An analysis of security issues for cloud computing K Hashizume, DG Rosado, E Fernández-Medina, EB Fernandez Journal of internet services and applications 4, 1-13, 2013 | 1105 | 2013 |
A BPMN extension for the modeling of security requirements in business processes A Rodríguez, E Fernández-Medina, M Piattini IEICE transactions on information and systems 90 (4), 745-752, 2007 | 415 | 2007 |
A common criteria based security requirements engineering process for the development of secure information systems D Mellado, E Fernández-Medina, M Piattini Computer standards & interfaces 29 (2), 244-253, 2007 | 342 | 2007 |
A systematic review of security requirements engineering D Mellado, C Blanco, LE Sánchez, E Fernández-Medina Computer Standards & Interfaces 32 (4), 153-165, 2010 | 280 | 2010 |
A systematic review and comparison of security ontologies C Blanco, J Lasheras, R Valencia-García, E Fernández-Medina, A Toval, ... 2008 Third International Conference on Availability, Reliability and …, 2008 | 166 | 2008 |
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach A Rodríguez, IGR de Guzmán, E Fernández-Medina, M Piattini Information and Software Technology 52 (9), 945-971, 2010 | 134 | 2010 |
Access control and audit model for the multidimensional modeling of data warehouses E Fernández-Medina, J Trujillo, R Villarroel, M Piattini Decision Support Systems 42 (3), 1270-1289, 2006 | 128 | 2006 |
Developing secure data warehouses with a UML extension E Fernández-Medina, J Trujillo, R Villarroel, M Piattini Information Systems 32 (6), 826-856, 2007 | 126 | 2007 |
Empirical evaluation of a cloud computing information security governance framework O Rebollo, D Mellado, E Fernández-Medina, H Mouratidis Information and Software Technology 58, 44-57, 2015 | 122 | 2015 |
Security analysis in the migration to cloud environments DG Rosado, R Gómez, D Mellado, E Fernández-Medina Future Internet 4 (2), 469-487, 2012 | 118 | 2012 |
Applying a security requirements engineering process D Mellado, E Fernández-Medina, M Piattini Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 116 | 2006 |
Secure business process model specification through a UML 2.0 activity diagram profile A Rodríguez, E Fernández-Medina, J Trujillo, M Piattini Decision Support Systems 51 (3), 446-465, 2011 | 104 | 2011 |
Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases A Rodríguez, E Fernández-Medina, M Piattini Business Process Management: 5th International Conference, BPM 2007 …, 2007 | 100 | 2007 |
Basis for an integrated security ontology according to a systematic review of existing proposals C Blanco, J Lasheras, E Fernández-Medina, R Valencia-García, A Toval Computer Standards & Interfaces 33 (4), 372-388, 2011 | 99 | 2011 |
Main issues in big data security J Moreno, MA Serrano, E Fernández-Medina Future Internet 8 (3), 44, 2016 | 96 | 2016 |
Towards a UML 2.0 extension for the modeling of security requirements in business processes A Rodríguez, E Fernández-Medina, M Piattini Trust and Privacy in Digital Business: Third International Conference …, 2006 | 86 | 2006 |
Análisis y revisión de la literatura en el contexto de proyectos de fin de carrera: Una propuesta MAC Gutiérrez, AR Ríos, C Calero, E Fernández-Medina, M Piattini Revista Sociedad Chilena de Ciencia de la Computación 6 (1), 2005 | 78 | 2005 |
Secure information systems development–a survey and comparison R Villarroel, E Fernández-Medina, M Piattini Computers & Security 24 (4), 308-321, 2005 | 75 | 2005 |
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment. O Rebollo, D Mellado, E Fernandez-Medina J. Univers. Comput. Sci. 18 (6), 798-815, 2012 | 70 | 2012 |
Security requirements engineering framework for software product lines D Mellado, E Fernández-Medina, M Piattini Information and Software Technology 52 (10), 1094-1117, 2010 | 69 | 2010 |