li>M. Cardei, E. B. Fernandez, A. Sahu, and I. Cardei, &#8220;A pattern for Wireless System Architectures&#8221;, 2011.<\/li>\n<li>S. Mujica, F. Valenzuela, and E. B. Fernandez, &#8220;Two security patterns: Least Privilege and Secure Logger\/Auditor&#8221;, 2011.<\/li>\n<li>J. Mu\u00f1oz-Arteaga, E. B. Fernandez, and H. Caudel, &#8220;Misuse pattern: Spoofing web services&#8221;, sent to <em><a href=\"http:\/\/patterns-wg.fuka.info.waseda.ac.jp\/asianplop\/\">Asian PLoP 2011<\/a>.<\/em><\/li>\n<li>J. Mu\u00f1oz-Arteaga, E. B. Fernandez, R. Santaolaya-Salgado, &#8220;Interaction Patterns for Designing Visual Feedback in Secure Websites&#8221;, presented at the <em>Fourth International Conference on Advances in Computer-Human Interactions (ACHI 2011),<\/em> February 23-28, 2011, Gosier, Guadeloupe, France.<\/li>\n<li>Y. Shiroma, H. Washizaki, Y. Fukazawa , A. Kubo, N. Yoshioka, and E. B. Fernandez, &#8220;Model-driven application and validation of security patterns&#8221;, <em>17th Conf. on Pattern Languages of Programs (PLoP 2010).<\/em><\/li>\n<li>E. B. Fernandez and Sergio Mujica , &#8220;Building secure systems: From threats to security patterns&#8221;, <em>Procs. of the XXIX International Conference of the Chilean Computer Society,<\/em> Antofagasta, Chile, November 2010.<\/li>\n<li>A. Sahu, E. B. Fernandez, Mihaela Cardei, and M. VanHilst, &#8220;A pattern for a sensor node&#8221;, <em><a href=\"http:\/\/www.hillside.net\/plop\/2010\/index.php?nav=program\">Procs. 17th Conf. on Pattern Languages of Programs (PLoP 2010)<\/a>.<\/em><\/li>\n<li>M. Van Hilst and E. B. Fernandez, &#8220;A Pattern System of Underlying Theories for Process Improvement&#8221;, <em><a href=\"http:\/\/www.hillside.net\/plop\/2010\/index.php?nav=program\">Procs. 17th Conf. on Pattern Languages of Programs (PLoP 2010)<\/a>.<\/em><\/li>\n<li>E. B. Fernandez, D. laRed M., and J. I. Pelaez, &#8220;A conceptual approach to voting based on patterns&#8221;, <em>Procs.of the 36th Latin American Conf. on Informatics (CLEI 2010),<\/em> 18-22 October, Asuncion, Paraguay. (Acceptance ratio: 27%.)<\/li>\n<li>O. Ajaj and E. B. Fernandez, &#8220;A pattern for the WS-Policy standard&#8221;, <em>Procs.of the 8th Latin American Conference on Pattern Languages of Programs (SugarLoafPLoP 2010),<\/em> Salvador, Bahia, Brazil, Sept 23-26, 2010.<\/li>\n<li>A. Kumar and E. B. Fernandez, &#8220;Security patterns for Virtual Private Networks&#8221;, <em>Procs. of the 8th Latin American Conference on Pattern Languages of Programs (SugarLoafPLoP 2010),<\/em> Salvador, Bahia, Brazil, Sept 23-26, 2010.<\/li>\n<li>M. Solinas, J. Trad, J. Abdala, F. Capdevila, E. B. Fernandez, L. Antonelli, &#8220;Caso de \u00e9xito de m\u00e9todo que aplica patrones de seguridad en la Ingenier\u00eda en Computaci\u00f3n&#8221;, <em>Congreso Argentino de Ciencias de la Computaci\u00f3n 2010 (CACIC 2010).<\/em><\/li>\n<li>C. Marin, E. B. Fernandez, and M. M. Larrondo-Petrie, &#8220;Patterns for social networks in Web 2.0&#8221;, <em>Procs. of the 8th Latin American and Caribbean Conf. for Eng. and Technology (LACCEI&#8217;2010),<\/em> June 1-4, 2010, Arequipa, Peru.<\/li>\n<li>O. Ajaj and E. B. Fernandez, &#8220;A pattern for the WS-Trust standard of web services&#8221;, <em>Procs. of the 1st Asian Conference on Pattern Languages of Programs (<a href=\"http:\/\/patterns-wg.fuka.info.waseda.ac.jp\/asianplop\/\">AsianPLoP 2010<\/a>),<\/em> Tokyo, Japan, March 16-17, 2010.<\/li>\n<li>E. B. Fernandez, N. Yoshioka, and H. Washizaki, &#8220;A Worm misuse pattern&#8221;, <em>Procs. of the 1st Asian Conference on Pattern Languages of Programs (<a href=\"http:\/\/patterns-wg.fuka.info.waseda.ac.jp\/asianplop\/\">AsianPLoP 2010<\/a>),<\/em> Tokyo, Japan, March 16-17, 2010.<\/li>\n<li>M. Netter, E. B. Fernandez, and G. Pernul, &#8220;Refining the pattern-based reference model for electronic invoices by incorporating threats&#8221;, <em>Procs. of the 4th workshop on Secure systems methodologies using patterns (SPattern 2010),<\/em> in conjunction with <em>ARES 2010,<\/em> Krakow, Poland, February 2010.<\/li>\n<li>E. B. Fernandez, N. Yoshioka, H. Washizaki, and M. VanHilst, &#8220;Measuring the level of security introduced by security patterns&#8221;, <em>Procs. of the 4th workshop on Secure systems methodologies using patterns (SPattern 2010),<\/em> in conjunction with <em>ARES 2010,<\/em> Krakow, Poland, February 2010.<\/li>\n<li>E. B. Fernandez and M. M. Larrondo-Petrie, &#8220;Designing secure SCADA systems using security patterns&#8221;, <em>Procs. of the 43rd Hawaii Conf. on Systems Science,<\/em> Honolulu, Jan. 2010, 1-8.<br \/>\n<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=5428672\">http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=5428672<\/a><\/li>\n<li>K. Hashizume, E. B. Fernandez, and Shihong Huang, &#8220;The WS-Security pattern&#8221;, <em>First IEEE Int. Workshop on Security Eng. Environments,<\/em> Dec. 17-19, 2009, Shanghai, China.<\/li>\n<li>E. B. Fernandez, M. VanHilst, D. laRed M., and S. Mujica, &#8220;An extended reference monitor for security and safety&#8221;, <em>Procs. of the 5th Iberoamerican Conference on Information Security (CIBSI 2009).<\/em> Montevideo, Uruguay, November 2009. <\/li>\n<li>I. Buckley and E. B. Fernandez, &#8220;Three patterns for fault tolerance&#8221;, <em>Procs. of the OOPSLA MiniPLoP,<\/em> October 26, 2009.<br \/>\n<a href=\"http:\/\/www.refactory.com\/miniploppapers\/FT_Patts.pdf\">http:\/\/www.refactory.com\/miniploppapers\/FT_Patts.pdf<\/a><\/li>\n<li>E. B. Fernandez and J. L. Ortega-Arjona, &#8220;Securing the Adapter pattern&#8221;, <em>Procs. of the OOPSLA MiniPLoP,<\/em> October 26, 2009.<\/li>\n<li>E. B. Fernandez and J. Munoz-Arteaga, &#8220;Extending a secure software methodology with usability aspects&#8221;, position paper for the <em>3rd Workshop on Software Patterns and Quality (SPAQu&#8217;09),<\/em> in conjunction with <em>OOPSLA 2009.<\/em><\/li>\n<li>E. B. Fernandez, N. Yoshioka, and H. Washizaki, &#8220;Security patterns and quality&#8221;, position paper for the <em>3rd Workshop on Software Patterns and Quality (SPAQu&#8217;09),<\/em> in conjuction with <em>OOPSLA 2009. Proceedings of the Third International Workshop on Software Patterns and Quality<\/em> (pp. 46-47), in conjuction with <em>OOPSLA 2009.<\/em><br \/>\n<a href=\"http:\/\/grace-center.jp\/downloads\/GRACE-TR-2009-07.pdf\">http:\/\/grace-center.jp\/downloads\/GRACE-TR-2009-07.pdf<\/a><\/li>\n<li>M. VanHilst, E. B. Fernandez, and F. Braz, &#8220;Building a Concept Grid to Classify Security Patterns&#8221;, <em>Procs. of the 3rd Workshop on Software Patterns and Quality (SPAQu&#8217;09),<\/em> in conjuction with <em>OOPSLA 2009.<\/em><\/li>\n<li>E. B. Fernandez and X. Yuan, &#8220;An Analysis Pattern for Invoice Processing&#8221;, <em>Procs. of the 16th Conf. on Pattern Languages of Programs (PLoP 2009).<\/em><\/li>\n<li>K. Hashizume and E. B. Fernandez, &#8220;Symmetric Encryption and XML Encryption Patterns&#8221;, <em>Procs. of the 16th Conf. on Pattern Languages of Programs (PLoP 2009).<\/em><\/li>\n<li>Z. Jiang and E. B. Fernandez, &#8220;Composing analysis patterns to build complex models: Flight reservation&#8221;, <em>Procs. of the 16th Conf. on Pattern Languages of Programs (PLoP 2009).<\/em><\/li>\n<li>Solinas <em>Procs. of the 3rd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern&#8217;09),<\/em> in conjunction with the <em>6th International Conference on Trust, Privacy &amp; Security in Digital Busines(TrustBus&#8217;09),<\/em> pp. 176-180.<\/li>\n<li>E. B. Fernandez and J. L. Ortega-Arjona, &#8220;The secure Pipes and Filters pattern&#8221;, <em>Procs. of the Third Int Workshop on Secure System Methodologies using Patterns (SPattern 2009).<\/em><br \/>\n<a href=\"http:\/\/www.matematicas.unam.mx\/jloa\/publicaciones\/PipesFiltersMay22-09.pdf\">http:\/\/www.matematicas.unam.mx\/jloa\/publicaciones\/PipesFiltersMay22-09.pdf<\/a><\/li>\n<li>H. Washizaki, E. B. Fernandez, K. Maruyama, A. Kubo, and N. Yoshioka, \u201cImproving the classification of security patterns\u201d, <em>Procs. of the Third Int. Workshop on Secure System Methodologies using Patterns (SPattern 2009).<\/em><\/li>\n<li>J. C. Pelaez and E. B. Fernandez. \u201cVoIP Network Forensic Patterns\u201d, <em>Procs. of the Fourth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2009),<\/em> Cannes, France, August 23-29.<\/li>\n<li>K. Hashizume, E. B. Fernandez, and S. Huang, &#8220;Digital Signature with Hashing and XML Signature patterns&#8221;, <em>Procs. of the 14th European Conf. on Pattern Languages of Programs (EuroPLoP 2009).<\/em><\/li>\n<li>I. Buckley, E. B. Fernandez, G. Rossi, and M. Sadjadi, &#8220;Web services reliability patterns&#8221;, short paper in the <em>21st International Conference on Software Engineering and Knowledge Engineering (SEKE&#8217;2009),<\/em> Boston, July 1-3, 2009, 4-9. (Acceptance rate 38%.)<\/li>\n<li>M. VanHilst, E. B. Fernandez, and F. Braz, &#8220;Building a Concept Grid to Classify Security Patterns&#8221;, short paper for the <em>21st International Conference on Software Engineering and Knowledge Engineering (SEKE&#8217;2009),<\/em> July 1-3, 2009, Boston.<\/li>\n<li>E. B. Fernandez and M. M. Larrondo-Petrie, &#8220;A project on web services security and reliability&#8221;, <em>7th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2009),<\/em> June 2-5, 2009, San Cristobal, Venezuela.<\/li>\n<li>E. B. Fernandez, J. Wu, M. M. Larrondo-Petrie and Y. Shao, &#8220;On building secure SCADA Systems using Security Patterns&#8221;, <em>Procs. of the Cyber security and information intelligence challenges and strategies (CSIIR 2009).<\/em> Oak Ridge, TN, April 13-15, 2009.<\/li>\n<li>L. L. Lobato and E. B. Fernandez, &#8220;Patterns to support the development of privacy policies&#8221;, <em>Procs. of the First Int. Wokshop on Organizational Security Aspects (OSA 2009),<\/em> in conjuction with <em>ARES 2009.<\/em> March 16-19, 2009, Fukuoka, Japan.<\/li>\n<li>E. B. Fernandez, N. Yoshioka and H. Washizaki, &#8220;Modeling misuse patterns&#8221;, <em>Procs. of the 4th Int. Workshop on Dependability Aspects of Data Warehousing and Mining Applications (DAWAM 2009),<\/em> in conjunction with the <em>4th Int.Conf. on Availability, Reliability, and Security (ARES 2009).<\/em> March 16-19, 2009, Fukuoka, Japan.<\/li>\n<li>E. B. Fernandez, H. Washizaki, and N. Yoshioka, &#8220;Abstract security patterns&#8221;, Position paper in <em>Procs. of the 2nd Workshop on Software Patterns and Quality (SPAQu&#8217;08),<\/em> in conjuction with the <em>15th Conf. on Pattern Languages of Programs (PLoP 2008),<\/em> October 18-20, 2008, Nashville, TN.<\/li>\n<li>E. B. Fernandez and D. laRed M., &#8220;Patterns for the secure and reliable execution of processes&#8221;. <em>Procs. of the 15th Int. Conference on Pattern Languages of Programs (PLoP 2008),<\/em> collocated with <em>OOPSLA,<\/em> Nashville, TN, Oct. 2008.<\/li>\n<li>J. L. Ortega-Arjona and E. B. Fernandez, &#8220;The Secure Blackboard pattern&#8221;, Procs. of the 15th Int. Conference on Pattern Languages of Programs (PLoP 2008), co-located with OOPSLA, Nashville, TN, Oct. 2008.<br \/>\n<a href=\"http:\/\/www.matematicas.unam.mx\/jloa\/publicaciones\/secureBlackboard.pdf\">http:\/\/www.matematicas.unam.mx\/jloa\/publicaciones\/secureBlackboard.pdf<\/a><\/li>\n<li>E. B. Fernandez, G. Pernul, and M. M. Larrondo-Petrie, \u201cPatterns and pattern diagrams for access control\u201d, <em>Procs. of the 5th Int. Conf. on Trust, Privacy, and Security in Digital Systems (Trustbus&#8217;08),<\/em> Turin, Italy, Sept. 1-5, 2008. Springer LNCS 5185, 38-47 (Acceptance ratio: 53 %.)<\/li>\n<li>F. Braz, E. B. Fernandez, and M. VanHilst, &#8220;Eliciting security requirements through misuse activities&#8221;, <em>Procs. of the 2nd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern&#8217;07),<\/em> in conjunction with the <em>4th International Conference onTrust, Privacy &amp; Security in Digital Busines(TrustBus&#8217;07),<\/em> Turin, Italy, September 1-5, 2008. 328-333.<\/li>\n<li>E. B. Fernandez, J. Jurjens, N. Yoshioka, and H. Washizaki, &#8220;Incorporating database systems into a secure software development methodology&#8221;, <em>Procs. of the 2nd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern&#8217;07),<\/em> in conjunction with the <em>4th International Conference onTrust, Privacy &amp; Security in Digital Busines(TrustBus&#8217;07),<\/em> Turin, Italy, September 1-5, 2008. 310-314.<\/li>\n<li>M. VanHilst, E. B. Fernandez, and F. Braz, &#8220;A multidimensional classification for users of security patterns&#8221;, <em>Procs. of the 6th Int. Workshop on Security in Information Systems (WOSIS 2008),<\/em> Barcelona, Spain, June 12-13, 2008, in conjunction with <em>ICEIS 2008,<\/em> 89-98. (Acceptance ratio: 47.6%.)<\/li>\n<li>E. B. Fernandez and M. M. Larrondo-Petrie, &#8220;A Course on security for critical infrastructure systems&#8221;, <em>Procs. of the 6th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008),<\/em> June 4-6, 2008, Tegucigalpa, Honduras.<\/li>\n<li>E. B. Fernandez, H. Washizaki, N. Yoshioka, A. Kubo, and Y. Fukazawa, &#8220;Classifying security patterns&#8221;, <em>Procs. of the 10th Asia-Pacific Web Conference (APWEB&#8217;08),<\/em> April 26-28, 2008, Shenyang, China. (Acceptance ratio 37%.) Springer LNCS 4976\/2008, 342-347.<\/li>\n<li>N. Delessy and E. B. Fernandez, \u201cA pattern-driven security process for SOA applications&#8221;, <em>Procs. of the ACM Symposium on Applied Computing (ACM SAC 2008),<\/em> Fortaleza, Ceara, Brazil, March 16-20, 2008. Short paper.<\/li>\n<li>N. Delessy and E. B. Fernandez, \u201cA pattern-driven security process for SOA applications&#8221;, <em>Procs. of the 3rd Int. Conf. on Availability, Reliability, and Security (ARES 2008).<\/em> Barcelona, Spain, March 4-7, 2008, 416-421. (Acceptance ratio: 21 %.)<\/li>\n<li>E. B. Fernandez, M. Fonoage, M. VanHilst, and M. Marta, &#8220;The secure three-tier architecture&#8221;, <em>Procs. of the Second Workshop on Engineering Complex Distributed Systems (ECDS 2008),<\/em> Barcelona, Spain, March 4-7, 2008. 555-560. <\/li>\n<li>E. B. Fernandez, M. M. Larrondo-Petrie, and M. VanHilst, &#8220;A methodology to build secure systems using patterns&#8221;, short paper in the <em>23rd Annual Computer Security Applications Conference (ACSAC),<\/em> Miami Beach, December 10-14, 2007.<\/li>\n<li>E. B. Fernandez, N. Yoshioka, H. Washizaki, and J. Jurjens, &#8220;Using security patterns to build secure systems&#8221;, position paper in the <em>1st Int. Workshop on Software Patterns and Quality (SPAQu&#8217;07),<\/em> Nagoya, Japan, December 3, 2007, collocated with the <em>14th Asia-Pacific Software Engineering Conference (APSEC).<\/em><\/li>\n<li>M. VanHilst and E. B. Fernandez, &#8220;Reverse engineering and the verification of security patterns in code&#8221;, <em>Procs. of the 1st Int. Workshop on Software Patterns and Quality (SPAQu&#8217;07),<\/em> Nagoya, Japan, December 3, 2007, collocated with the <em>14th Asia-Pacific Software Engineering Conference (APSEC),<\/em><\/li>\n<li>J. C. Pelaez, E. B. Fernandez, M. M. Larrondo-Petrie, and C. Wieser, &#8220;Attack patterns in VoIP&#8221;, <em>Procs. of the 14th Pattern Languages of Programs Conference (PLoP2007),<\/em> Monticello, Illinois, USA, September 5-8, 2007.<\/li>\n<li>N. Delessy. E. B. Fernandez, M. M. Larrondo-Petrie, and J. Wu, &#8220;Patterns for access control in distributed systems&#8221;, <em>Procs. of the 14th Pattern Languages of Programs Conference (PLoP 2007),<\/em> Monticello, Illinois, USA, September 5-8, 2007.<\/li>\n<li>E. B. Fernandez, P. Cholmondeley, and O. Zimmermann, &#8220;Extending a secure system development methodology to SOA&#8221;, <em>Procs. of the 1st Int. Workshop on Secure Systems Methodologies Using Patterns (SPattern&#8217;07)<\/em> in conjunction with the <em>4th International Conference on Trust, Privacy &amp; Security in Digital Business (TrustBus&#8217;07),<\/em> Regensburg, Germany, September 03-07, 2007, 749-754.<\/li>\n<li>E. B. Fernandez , M. VanHilst, and J. C. Pelaez, &#8220;Patterns for WiMax security&#8221;, <em>Procs. EuroPLoP 2007.<\/em><\/li>\n<li>J. C. Pelaez, E. B. Fernandez, and C. Wieser, &#8220;Patterns for VoIP signaling protocol architectures&#8221;, <em>Procs. EuroPLoP 2007.<\/em><\/li>\n<li>E. B. Fernandez, J. Ballesteros, A. C. Desouza-Doucet, and M. M. Larrondo-Petrie, \u201cSecurity Patterns for Physical Access Control Systems\u201d, in S. Barker and G. J. Ahn (Eds.), <em>Data and Applications Security XXI,<\/em> LNCS 4602, 259-274, Springer 2007. <em>Procs. of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security,<\/em> Redondo Beach, California, U.S.A, July 8-11, 2007. (Acceptance ratio: 40%.)<\/li>\n<li>N. Delessy and E. B. Fernandez, &#8220;Adapting web services security standards for mobile and wireless environments&#8221;, in <em>\u201cAdvances in Web and Network Technologies, and Information Management\u201d,<\/em> K. Chen-Chuan Chang, W. Wang, L. Chen, C.A.Ellis, C-H Hsu, A.C.Tsoi, and H. Wang (Eds.), Springer LNCS 4537, 624-633. <em>Procs. of the 2007 International Workshop on Application and Security service in Web and pervAsive eNvironments (ASWAN 2007),<\/em> June 16-18, 2007, HuangShan (Yellow Mountain), China. (Acceptance ratio: 26%.)<\/li>\n<li>E. B. Fernandez, D. L. laRed M., J. Forneron, V. E. Uribe, and G. Rodriguez, &#8220;A secure analysis pattern for handling legal cases\u201d, <em>Procs. of the 6th Latin American Conference on Pattern Languages of Programming (SugarLoafPLoP\u20192007),<\/em> 178-187.<br \/>\n<a href=\"http:\/\/sugarloafplop.dsc.upe.br\/AnaisSugar2007_WEB.pdf\">http:\/\/sugarloafplop.dsc.upe.br\/AnaisSugar2007_WEB.pdf<\/a><\/li>\n<li>M. Fullerton and E. B. Fernandez, &#8220;An analysis pattern for Customer Relationship Management (CRM)&#8221;, <em>Procs. of the 6th Latin American Conference on Pattern Languages of Programming (SugarLoafPLoP\u20192007),<\/em> May 27-30, 2007, Porto de Galinhas, Pernambuco, Brazil, 80-90.<\/li>\n<li>E. B. Fernandez and X.Y. Yuan, &#8220;Securing analysis patterns&#8221;, <em>Procs. of the 45th ACM Southeast Conference (ACMSE 2007),<\/em> March 23-24, 2007, Winston-Salem, North Carolina. (Acceptance ratio: 59%.)<br \/>\n<a href=\"http:\/\/acmse2007.wfu.edu\">http:\/\/acmse2007.wfu.edu<\/a><\/li>\n<li>E. B. Fernandez, C. Pertuz, and M. M. Larrondo-Petrie, \u201cA security pattern for Pipes and Filters\u201d, <em>Procs. of the 5th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2007),<\/em> Tampico, MX, May 29-June 1st, 2007.<br \/>\n<a href=\"www.laccei.org\">www.laccei.org<\/a><\/li>\n<li>E. B. Fernandez, M. M. Larrondo-Petrie, and A. Escobar, &#8220;Contexts and context-based access control&#8221;, <em>Procs. of the 3rd IEEE Int. Conf. on Wireless and Mobile Communications (ICWMC 2007),<\/em> March 4-9, Guadeloupe, French Caribbean.<\/li>\n<li>E. B. Fernandez, J. C. Pelaez, and M. M. Larrondo-Petrie, &#8220;Security patterns for voice over IP networks&#8221;, <em>Procs. of the 2nd IEEE Int. Multiconference on Computing in the Global Information Technology (ICCGI 2007),<\/em> March 4-9, Guadeloupe, French Caribbean. Best paper award.<\/li>\n<li>N. Delessy, E. B. Fernandez, and M. M. Larrondo-Petrie, &#8220;A pattern language for identity management&#8221;, <em>Procs. of the 2nd IEEE Int. Multiconference on Computing in the Global Information Technology (ICCGI 2007),<\/em> March 4-9, Guadeloupe, French Caribbean.<br \/>\n<a href=\"http:\/\/www.computer.org\/portal\/web\/csdl\/doi\/10.1109\/ICCGI.2007.5\">http:\/\/www.computer.org\/portal\/web\/csdl\/doi\/10.1109\/ICCGI.2007.5<\/a><\/li>\n<li>E. B. Fernandez, J. C. Pelaez, and M. M. Larrondo-Petrie, &#8220;Attack patterns: A new forensic and design tool&#8221;, <em>Procs. of the Third Annual IFIP WG 11.9 Int. Conf. on Digital Forensics,<\/em> Orlando, FL, Jan. 29-31, 2007. Chapter 24 in <em>Advances in Digital Forensics III,<\/em> P. Craiger and S. Shenoi (Eds.), Springer\/IFIP, 2007, 345-357. (Acceptance ratio: 58%.)<br \/>\n<a href=\"www.cis.utulsa.edu\/ifip119\">www.cis.utulsa.edu\/ifip119<\/a><\/li>\n<li>E. B. Fernandez and M. M. Larrondo-Petrie, &#8220;A methodology to build secure systems using patterns&#8221;, <em>22nd Annual Computer Security Applications Conference (ACSAC)<\/em>, Works in Progress, Miami Beach, FL, Dec. 11-15.<br \/>\n<a href=\"http:\/\/www.acsac.org\">http:\/\/www.acsac.org<\/a><\/li>\n<li>E. B. Fernandez, \u201cSecurity patterns\u201d, <em>Procs. of the Eigth International Symposium on System and Information Security &#8211; SSI&#8217;2006,<\/em> Keynote talk, Sao Jose dos Campos, Brazil, November 08-10, 2006.<\/li>\n<li>E. B. Fernandez and G. Pernul, &#8220;Patterns for Session-Based Access Control&#8221;, <em>Procs. of the Conference on Pattern Languages of Programs, PLoP 2006,<\/em> Portland, OR, October 2006.<br \/>\n<a href=\"http:\/\/hillside.net\/plop\/2006\/\">http:\/\/hillside.net\/plop\/2006\/<\/a><\/li>\n<li>P. Morrison and E. B. Fernandez, &#8220;The Credential pattern&#8221;, <em>Procs. of the Conference on Pattern Languages of Programs, PLoP 2006,<\/em> Portland, OR, October 2006.<br \/>\n<a href=\"http:\/\/hillside.net\/plop\/2006\/\">http:\/\/hillside.net\/plop\/2006\/<\/a><\/li>\n<li>E. B. Fernandez, T. Sorgente, and M. M. Larrondo-Petrie, \u201cEven more patterns for secure operating systems,\u201d <em>Procs. of the Conference on Pattern Languages of Programs, PLoP 2006,<\/em> Portland, OR, October 2006.<br \/>\n<a href=\"http:\/\/hillside.net\/plop\/2006\/\">http:\/\/hillside.net\/plop\/2006\/<\/a><\/li>\n<li>E. B. Fernandez, N.A.Delessy, and M. M. Larrondo-Petrie, \u201cPatterns for web services security&#8221;, in <em>Best Practices and Methodologies in Service-Oriented Architectures,<\/em> L. A. Skar and A.A.Bjerkestrand (Eds.), 29-39, part of <em>OOPSLA 2006, the 21st Int. Conf. on Object-Oriented Programming, Systems, Languages, and Applications,<\/em> Portland, OR, ACM, October 22-26.<\/li>\n<li>E. B. Fernandez, M. VanHilst, M. M. Larrondo Petrie, S. Huang, &#8220;Defining Security Requirements through Misuse Actions&#8221;, in <em>Advanced Software Engineering: Expanding the Frontiers of Software Technology,<\/em> S. F. Ochoa and G.-C. Roman (Eds.), International Federation for Information Processing, Springer, 2006, 123-137. (Acceptance ratio: 40%.)<\/li>\n<li>E. B. Fernandez and M. M. Larrondo-Petrie, &#8220;Developing secure architectures for middleware systems&#8221;, <em>Procs. of CLEI 2006. (XXXII Conferencia Latinoamericana de Inform\u00e1tica).<\/em> (Acceptance ratio: 45%.)<\/li>\n<li>P. Morrison and E. B. Fernandez, &#8220;Securing the Broker pattern&#8221;, <em>Procs. of the 11th European Conf. on Pattern Languages of Programs (EuroPLoP 2006).<\/em><br \/>\n<a href=\"http:\/\/www.hillside.net\/europlop\/\">http:\/\/hillside.net\/europlop\/europlop2006\/<\/a><\/li>\n<li>E. B. Fernandez and M. M. Larrondo-Petrie, &#8220;Security patterns and secure systems design&#8221;, <em>Procs. of the 4th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2006),<\/em> Mayaguez, Puerto Rico, June 21-23, 2006.<\/li>\n<li>J. Pelaez and E. B. Fernandez, &#8220;Network forensics in wireless VoIP networks&#8221;, <em>Procs. of the 4th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2006),<\/em> Mayaguez, Puerto Rico, June 21-23, 2006.<\/li>\n<li>E. B. Fernandez, S. Huang, and M. M. Larrondo-Petrie, &#8220;A set of courses for teaching secure software development&#8221;, Workshop on Secure Software Engineering Education and Training, Hawaii, April 2006. Part of the <em>19th Conference on Software Engineering Education and Training, CSEET 2006,<\/em> Oahu, Hawaii, USA, 2006.<\/li>\n<li>E. B. Fernandez and N. Delessy, &#8220;Using patterns to understand and compare web services security products and standards&#8221;, <em>Proceedings of the Int. Conference on Web Applications and Services (ICIW&#8217;06),<\/em> Guadeloupe, February 2006. IEEE Comp. Society, 2006.<\/li>\n<li>E. B. Fernandez, S. Huang, and M. M. Larrondo-Petrie, &#8220;Building secure middleware using patterns&#8221;, <em>Procs. of the IEEE Int. Symposium and School on Advanced Distributed Systems (ISSADS 2006).<\/em><\/li>\n<li>E. B. Fernandez and David L. la Red M., &#8220;Using patterns to develop, evaluate, and teach secure operating systems&#8221;, <em>Proceedings of the Congreso Internacional de Auditor\u00eda y Seguridad de la Informaci\u00f3n (CIASI 2005),<\/em> Madrid, Spain, 125-130.<\/li>\n<li>E. B. Fernandez and T. Sorgente, &#8220;A pattern language for secure operating system architectures\u201d, <em>Proceedings of the 5th Latin American Conference on Pattern Languages of Programs,<\/em> Campos do Jordao, Brazil, August 16-19, 2005, 68-88.<\/li>\n<li>E. B. Fernandez and M. M. Larrondo-Petrie, &#8220;A sequence of security courses based on a methodology with patterns&#8221;. <em>VIII Congreso Chileno de Educaci\u00f3n Superior en Computaci\u00f3n,<\/em> Valdivia, Chile, November 7-11, 2005.<\/li>\n<li>E. B. Fernandez, T. Anantvalee, J. Labush, and M. M. Larrondo-Petrie, &#8220;Analysis patterns for elections&#8221;, in <em>Proceedings of the Nordic Conference on Pattern Languages of Programs, Viking PLoP 2005,<\/em> Otaniemi, Finland, 23-25 September 2005.<\/li>\n<li>E. B. Fernandez and A. Kumar, \u201cA security pattern for rule-based intrusion detection\u201d, <em>Proceedings of the Nordic Conference on Pattern Languages of Programs, Viking PLoP 2005,<\/em> Otaniemi, Finland, 23-25 September 2005.<\/li>\n<li>E. B. Fernandez, Tami Sorgente, and M. VanHilst, &#8220;Constrained Resource Assignment Description Pattern&#8221;. <em>Proceedings of the Nordic Conference on Pattern Languages of Programs, Viking PLoP 2005,<\/em> Otaniemi, Finland, 23-25 September 2005.<\/li>\n<li>N. Delessy, and E. B. Fernandez, &#8220;Patterns for the eXtensible Access Control Markup Language&#8221;, in <em>Proceedings of the 12th Pattern Languages of Programs Conference (PLoP2005),<\/em> Monticello, Illinois, USA, 7-10 September 2005.<br \/>\n<a href=\"http:\/\/hillside.net\/plop\/2005\/proceedings\/\">http:\/\/hillside.net\/plop\/2005\/proceedings\/ <\/a><\/li>\n<li>M. Sadicoff, M. M. Larrondo-Petrie, and E. B. Fernandez, &#8220;Privacy-Aware Network Client Pattern&#8221;, in <em>Proceedings of the 12th Pattern Languages of Programs Conference (PLoP2005),<\/em> Monticello, Illinois, USA, 7-10 September 2005.<br \/>\n<a href=\"http:\/\/hillside.net\/plop\/2005\/proceedings\/PLoP2005_msadicoff0_0.pdf\">http:\/\/hillside.net\/plop\/2005\/proceedings\/PLoP2005_msadicoff0_0.pdf<\/a><\/li>\n<li>T. Sorgente, E. B. Fernandez, and M. M. Larrondo-Petrie, &#8220;The SOAP pattern for medical charts&#8221;, in <em>Proceedings of the 12th Pattern Languages of Programs Conference (PLoP2005),<\/em> Monticello, Illinois, 7-10 September 2005.<br \/>\n<a href=\"http:\/\/hillside.net\/plop\/2005\/proceedings\/PLoP2005_tsorgente0_1.pdf\">http:\/\/hillside.net\/plop\/2005\/proceedings\/PLoP2005_tsorgente0_1.pdf<\/a><\/li>\n<li>E. B. Fernandez and M. M. Larrondo-Petrie, &#8220;Teaching a course on data and network security using UML and patterns&#8221;, <em>Procs. of the Educators Symposium of MoDELS\/UML 2005<\/em>, Montego Bay, Jamaica, October 2-7, 2005.<\/li>\n<li>J. Pelaez and E. B. Fernandez, &#8220;Security in Voice over Internet Protocols (VoIP) networks&#8221;, <em>Procs. of the 3rd Latin American and Caribbean Conference for Engineering and Technology (LACCEI)<\/em>, Cartagena, Colombia, June 8-10, 2005.<\/li>\n<li>E. B. Fernandez, T. Sorgente, and M. M. Larrondo-Petrie, &#8220;A UML-based methodology for secure systems: The design stage&#8221;, <em>Procs. of the Third International Workshop on Security in Information Systems (WOSIS-2005)<\/em>, Miami, May 24-25, 2005, 207-216.<\/li>\n<li>E. B. Fernandez, and M. M. Larrondo-Petrie, \u201cUsing UML and Security Patterns to Teach Secure Systems Design,\u201d in <em>Proceedings of the American Society for Engineering Education Conference, ASEE\u201905,<\/em> Portland, Oregon, USA, 12\u201317 June 2005.<\/li>\n<li> E. B. Fernandez and T. Sorgente, &#8220;An analysis of modeling flaws in HL7 and JAHIS&#8221;, in <em>Procs. of the ACM Symposium on Applied Computing (SAC&#8217;05),<\/em> Santa Fe, NM, March 2005. (Acceptance ratio: 26%.)<\/li>\n<li> E. B. Fernandez.,and M. M. Larrondo-Petrie, \u201c Security Models for Medical and Genetic Information Systems: Requirements for Access Control\u201d, <em>2nd Latin American and Caribbean Conference for Engineering and Technology<\/em>, Miami June 2-4, 2004.<\/li>\n<li> E. B. Fernandez., M. M. Larrondo-Petrie, and T. Sorgente &#8220;Security models for medical and genetic information&#8221;, <em>IADIS International e-Society Conference<\/em>, Avila, Spain, July 2004.<\/li>\n<li> E. B. Fernandez, &#8220;A methodology for secure software design\u201d, <em>2004 Intl. Symposium on Web Services and Applications (ISWS&#8217;04)<\/em>, Las Vegas, NV, June 21-24, 2004.<\/li>\n<li> E. B. Fernandez, &#8220;Two patterns for web services security&#8221;, <em>2004 Intl. Symposium on Web Services and Applications (ISWS&#8217;04)<\/em>, Las Vegas, NV, June 21-24, 2004.<\/li>\n<li> T. Priebe, E. B. Fernandez, J. I. Mehlau, and G. Pernul, &#8220;A pattern system for access control &#8220;, <em>18th. Annual IFIP WG 11.3 Working Conference on Data and Applications Security<\/em>, Sitges, Spain, July 25-28, 2004.<\/li>\n<li>E. B. Fernandez, \u201cLayers and non-functional patterns\u201d, <a href=\"http:\/\/hillside.net\/chiliplop\/2003\/\"><em>Procs of ChiliPLoP, 2003<\/em><\/a>. Phoenix, March 10-15, 2003.<\/li>\n<li>E. B. Fernandez and J. C. Sinibaldi, &#8220;More patterns for operating systems access control&#8221;, <a href=\"http:\/\/hillside.net\/europlop\/europlop2003\/\"><em>Procs. EuroPLoP 2003<\/em><\/a>,<\/li>\n<li>X.Yuan and E. B. Fernandez, &#8220;An analysis pattern for course management&#8221;, <a href=\"http:\/\/hillside.net\/europlop\/europlop2003\/\"><em>Procs. EuroPLoP 2003<\/em><\/a>,<\/li>\n<li>E. B. Fernandez, M. M. Larrondo-Petrie, N. Seliya, N. Delessy, and A. Herzberg, &#8220;A Pattern Language for Firewalls&#8221;, <em>Procs. PLoP 2003.<\/em><\/li>\n<li> E. B. Fernandez and R. Warrier, &#8220;Remote Authenticator \/Authorizer&#8221;, <em>Procs. PLoP 2003.<\/em><\/li>\n<li> E. B. Fernandez, &#8220;Patterns for operating systems access control&#8221;, <a href=\"http:\/\/jerry.cs.uiuc.edu\/%7Eplop\/plop2002\/proceedings.html\"><em> Procs. of PLoP 2002<\/em>,<\/a><\/li>\n<li> E. B. Fernandez and R. Pan, &#8220;The Sports Manager pattern&#8221;, <a href=\"http:\/\/jerry.cs.uiuc.edu\/%7Eplop\/plop2002\/proceedings.html\"><em>Procs. of PLoP (Pattern Languages of Programs) 2002<\/em>,<\/a><\/li>\n<li> F.Dai and E. B. Fernandez, &#8220;A Pattern for the Request and Allocation of Limited Resources&#8221;, <a href=\"http:\/\/www.hillside.net\/patterns\/EuroPLoP\/submissions-2002.html\"><em>Procs. of EuroPLoP 2002<\/em>.<\/a><\/li>\n<li> E. B. Fernandez and Y.Liu, &#8220;The Account Analysis Pattern&#8221;, <a href=\"http:\/\/www.hillside.net\/patterns\/EuroPLoP\/submissions-2002.html\"><em>Procs. of EuroPLoP (Pattern Languages of Programs).<\/em><\/a><\/li>\n<li>E. B. Fernandez, &#8220;Building complex object-oriented systems with patterns and XP\u201d, <em>Procs. of P Universe (International Conference on Extreme Programming), <\/em>Raleigh, NC, July 23-25, 2001.<\/li>\n<li>E. B. Fernandez and X. Yuan, \u201cAn analysis pattern for the repair of an entity\u201d, <em>Procs. of PloP 2001.<\/em><\/li>\n<li> B. Dupire and E. B. Fernandez, \u201cThe Command Dispatcher Pattern\u201d, <em>Procs. of PloP 2001.<\/em><\/li>\n<li> E B. Fernandez and R.Y. Pan, \u201cA pattern language for security models\u201d, <em>Procs. of PloP 2001.<\/em><\/li>\n<li> E. B. Fernandez, Y. Liu, and R.Y. Pan, \u201cPatterns for Internet shops \u201c, <em>Procs. of PloP 2001.<\/em><\/li>\n<li> E. B. Fernandez, \u201cAn overview of Internet security\u201d, <em>Procs. of the World\u2019s Internet &amp; Electronic Cities Conference (WIECC 2001), <\/em> May 1-3, 2001, Kish Island, Iran.<\/li>\n<li> E. B. Fernandez, J. Wu, and D. Hancock, \u201cA design method for real-time object-oriented systems using Communicating Real-Time State Machines\u201d, <em> Procs<\/em>. <em>2001 Information Resources Management Association Conference (IRMA), <\/em>Toronto, May 2001, 792-797.<\/li>\n<li> E. B. Fernandez and X. Yuan, \u201cSemantic Analysis Patterns\u201d, <em> Procs. 19th Int. Conf. on Conceptual Modeling<\/em>, <em>ER2000<\/em>, Salt Lake City, UT, October 2000, 183-195.<\/li>\n<li> V. Hays, M. Loutrel, E. B. Fernandez, &#8220;The Object Filter and Access Control Framework&#8221;, <a href=\"http:\/\/jerry.cs.uiuc.edu\/%7Eplop\/plop2k\/proceedings\/proceedings.html\"><em>Procs. of PLoP 2000<\/em><\/a>,<\/li>\n<li> E. B. Fernandez, X. Yuan, S. Brey, &#8220;Analysis Patterns for the Order and Shipment of a Product&#8221;, <a href=\"http:\/\/jerry.cs.uiuc.edu\/%7Eplop\/plop2k\/proceedings\/proceedings.html\"><em>Procs.of PLoP 2000<\/em><\/a>,<\/li>\n<li> E. B. Fernandez, &#8220;Stock manager: An analysis pattern for inventories&#8221;, <a href=\"http:\/\/jerry.cs.uiuc.edu\/%7Eplop\/plop2k\/proceedings\/proceedings.html\"><em>Procs. of PLoP 2000,<\/em><\/a><\/li>\n<li> M. Ancona, W. Cazzola, and E. B. Fernandez, &#8216;A history-dependent access control mechanism using reflection&#8221;, <em>Procs. ECOOP99 Workshop on Reflection.<\/em><\/li>\n<li> E. B. Fernandez, &#8220;Authorization rules as metalevel constructs&#8221;,<a href=\"http:\/\/www.joeyoder.com\/Research\/metadata\/OOPSLA99\/\"><em> Procs. OOPSLA Workshop on Metadata and Dynamic Object-Model Pattern Mining<\/em><\/a> , ACM 1999.<\/li>\n<li> E. B. Fernandez, &#8220;Coordination of security levels for Internet architectures&#8221;, <em>Procs. 10th Intl. Workshop on Database and Expert systems Applications, DEXA99,<\/em> 837-841.<\/li>\n<li> A.Delarue and E. B. Fernandez, &#8220;Extension and Java implementation of the Reactor-Acceptor-Connector pattern combination&#8221;, <em>Procs. of PLoP99<\/em><\/li>\n<li> F.L. Brown and E. B. Fernandez, &#8220;The Authenticator pattern&#8221;, <em> Procs. PLoP99.<\/em><\/li>\n<li> M. Heuser and E. B. Fernandez, &#8220;RPC Client: A pattern for the clent-side implementation of a pipelined request\/response protocol&#8221;, <em>Procs. PLoP99.<\/em><\/li>\n<li> R.Flanders and E. B. Fernandez, &#8220;Data filter architecture pattern using distributed filter components&#8221;, <em>Procs. of PLoP99.<\/em><\/li>\n<li> E. B. Fernandez and X.H.Yuan, &#8220;An analysis pattern for reservation and use of entities&#8221;, <em>Procs. of Pattern Languages of Programs Conf (PLoP99).<\/em><\/li>\n<li> R.M.Santos, E. B. Fernandez, J.Santos, and M.Zambon, &#8220;Object-oriented analysis of real-time telemedical systems&#8221;, <em>Procs. of 5th Int. Conf. on Information Systs. Analysis and Synthesis (ISAS&#8217;99)<\/em> vol. 2, 365-370.<\/li>\n<li> E. B. Fernandez, &#8220;Building systems using analysis patterns&#8221;, <em> Procs. 3rd Int. Software Architecture Workshop (ISA W3), <\/em>ACM, November 1998, 37-40.<\/li>\n<li> M.Ancona, W.Cazzola, and E. B. Fernandez, &#8220;Reflective authorization systems&#8221;, <em>Procs.of ECOOP Workshop on Distributed Objects,<\/em> Sept. 1998.<\/li>\n<li> E. B. Fernandez and K. Nair,&#8221;An abstract authorization system for the Internet&#8221;, <em>Procs. 9th Int. Workshop on Database and Expert System Applics.<\/em> , (DEXA&#8217;98), September 1998, 310-315.<\/li>\n<li> J. Wu, E. B. Fernandez and K.Huang, &#8220;A generalized forward recovery checkpointing scheme&#8221;, <em>Procs.Annual IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems,<\/em> April 1998.<\/li>\n<li> J.Wu and E. B. Fernandez, &#8220;The circular token : a novel synchronization primitive &#8220;, <em>Procs. 4th. INFORMS<\/em> <em>Telecommunications Conf.<\/em> , Boca Raton , FL, March 1998.<\/li>\n<li> E. B. Fernandez, &#8220;Business analysis patterns&#8221;, <em>Procs. Software Development 98 West<\/em> , February 1998.<\/li>\n<li> E. B. Fernandez and M.M.Anwar , &#8220;Using sequences of use cases and activities in object-oriented analysis&#8221;, <em>Procs. 7th Wokshop on Information Technologies and Systems,<\/em> Atlanta, December 1997.<\/li>\n<li> E. B. Fernandez and J. C. Hawkins, &#8220;Determining role rights from use cases&#8221;, <em>Procs. 2nd. ACM Workshop on<\/em> <em>Role-Based Access Control<\/em> , November 1997, 121-125.<\/li>\n<li> J. Wu, E. B. Fernandez, and Y. Luo, &#8220;Embedding of binomial trees in hypercubes with link faults &#8220;,<em> Procs. Int. Conf. on Parallel Processing (ICPP&#8217;97) .<\/em><\/li>\n<li>E. B. Fernandez, &#8220;Object-oriented design of complex systems&#8221;,<em> Procs. Embedded Systs. Conf. East,<\/em> Boston, April 1996, 488-500.<\/li>\n<li> T. Woodcock and E. B. Fernandez, &#8220;The relationship between the object and behavior models&#8221;, <em>Proc. TOOLS USA &#8217;96<\/em>.<\/li>\n<li> J.-M. Bruel, R. B. France, and E. B. Fernandez, &#8220;Formal specification of a multimedia conferencing authorization system&#8221;, <em>Proc. OOPSLA &#8217;96, Fifth Workshop on Specification of Behavorial Semantics&#8221;,<\/em> l9-32.<\/li>\n<li> E. B. Fernandez, K. R. Nair, M. M. Larrondo-Petrie, and Y. Xu, &#8220;High-level security issues in multimedia\/hypertext systems&#8221;, in <em> Comm. and Multimedia Security II, P. Horster (Ed.)<\/em>, Chapman &amp; Hall, l996, 13-24.<\/li>\n<li> E. B. Fernandez and R. B. France, &#8220;Formal specification of real-time dependable systems &#8220;, <em>Proc. of First IEEE Int. Conf. on Eng. of Complex Comp. Systems<\/em>, Fort Lauderdale, FL, November 6-10, 1995, 342-348.<\/li>\n<li> H. Qian, E. B. Fernandez, and J. Wu , &#8220;A combined functional and object-oriented approach to software design &#8220;, <em>Proc. of First IEEE Int. Conf. on Eng. of Complex Comp. Systems<\/em>, Fort Lauderdale, FL, November 6-10, 1995, 167-174.<\/li>\n<li> R. B. France, E. B. Fernandez, and D. Wei, &#8220;A formal specification of a user group model for data security&#8221;, <em>Proc. of 4th Soft. Eng. Research Forum (SERF),<\/em> Boca Raton, Nov. 2-3, 1995, 153-161.<\/li>\n<li> J. Wu, E. B. Fernandez,and D. Dai, &#8220;Optimal fault-secure scheduling&#8221;, <em>Proc. of 8th Int. Conf. on Parallel and Dist. Computing Systems<\/em> , Orlando, FL, Sept. 21-23, 1995.<\/li>\n<li> E. B. Fernandez and P. D. Chien, &#8220;Authorization in multimedia conferencing systems&#8221;, <em>Proc. Int. Conf. on Comm. and Multimedia Security<\/em> , Graz, Austria, Sept. 20-21, 1995, 133-147.<\/li>\n<li> E. B. Fernandez, R. B. France , and D. Wei, &#8220;A formal specification of an authorization model for object-oriented databases&#8221;, <em>Proc. 9th IFIP WG11.3 Conference on Database Security<\/em>, Rensselaerville, NY , August 13-16, 1995.<\/li>\n<li> V. Kurapati, R. Caudill, M. Zhou, and E. B. Fernandez, &#8220;A control software design method for CIM systems&#8221;, <em>Proc. Conf. on CIM in the Process Industries (CIMPRO &#8217;94)<\/em>, April 1994.<\/li>\n<li> B. Abou-Haidar, E. B. Fernandez, and T. Horton, &#8220;An object-oriented methodology for the design of control software of flexible manufacturing systems&#8221;, <em>Proc. 2nd Workshop on Parallel and Distrib. Real-Time Systems<\/em> , Cancun, Mex., April 1994.<\/li>\n<li> E. B. Fernandez, J. Wu, and M. H. Fernandez, &#8220;User group structures in object-oriented databases&#8221;, <em>Proc. 8th Annual IFIP W.G.11.3 Working Conference on Database Security<\/em>, Bad Salzdetfurth, Germany, August 1994.<\/li>\n<li> L. Gao and E. B. Fernandez, &#8220;Accelerating conversations for fault-tolerant concurrent software&#8221;, <em>Proc. IEEE Southeastcon&#8217;94<\/em> , April 1994, 334-338.<\/li>\n<li> E. B. Fernandez and C. P. Han, &#8220;Behavior design of flexible manufacturing cells using object-oriented models&#8221;, <em>Proc. Int. Conf. on CAD, CAM, Robotics, and Autonomous Factories <\/em>(INCARF 1993), New Delhi, India, Dec. 1993, 133&#8211;146.<\/li>\n<li> E. B. Fernandez, M. M. Larrondo-Petrie, and E. Gudes, &#8220;A method-based authorization model for object-oriented databases&#8221;, <em>Proc. of the OOPSLA 1993 Conference Workshop on Security in Object-Oriented Systems<\/em>, 70&#8211;79.<\/li>\n<li> E. B. Fernandez and C. P. Han, &#8220;Object oriented design of flexible manufacturing systems&#8221;, <em>Proc. 6th Annual Conf. on Recent Advances on Robotics<\/em> , Gainesville, 1993, pp.1c\/3:1-3:7.<\/li>\n<li> N. Gal-Oz, E. Gudes, and E. B. Fernandez, &#8220;A model of methods access authorization in object-oriented databases&#8221;, <em>Proc. of the 19th Intl. Conference on Very Large Data Bases<\/em>, Dublin, Aug. 1993, 52&#8211;61.<\/li>\n<li> J. Wu, Y. Wang, and E. B. Fernandez, &#8220;A uniform approach to software and hardware fault tolerance&#8221;, <em>Proc. of the Euromicro Workshop on Parallel and Distributed Processing, IEEE,<\/em> 1993, 409&#8211;416.<\/li>\n<li> E. B. Fernandez and M. H. Fernandez, &#8220;Authorization groups for integrated program support environments&#8221;, <em>Proc. of the Florida SERF Conference 1992<\/em> , 203&#8211;208.<\/li>\n<li> J. Wu and E. B. Fernandez, &#8220;Broadcasting in faulty hypercube computers&#8221;, <em>Proc. of the 11th Symposium on Reliable Distributed Systems, IEEE,<\/em> October 1992, 122&#8211;129.<\/li>\n<li> J. Wu and E. B. Fernandez, &#8220;Broadcasting in faulty cube-connected cycles with minimum recovery time&#8221;, <em>Proc. Parallel Processing: CONPAR 92<\/em> , Lecture Notes in Comp. Science 634, Springer-Verlag, 1992, 833&#8211;834.<\/li>\n<li> R. Zhang, E. B. Fernandez, and J. Wu, &#8220;Parallel processing in robotics&#8221;, <em>Proc. of the Second Int. Conf. Automation Technology<\/em> , vol. <strong> 3<\/strong>, Taipei, Taiwan, July 1992, 47&#8211;53.<\/li>\n<li> L. Brown, J. Wu and E. B. Fernandez, &#8220;Fault-tolerant task scheduling for hypercube multiprocessors&#8221;, <em>Proc. 23rd Ann. Pittsburgh Modeling and Simulation Conf.<\/em>, <strong>23<\/strong>, 3 (May 1992), 1449&#8211;1456.<\/li>\n<li> E. B. Fernandez and M. H. Fernandez, &#8220;Fault tolerant parallel algorithms&#8221;, <em>Proc. of IEEE Southeastcon &#8217;91<\/em>, April 1991, pp. 466&#8211;469.<\/li>\n<li> R. Bealkowski and E. B. Fernandez, &#8220;A heterogeneous multiprocessor architecture for workstations&#8221;, <em>Proc. of IEEE Southeastcon &#8217;91<\/em>, April 1991, pp. 258&#8211;262.<\/li>\n<li> E. Gudes, H. Song, and E. B. Fernandez, &#8220;Evaluation of negative and predicate based authorization in object oriented databases&#8221;, <em>Proc. 4th IFIP WG 11.3 Workshop on Database Security<\/em>, Halifax, UK, Sept. 1990.<\/li>\n<li> E. Gudes and E. B. Fernandez, &#8220;Combined Application \/ Database Fault Recovery&#8221;, <em>Proc. 1990 International Conference on Computer Systems and Software Engineering<\/em>, (COMPEURO 90), 1990.<\/li>\n<li> H. Song, E. B. Fernandez and E. Gudes &#8220;Administrative Authorization in Object-Oriented Semantic Databases,&#8221;<em> Proceedings of E.I.S.S. Workshop on Database Security<\/em>, Karlsruhe, April 1990.<\/li>\n<li> P.C.Buechler and E. B. Fernandez, &#8220;Extending N-Version programming to concurrent software&#8221;, <em>Procs. Int. Conf. on Databases, Parallel Architectures, and their Applications (PARBASE-90), IEEE,<\/em> 1990, 531.<\/li>\n<li> J. Wu and E. B. Fernandez, &#8220;Fault-Tolerant Distributed Broadcast Algorithms on Cube-Connected-Cycles Networks,&#8221; <em>Proc. of 1990 Canadian Conference on Electrical and Computer Engineering<\/em>, Sept. 1990, 51.4.1-51.4.4.<\/li>\n<li> R. Zhang, E. B. Fernandez and J. Wu, &#8220;A Parallel Implementation of Robot Control Equations on T414 Transputers,&#8221; <em>Proceedings of the North American Transputer Users Group<\/em>, 1990 fall meeting.<\/li>\n<li> J. Wu and E. B. Fernandez, &#8220;Petri Net Modeling Techniques,&#8221; <em> Proceedings of the 21st Annual Pittsburgh Conference on Modeling and Simulation<\/em> , May 1990, 1311-1317.<\/li>\n<li> J. Wu, and E. B. Fernandez, &#8220;A Scheduling Approach to Communication Tasks,&#8221; <em>Proceedings of the 22nd Southeastern Symposium on System Theory<\/em> , March 1990, 91-97.<\/li>\n<li> J. Wu and E. B. Fernandez, &#8220;Fault-Tolerant Multiprocessor Networks Through an Extended G-Network,&#8221; <em>Proceedings of PARBASE-90<\/em>, March 1990, 216-220.<\/li>\n<li> J. Wu and E. B. Fernandez, &#8220;Some Extensions and Applications of the Byzantine Generals Problem,&#8221;<em> Proceedings of the ISMM International Conference on Intelligent Distributed Processing<\/em>, December 1989, 94-97.<\/li>\n<li> S. Leu, E. B. Fernandez, and T. Khoshgoftaar, &#8220;Reliability Modeling of Fault-Tolerant Software Using Petri Nets,&#8221; <em>Proceedings of the 20th Annual Pittsburgh Conference on Modeling and Simulation<\/em>, May 1989, 1099-1104.<\/li>\n<li> E. B. Fernandez, E. Gudes and H. Song, &#8220;A Security Model for Object-Oriented Databases,&#8221; <em>Proceedings of the 1989 IEEE Symposium on Security and Privacy<\/em> , 110-115.<\/li>\n<li> P. C. Buechler and E. B. Fernandez, &#8220;The Architecture of an Ultra-Reliable Parallel Processing Robotic Control Computer,&#8221; <em>Proceedings of the 2nd Conference on Recent Advances in Robotics<\/em>, Florida Atlantic University, May 1989.<\/li>\n<li> R. Zhang and E. B. Fernandez, &#8220;Parallelism for Robotic Control Applications Hardware,&#8221; <em>Proceedings of the 2nd Conference on Recent Advances in Robotics<\/em> , Florida Atlantic University, May 1989.<\/li>\n<li> M. L. Petrie, N. S. Coulter and E. B. Fernandez, &#8220;Measuring the Logical Complexity of Parallel Programs,&#8221; <em>Proceedings of the 27th Annual Southeast Region ACM Conference<\/em>, 1989, 636-640.<\/li>\n<li> E. B. Fernandez and H. Song, &#8220;Authorization in Object-Oriented Databases,&#8221; <em>Proceedings of the 37th ACM Southeast Conference<\/em>, 1989, 432-435.<\/li>\n<li> S. Leu, E. B. Fernandez, and T. Khoshgoftaar, &#8220;Reliability of Fault -tolerant Software Based on a System Architecture with a Recovery Metaprogram,&#8221; <em>Proceedings of the 21st Southeastern Symposium on Systems Theory<\/em> , 1989, 423-426.<\/li>\n<li> P. Goyal and E. B. Fernandez, &#8220;Cube-Connected Cubes &#8212; A Recursively Defined Network Architecture for Parallel Computation,&#8221; <em>Proc. 4th Conference on Hypercubes<\/em>, Vol I, 1989, 321-325.<\/li>\n<li> D. B. Clifton ad . .B. Fernandez, &#8220;A Microprocessor Design for Multilevel Security Communications,&#8221; <em>Proceedings of the 4th Aerospace Computer Security Applications Conference<\/em>, 1988, 194-198.<\/li>\n<li> P. Goyal and E. B. Fernandez, &#8220;Encryption Using Random Keys &#8212; A Scheme for Security Communications,&#8221; <em>Proceedings of the 4th Aerospace Computer Security\u0152 Applications Conference<\/em>, 1988, 410-412.<\/li>\n<li> R. Zhang and E. B. Fernandez, &#8220;Parallel and Fault-Tolerant Implementation of Robotic Control Algorithms,&#8221; <em>Proceedings of the 1st Florida Conference on Computer Integrated Engineering and Manufacturing (PROCIEM &#8217;88)<\/em> , 1988, 17-18.<\/li>\n<li> E. B. Fernandez, V. Chandra, S. Kulkarni, U. Bhathija, and S. Pendse, &#8220;A Transputer-based Fault -tolerant Robot Arm Controller,&#8221; <em> Proceedings of the International Symposium on Mini and microcomputers (MIMI &#8217;88)<\/em> , Miami, December 1988, 336-338.<\/li>\n<li> S. T. Yoon and E. B. Fernandez, &#8220;Performance Evaluation of a Ridge 32 Computer System,&#8221; <em>Proceedings of the International Symposium on Mini and Microcomputers (MIMI &#8217;88)<\/em>, Miami, December 1988, 15-18.<\/li>\n<li> M. L. Petrie, N. S. Coulter, E. B. Fernandez, &#8220;Complexity Metrics for Parallel Programming,&#8221; <em>Proceedings International Symposium on Mini and Microcomputers (MIMI&#8217;88)<\/em>, December 1988, 209-212.<\/li>\n<li> L. Cheng and E. B. Fernandez, &#8220;Expanding MML for Dedicated Multiple Microprocessor Applications,&#8221; <em>Proceedings of the 21st IEEE Southeastcon &#8217;88 Conference<\/em>, 117-122.<\/li>\n<li> B. M. Ozaki and E. B. Fernandez, &#8220;The Implementation of Software Fault-tolerance in the Intel 286 Processor,&#8221; <em>Proceedings of the 21st IEEE Southeastcon &#8217;88 Conference<\/em>, 75-80.<\/li>\n<li> J. L. Sarmiento and E. B. Fernandez, &#8220;A Knowledge-based System for the Development of Fault Tolerant Programs,&#8221; <em>Proceedings of the Florida A.I. Research Symposium<\/em>, May 1988, 119-124.<\/li>\n<li> J. Wu and E. B. Fernandez, &#8220;A Weighted Tree Model for Algorithms with Boolean Vector Operands,&#8221; <em>Proceedings of the 20th Southeastern Symposium on Systems Theory<\/em>, 1988, 150-154.<\/li>\n<li> M. Ancona, A. Clematis, G. Dodero, E. B. Fernandez, and V. Gianuzzi, &#8220;A System Architecture for Software Fault-Tolerance,&#8221; <em>Proceedings of the 3rd International Conference on Fault Tolerant Computing Systems<\/em> , Bremerhaven, 1987, 273-283.<\/li>\n<li> T. A. Ngo and E. B. Fernandez, &#8220;Optimal Scheduling of Processes for a Network of Transputers,&#8221; <em>Proceedings of the 25th Annual Conference Southeast Region ACM<\/em>, April 1987, 316-321.<\/li>\n<li> E. B. Fernandez, &#8220;An Evaluation of a RISC System,&#8221; Session Record,<em> IEEE Midcon 1985<\/em>, Chicago, September 1985 (invited paper).<\/li>\n<li> E. B. Fernandez, &#8220;Advances in Single-Chip Computer Architectures,&#8221; <em>Proceedings of the 1984 IEEE International Conference on Computer Design<\/em> (ICCD &#8217;84), October 1984, pp. 216-221.<\/li>\n<li> E. B. Fernandez, &#8220;Comparison and Evaluation of 32-bit Microprocessors,&#8221; <em>IEEE Southcon and Mini\/Micro &#8217;84<\/em>, Orlando, Florida, January 1984, Session Record 9, pp. 9.1-9.11.<\/li>\n<li> C. Wood and E. B. Fernandez, &#8220;Authorization in a Decentralized Database System,&#8221; <em>Proceedings of the 5th International Conference on Very Large Databases<\/em>, pp. 352-359, Rio de Janeiro, 1979.<\/li>\n<li> L. Lichten and E. B. Fernandez, &#8220;Interaction with Databases through Procedural Languages,&#8221; <em>Proceedings of the ACM 1979 Annual Conference<\/em> , pp. 937-945.<\/li>\n<li> E. B. Fernandez and C. Wood, &#8220;The Relationship Between Operating System and Database System Security: a Survey,&#8221; <em>Proceedings of the Computer Software Applications Conference<\/em> (COMPSAC), November 1977, 453-562.<\/li>\n<li> R. Summers and E. B. Fernandez, &#8220;An Approach to Data Security,&#8221; <em>Proceedings of the 8th Australian Computer Conference<\/em>, September 1978.<\/li>\n<li> T. Lang, E. B. Fernandez and R. Summers, &#8220;A System Architecture for Compile-time Actions in Databases,&#8221;<em> Proceedings of the ACM 1977 Annual Conference<\/em>, pp. 453-462, October 1977.<\/li>\n<li> T. Lang, E. Nahouraii, K. Kasuga and E. B. Fernandez, &#8220;An Architectural \u0152 Extension for a Large Database System Incorporating a Processor for Disk Search&#8221;, <em>Proceedings of the 3rd International Conference on Vary Large Data Bases<\/em>, Tokyo, Japan, pp. 204-210, October 1977.<\/li>\n<li> E. B. Fernandez and R. C. Summers, &#8220;Integrity Aspects of a Shared Database&#8221;, <em>AFIPS Conference Proceedings<\/em>, Vol. 45, pp. 819-827, NCC 1976.<\/li>\n<li> E. B. Fernandez, R. C. Summers and T. Lang, &#8220;Definition and Evaluation of Access Rules in Data Management Systems&#8221;, <em>Proceedings 1st International Conference on Very Large Databases<\/em>, Boston, 1975, 268-285.<\/li>\n<li> E. B. Fernandez, R. C. Summers, and C. B. Coleman, &#8220;An Authorization Model for a Shared Data Base&#8221;, <em>Proceedings of the 1974 SIGMOD International Conference<\/em>, ACM, New York, pp. 23-31, 1975.<\/li>\n<li> R. C. Summers, C. D. Coleman, and E. B. Fernandez, &#8220;A programming Language Extension for Access to a Shared Data Base&#8221;, <em>Proceedings of the 1975 ACM Pacific Conference<\/em>, pp. 114-118, 1975.<\/li>\n<li> R. C. Summers, E. B. Fernandez and C. D. Coleman, &#8220;Shared Data Access Control with Programming Language Support&#8221;, <em>Proceedings of the 8th Hawaii International Conference on System Science<\/em>, Honolulu, January, 1975, pp. 187-190.<\/li>\n<li> E. B. Fernandez, &#8220;Restructuring and Scheduling of Parallel Computations&#8221;, <em>Conference Record of the 5th Asilomar conference on Circuits and Systems<\/em>, pp. 472-479, November 1971.<\/li>\n<li> E. B. Fernandez, &#8220;Restructuring of Graph Models of Computations,&#8221;<em> Proceedings of the International Conference on Networks, Systems, and Computers<\/em> , Oaxtepec, Mexico, pp. 664-668, 1971.<\/li>\n<li> H. Arango, C. Holzmann, E. B. Fernandez and S. Padin, &#8220;On the Set of Trees of an Interconnection of Graphs&#8221;, <em>Proceedings of the International Symposium on Circuit and System Theory<\/em>, Kyoto, Japan, 1970.<\/li>\n<li> E. B. Fernandez, &#8220;An Evaluation of Tree of Tree Generation Methods&#8221;, <em>Proceedings of the 12th Midwest Symposium on Circuit Theory<\/em>, Austin, Texas, April 1969.<\/li>\n<p><\/span><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>K. Hashizume, N. Yoshioka, and E. B. Fernandez, &#8220;Misuse Patterns for Cloud Computing&#8221;, 2011. M. Cardei, E. B. Fernandez, A. Sahu, and I. Cardei, &#8220;A pattern for Wireless System Architectures&#8221;, 2011. S. Mujica, F. Valenzuela, and E. B. Fernandez, &#8220;Two security patterns: Least Privilege and Secure Logger\/Auditor&#8221;, 2011. J. Mu\u00f1oz-Arteaga, E. B. Fernandez, and H. [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":0,"parent":190,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-225","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/comments?post=225"}],"version-history":[{"count":36,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/225\/revisions"}],"predecessor-version":[{"id":519,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/225\/revisions\/519"}],"up":[{"embeddable":true,"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/pages\/190"}],"wp:attachment":[{"href":"https:\/\/faculty.eng.fau.edu\/fernande\/wp-json\/wp\/v2\/media?parent=225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}