SlideShare ist ein Scribd-Unternehmen logo
1 von 11
FULL LIST OF
PUBLICATIONS
by Carlos A. Gutiérrez
List updated: January 2011
Full list of publications
• International Conferences
• Spanish and Latin American Conferences
• International Journals
• Spanish and Latin American Journals
• International Edited Books
• Book Chapters
• Technical Reports
Full list of publications
International Conferences (1/2)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is
the problem solved? Proceedings of the 2nd. International Workshop on
Security In Information Systems, WOSlS 2004 joined with ICEIS 2004,
INSTICC Press, Oporto (Portugal), April 2004, pp. 293-304.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Survey of Web Services
Security. Proceedings of the Workshop on Internet Communications
Security 2004 (WICS 2004), joined with 2004 International Conference on Computational
Science and lts Appllcations (ICCSA 2004), May 14-17, Assisi (PG) Italy, Springer-Verlag,
LNCS 3043, ISBN 3-540-22054-2, pp. 969-977.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Considerations in Web Services
Security. Proceedings of the International Symposium on Web Services
& Applications (ISWS’04), Las Vegas, Nevada (US), CSREA Press,
ISBN 1-932415- 45-9, pp. 99-105.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Proceedings of fhe 2nd. International Workshop on Security In
Information Systems, WOSlS 2005 joined with ICEIS 2005, INSTICC Press,
ISBN 972-8865-25-2, May 2005, Miami (US).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Requirements for Web
Services based on SIREN, Symposium on Requirements Engineering for Information
Security (SREIS) joined with RE 05 - l3th IEEE International Requirements Engineering Conference,
August 2005, Paris (France).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web services-based Security requirement
elicitation, lst. International Workshop on Service-Oriented Computing: Consequences for Engineering
Requirements (SOCCER’OS) joined with RE 05 - l3th IEEE International Requirements Engineer
Full list of publications
International Conferences (2/2)
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Study of
Security Architectural Patterns, The First International Conference on Availability, Reliability
and Security (ARES’06), pp.3S8-36S, IEEE Computer Society, ISBN 0-7695-2567-9,
20-22 April 2006, Vienna (Austria).
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security
Patterns related to Security Requirements, 3rd International Workshop on Security in
Information Systems (WOSIS 2006) joined with ICEIS 2005, INSTICC Press.,
May 2006, Paphos (Cyprus).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Risk Analysis in
Web Services Systems, International Conference on Security and Cryptography
(SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press.,
pp. 425-430, ISBN-972-8865-63-5.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Defining Viewpoints for Security Architectural Patterns, International
Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal),
August 2006, INSTICC Press, pp. 419-424, ISBN-972-8865-63-5.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Security Architectural
Patterns based on Viewpoints, 2007 International Conference on Computational Science and Its Applications
(ICCSA 2007), Kuala Lumpur, Malaysia, August 2007, LNCS 4707/2007, pp. 262-272.
Full list of publications
Spanish and Latin American Conferences (I/2)
Lecture on the State of the Art on Web Services Security,
October 2004, Zaragoza (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Estado del Arte en
Federación mediante Servicios Web, Primer Taller de Seguridad en
Ingeniería del Software y Bases de Datos (SISBD’04), pp. 21-32, 9 de
November, Málaga (Spain)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., PWSSEC: Proceso
de Desarrollo para Seguridad de Servicios Web, X Jornadas de Ingeniería
del Software y Bases de Datos (JISBD 2005) joined with the I Congreso
Español de Informática 2005. (CEDI’2005), pp. 203-210,
13-14 September, Granada (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Desarrollo de
sistemas basados en servicios web seguros, Jornadas Científico-Técnicas
en Servicios Web (JSWEB 2005) joined with the I Congreso Español de
Informática 2005 (CEDI’2005), pp. 141- 149, 13-14 September, Granada (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Patrones de Seguridad
conforme a los Requisitos de Seguridad para Servicios Web, IX
Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2006),
pp. 501-514, 7-9 September, Barcelona (Spain).
Full list of publications
Spanish and Latin American Conferences (2/2)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Elicitación
de Requisitos de Seguridad para Servicios Web en PWSSec,
3er. Congreso Iberoamericano de Seguridad Informática
— CIBSI 2005, pp. 385-400, 21-25 November 2005, Valparaíso (Chile).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparación
de Patrones de Seguridad para el desarrollo de Sistemas
Seguros, IV Congreso Internacional de Auditoría y Seguridad
de la Información – CIASI 2005, 14-16 December 2005, Madrid (Spain).
Rosado, G. D., Gutiérrez, C., & Fernández-Medina, E., The practical
application of a process for eliciting and designing security in
web service systems XV Jornadas de Ingeniería del Software
y Bases de Datos (JISBD 2010), pp. 143, 7-10 September, Valencia(Spain).
Full list of publications
International Journals
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the
problem solved?, Information Systems Security, 13 (3), pp. 23-31, July/August 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Journal of Research and Practice in Information
Technology, Australian Computer Society, 38(1), pp. 57-67, 2006.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Comparison of Security Patterns, IJCSNS International Journal of Computer
Science and Network Security, 6(2B), pp. 139-146, February 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Development of
Web Services Security Systems, International Journal of Web
Engineering and Technology (IJWET), 2(4), pp. 292-306, lnderscience
Publishers, 2006.
Rosado, G., Gutiérrez, C., Fernández-Medina, E., & Piattini, Security Patterns
and Security Requirements for Web Services, Internet Research, 16 (5), pp. 519-536,
November/December 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security Requirement
Elicitation, IEICE Transactions on Information and Systems, September 2007.
Full list of publications
Spanish and Latin American Journals
Gutiérrez, C., Fernández-Medina, E., & Piattini M., PWSSEC: Proceso de Desarrollo
para Seguridad de Servicios Web, IEEE América Latina (Special Edition JISBD 2005),
Vol. 4, April 2006.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E.,
& Piattini, M., Una Visión General sobre Patrones de
Seguridad, Revista del Círculo de Usuarios de Oracle,
pp.3-I5, February 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Federación de
dominios de confianza mediante servicios web, eSecurity European Security,
N°2, pp. 70-75, November 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Applying Security
Standards in Web Services, e.Security European Security (european edition)
N°1, pp. 54-57, October 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Aplicación de Estándares de Seguridad en Servicios Web,
e.Security European Security, N°1, pp. 62-65, September 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Seguridad en servicios
Web. Revista del Círculo de Usuarios de Oracle, May 2004.
Full list of publications
International Edited Books
Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2010): Web Services
Security: theoretical and practical issues, IGI Global (USA). January 2010.
Full list of publications
Chapter books
C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez,
D.G. Rosado, E. Fernández-Medina, M. Piattini (2011):
Security over the Information Systems Development
Cycle. In “Software Engineering for Secure Systems:
Industrial and Research Perspectives”. Haralambos
Mouratidis (Eds.). IGI Global (United States).
C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez,
D.G. Rosado, J. Lasheras, A. Toval, J. Trujillo,
E. Fernández-Medina, M. Piattini (2009):
Seguridad en Ingeniería del Software.
Editorial Ra-Ma (Spain).
Gutierrez, C., Fernandez-Medina, E., Piattini, M.
(2005): Web Services Security. Chapter 2 in the
book “Information and Web Security”, Bhavani
M. Thuraisingham, Elena Ferrari (Eds.), Idea Group
Publishing (United States) (FIRST CHAPTER OF
THIS BOOK WAS AUTHORED BY SIR. TIM
BERNERS-LEE)
Full list of publications
Technical Report
Gutiérrez, C., Fernández-Medina, E., & Piattini, Seguridad en Servicios
Web. Informe Técnico UCLM DIAB-05-01-2. Departamento de
Informática, Universidad de Castilla-La Mancha. January 2005. 386 pages.

Weitere ähnliche Inhalte

Ähnlich wie Publications of Carlos A. Gutierrez - January 2011

list of references.docx
list of references.docxlist of references.docx
list of references.docxSami Siddiqui
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...pijans
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanDeris Stiawan
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)aciijournal
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)IJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyAIRCC Publishing Corporation
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 

Ähnlich wie Publications of Carlos A. Gutierrez - January 2011 (20)

Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
list of references.docx
list of references.docxlist of references.docx
list of references.docx
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang Kesehatan
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Publications of Carlos A. Gutierrez - January 2011

  • 1. FULL LIST OF PUBLICATIONS by Carlos A. Gutiérrez List updated: January 2011
  • 2. Full list of publications • International Conferences • Spanish and Latin American Conferences • International Journals • Spanish and Latin American Journals • International Edited Books • Book Chapters • Technical Reports
  • 3. Full list of publications International Conferences (1/2) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the problem solved? Proceedings of the 2nd. International Workshop on Security In Information Systems, WOSlS 2004 joined with ICEIS 2004, INSTICC Press, Oporto (Portugal), April 2004, pp. 293-304. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Survey of Web Services Security. Proceedings of the Workshop on Internet Communications Security 2004 (WICS 2004), joined with 2004 International Conference on Computational Science and lts Appllcations (ICCSA 2004), May 14-17, Assisi (PG) Italy, Springer-Verlag, LNCS 3043, ISBN 3-540-22054-2, pp. 969-977. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Considerations in Web Services Security. Proceedings of the International Symposium on Web Services & Applications (ISWS’04), Las Vegas, Nevada (US), CSREA Press, ISBN 1-932415- 45-9, pp. 99-105. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for Web Services Security, Proceedings of fhe 2nd. International Workshop on Security In Information Systems, WOSlS 2005 joined with ICEIS 2005, INSTICC Press, ISBN 972-8865-25-2, May 2005, Miami (US). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Requirements for Web Services based on SIREN, Symposium on Requirements Engineering for Information Security (SREIS) joined with RE 05 - l3th IEEE International Requirements Engineering Conference, August 2005, Paris (France). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web services-based Security requirement elicitation, lst. International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements (SOCCER’OS) joined with RE 05 - l3th IEEE International Requirements Engineer
  • 4. Full list of publications International Conferences (2/2) Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Study of Security Architectural Patterns, The First International Conference on Availability, Reliability and Security (ARES’06), pp.3S8-36S, IEEE Computer Society, ISBN 0-7695-2567-9, 20-22 April 2006, Vienna (Austria). Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Patterns related to Security Requirements, 3rd International Workshop on Security in Information Systems (WOSIS 2006) joined with ICEIS 2005, INSTICC Press., May 2006, Paphos (Cyprus). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Risk Analysis in Web Services Systems, International Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press., pp. 425-430, ISBN-972-8865-63-5. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Viewpoints for Security Architectural Patterns, International Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press, pp. 419-424, ISBN-972-8865-63-5. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Security Architectural Patterns based on Viewpoints, 2007 International Conference on Computational Science and Its Applications (ICCSA 2007), Kuala Lumpur, Malaysia, August 2007, LNCS 4707/2007, pp. 262-272.
  • 5. Full list of publications Spanish and Latin American Conferences (I/2) Lecture on the State of the Art on Web Services Security, October 2004, Zaragoza (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Estado del Arte en Federación mediante Servicios Web, Primer Taller de Seguridad en Ingeniería del Software y Bases de Datos (SISBD’04), pp. 21-32, 9 de November, Málaga (Spain) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., PWSSEC: Proceso de Desarrollo para Seguridad de Servicios Web, X Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2005) joined with the I Congreso Español de Informática 2005. (CEDI’2005), pp. 203-210, 13-14 September, Granada (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Desarrollo de sistemas basados en servicios web seguros, Jornadas Científico-Técnicas en Servicios Web (JSWEB 2005) joined with the I Congreso Español de Informática 2005 (CEDI’2005), pp. 141- 149, 13-14 September, Granada (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Patrones de Seguridad conforme a los Requisitos de Seguridad para Servicios Web, IX Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2006), pp. 501-514, 7-9 September, Barcelona (Spain).
  • 6. Full list of publications Spanish and Latin American Conferences (2/2) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Elicitación de Requisitos de Seguridad para Servicios Web en PWSSec, 3er. Congreso Iberoamericano de Seguridad Informática — CIBSI 2005, pp. 385-400, 21-25 November 2005, Valparaíso (Chile). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparación de Patrones de Seguridad para el desarrollo de Sistemas Seguros, IV Congreso Internacional de Auditoría y Seguridad de la Información – CIASI 2005, 14-16 December 2005, Madrid (Spain). Rosado, G. D., Gutiérrez, C., & Fernández-Medina, E., The practical application of a process for eliciting and designing security in web service systems XV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2010), pp. 143, 7-10 September, Valencia(Spain).
  • 7. Full list of publications International Journals Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the problem solved?, Information Systems Security, 13 (3), pp. 23-31, July/August 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for Web Services Security, Journal of Research and Practice in Information Technology, Australian Computer Society, 38(1), pp. 57-67, 2006. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparison of Security Patterns, IJCSNS International Journal of Computer Science and Network Security, 6(2B), pp. 139-146, February 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Development of Web Services Security Systems, International Journal of Web Engineering and Technology (IJWET), 2(4), pp. 292-306, lnderscience Publishers, 2006. Rosado, G., Gutiérrez, C., Fernández-Medina, E., & Piattini, Security Patterns and Security Requirements for Web Services, Internet Research, 16 (5), pp. 519-536, November/December 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security Requirement Elicitation, IEICE Transactions on Information and Systems, September 2007.
  • 8. Full list of publications Spanish and Latin American Journals Gutiérrez, C., Fernández-Medina, E., & Piattini M., PWSSEC: Proceso de Desarrollo para Seguridad de Servicios Web, IEEE América Latina (Special Edition JISBD 2005), Vol. 4, April 2006. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Una Visión General sobre Patrones de Seguridad, Revista del Círculo de Usuarios de Oracle, pp.3-I5, February 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Federación de dominios de confianza mediante servicios web, eSecurity European Security, N°2, pp. 70-75, November 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Applying Security Standards in Web Services, e.Security European Security (european edition) N°1, pp. 54-57, October 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Aplicación de Estándares de Seguridad en Servicios Web, e.Security European Security, N°1, pp. 62-65, September 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Seguridad en servicios Web. Revista del Círculo de Usuarios de Oracle, May 2004.
  • 9. Full list of publications International Edited Books Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2010): Web Services Security: theoretical and practical issues, IGI Global (USA). January 2010.
  • 10. Full list of publications Chapter books C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez, D.G. Rosado, E. Fernández-Medina, M. Piattini (2011): Security over the Information Systems Development Cycle. In “Software Engineering for Secure Systems: Industrial and Research Perspectives”. Haralambos Mouratidis (Eds.). IGI Global (United States). C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez, D.G. Rosado, J. Lasheras, A. Toval, J. Trujillo, E. Fernández-Medina, M. Piattini (2009): Seguridad en Ingeniería del Software. Editorial Ra-Ma (Spain). Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2005): Web Services Security. Chapter 2 in the book “Information and Web Security”, Bhavani M. Thuraisingham, Elena Ferrari (Eds.), Idea Group Publishing (United States) (FIRST CHAPTER OF THIS BOOK WAS AUTHORED BY SIR. TIM BERNERS-LEE)
  • 11. Full list of publications Technical Report Gutiérrez, C., Fernández-Medina, E., & Piattini, Seguridad en Servicios Web. Informe Técnico UCLM DIAB-05-01-2. Departamento de Informática, Universidad de Castilla-La Mancha. January 2005. 386 pages.