SlideShare uma empresa Scribd logo
1 de 11
FULL LIST OF
PUBLICATIONS
by Carlos A. Gutiérrez
List updated: January 2011
Full list of publications
• International Conferences
• Spanish and Latin American Conferences
• International Journals
• Spanish and Latin American Journals
• International Edited Books
• Book Chapters
• Technical Reports
Full list of publications
International Conferences (1/2)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is
the problem solved? Proceedings of the 2nd. International Workshop on
Security In Information Systems, WOSlS 2004 joined with ICEIS 2004,
INSTICC Press, Oporto (Portugal), April 2004, pp. 293-304.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Survey of Web Services
Security. Proceedings of the Workshop on Internet Communications
Security 2004 (WICS 2004), joined with 2004 International Conference on Computational
Science and lts Appllcations (ICCSA 2004), May 14-17, Assisi (PG) Italy, Springer-Verlag,
LNCS 3043, ISBN 3-540-22054-2, pp. 969-977.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Considerations in Web Services
Security. Proceedings of the International Symposium on Web Services
& Applications (ISWS’04), Las Vegas, Nevada (US), CSREA Press,
ISBN 1-932415- 45-9, pp. 99-105.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Proceedings of fhe 2nd. International Workshop on Security In
Information Systems, WOSlS 2005 joined with ICEIS 2005, INSTICC Press,
ISBN 972-8865-25-2, May 2005, Miami (US).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Requirements for Web
Services based on SIREN, Symposium on Requirements Engineering for Information
Security (SREIS) joined with RE 05 - l3th IEEE International Requirements Engineering Conference,
August 2005, Paris (France).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web services-based Security requirement
elicitation, lst. International Workshop on Service-Oriented Computing: Consequences for Engineering
Requirements (SOCCER’OS) joined with RE 05 - l3th IEEE International Requirements Engineer
Full list of publications
International Conferences (2/2)
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Study of
Security Architectural Patterns, The First International Conference on Availability, Reliability
and Security (ARES’06), pp.3S8-36S, IEEE Computer Society, ISBN 0-7695-2567-9,
20-22 April 2006, Vienna (Austria).
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security
Patterns related to Security Requirements, 3rd International Workshop on Security in
Information Systems (WOSIS 2006) joined with ICEIS 2005, INSTICC Press.,
May 2006, Paphos (Cyprus).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Risk Analysis in
Web Services Systems, International Conference on Security and Cryptography
(SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press.,
pp. 425-430, ISBN-972-8865-63-5.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Defining Viewpoints for Security Architectural Patterns, International
Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal),
August 2006, INSTICC Press, pp. 419-424, ISBN-972-8865-63-5.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Security Architectural
Patterns based on Viewpoints, 2007 International Conference on Computational Science and Its Applications
(ICCSA 2007), Kuala Lumpur, Malaysia, August 2007, LNCS 4707/2007, pp. 262-272.
Full list of publications
Spanish and Latin American Conferences (I/2)
Lecture on the State of the Art on Web Services Security,
October 2004, Zaragoza (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Estado del Arte en
Federación mediante Servicios Web, Primer Taller de Seguridad en
Ingeniería del Software y Bases de Datos (SISBD’04), pp. 21-32, 9 de
November, Málaga (Spain)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., PWSSEC: Proceso
de Desarrollo para Seguridad de Servicios Web, X Jornadas de Ingeniería
del Software y Bases de Datos (JISBD 2005) joined with the I Congreso
Español de Informática 2005. (CEDI’2005), pp. 203-210,
13-14 September, Granada (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Desarrollo de
sistemas basados en servicios web seguros, Jornadas Científico-Técnicas
en Servicios Web (JSWEB 2005) joined with the I Congreso Español de
Informática 2005 (CEDI’2005), pp. 141- 149, 13-14 September, Granada (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Patrones de Seguridad
conforme a los Requisitos de Seguridad para Servicios Web, IX
Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2006),
pp. 501-514, 7-9 September, Barcelona (Spain).
Full list of publications
Spanish and Latin American Conferences (2/2)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Elicitación
de Requisitos de Seguridad para Servicios Web en PWSSec,
3er. Congreso Iberoamericano de Seguridad Informática
— CIBSI 2005, pp. 385-400, 21-25 November 2005, Valparaíso (Chile).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparación
de Patrones de Seguridad para el desarrollo de Sistemas
Seguros, IV Congreso Internacional de Auditoría y Seguridad
de la Información – CIASI 2005, 14-16 December 2005, Madrid (Spain).
Rosado, G. D., Gutiérrez, C., & Fernández-Medina, E., The practical
application of a process for eliciting and designing security in
web service systems XV Jornadas de Ingeniería del Software
y Bases de Datos (JISBD 2010), pp. 143, 7-10 September, Valencia(Spain).
Full list of publications
International Journals
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the
problem solved?, Information Systems Security, 13 (3), pp. 23-31, July/August 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Journal of Research and Practice in Information
Technology, Australian Computer Society, 38(1), pp. 57-67, 2006.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Comparison of Security Patterns, IJCSNS International Journal of Computer
Science and Network Security, 6(2B), pp. 139-146, February 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Development of
Web Services Security Systems, International Journal of Web
Engineering and Technology (IJWET), 2(4), pp. 292-306, lnderscience
Publishers, 2006.
Rosado, G., Gutiérrez, C., Fernández-Medina, E., & Piattini, Security Patterns
and Security Requirements for Web Services, Internet Research, 16 (5), pp. 519-536,
November/December 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security Requirement
Elicitation, IEICE Transactions on Information and Systems, September 2007.
Full list of publications
Spanish and Latin American Journals
Gutiérrez, C., Fernández-Medina, E., & Piattini M., PWSSEC: Proceso de Desarrollo
para Seguridad de Servicios Web, IEEE América Latina (Special Edition JISBD 2005),
Vol. 4, April 2006.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E.,
& Piattini, M., Una Visión General sobre Patrones de
Seguridad, Revista del Círculo de Usuarios de Oracle,
pp.3-I5, February 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Federación de
dominios de confianza mediante servicios web, eSecurity European Security,
N°2, pp. 70-75, November 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Applying Security
Standards in Web Services, e.Security European Security (european edition)
N°1, pp. 54-57, October 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Aplicación de Estándares de Seguridad en Servicios Web,
e.Security European Security, N°1, pp. 62-65, September 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Seguridad en servicios
Web. Revista del Círculo de Usuarios de Oracle, May 2004.
Full list of publications
International Edited Books
Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2010): Web Services
Security: theoretical and practical issues, IGI Global (USA). January 2010.
Full list of publications
Chapter books
C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez,
D.G. Rosado, E. Fernández-Medina, M. Piattini (2011):
Security over the Information Systems Development
Cycle. In “Software Engineering for Secure Systems:
Industrial and Research Perspectives”. Haralambos
Mouratidis (Eds.). IGI Global (United States).
C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez,
D.G. Rosado, J. Lasheras, A. Toval, J. Trujillo,
E. Fernández-Medina, M. Piattini (2009):
Seguridad en Ingeniería del Software.
Editorial Ra-Ma (Spain).
Gutierrez, C., Fernandez-Medina, E., Piattini, M.
(2005): Web Services Security. Chapter 2 in the
book “Information and Web Security”, Bhavani
M. Thuraisingham, Elena Ferrari (Eds.), Idea Group
Publishing (United States) (FIRST CHAPTER OF
THIS BOOK WAS AUTHORED BY SIR. TIM
BERNERS-LEE)
Full list of publications
Technical Report
Gutiérrez, C., Fernández-Medina, E., & Piattini, Seguridad en Servicios
Web. Informe Técnico UCLM DIAB-05-01-2. Departamento de
Informática, Universidad de Castilla-La Mancha. January 2005. 386 pages.

Mais conteúdo relacionado

Semelhante a Publications of Carlos A. Gutierrez - January 2011

list of references.docx
list of references.docxlist of references.docx
list of references.docxSami Siddiqui
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...pijans
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanDeris Stiawan
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)aciijournal
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)IJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyAIRCC Publishing Corporation
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 

Semelhante a Publications of Carlos A. Gutierrez - January 2011 (20)

Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
list of references.docx
list of references.docxlist of references.docx
list of references.docx
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang Kesehatan
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Publications of Carlos A. Gutierrez - January 2011

  • 1. FULL LIST OF PUBLICATIONS by Carlos A. Gutiérrez List updated: January 2011
  • 2. Full list of publications • International Conferences • Spanish and Latin American Conferences • International Journals • Spanish and Latin American Journals • International Edited Books • Book Chapters • Technical Reports
  • 3. Full list of publications International Conferences (1/2) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the problem solved? Proceedings of the 2nd. International Workshop on Security In Information Systems, WOSlS 2004 joined with ICEIS 2004, INSTICC Press, Oporto (Portugal), April 2004, pp. 293-304. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Survey of Web Services Security. Proceedings of the Workshop on Internet Communications Security 2004 (WICS 2004), joined with 2004 International Conference on Computational Science and lts Appllcations (ICCSA 2004), May 14-17, Assisi (PG) Italy, Springer-Verlag, LNCS 3043, ISBN 3-540-22054-2, pp. 969-977. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Considerations in Web Services Security. Proceedings of the International Symposium on Web Services & Applications (ISWS’04), Las Vegas, Nevada (US), CSREA Press, ISBN 1-932415- 45-9, pp. 99-105. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for Web Services Security, Proceedings of fhe 2nd. International Workshop on Security In Information Systems, WOSlS 2005 joined with ICEIS 2005, INSTICC Press, ISBN 972-8865-25-2, May 2005, Miami (US). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Requirements for Web Services based on SIREN, Symposium on Requirements Engineering for Information Security (SREIS) joined with RE 05 - l3th IEEE International Requirements Engineering Conference, August 2005, Paris (France). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web services-based Security requirement elicitation, lst. International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements (SOCCER’OS) joined with RE 05 - l3th IEEE International Requirements Engineer
  • 4. Full list of publications International Conferences (2/2) Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Study of Security Architectural Patterns, The First International Conference on Availability, Reliability and Security (ARES’06), pp.3S8-36S, IEEE Computer Society, ISBN 0-7695-2567-9, 20-22 April 2006, Vienna (Austria). Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Patterns related to Security Requirements, 3rd International Workshop on Security in Information Systems (WOSIS 2006) joined with ICEIS 2005, INSTICC Press., May 2006, Paphos (Cyprus). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Risk Analysis in Web Services Systems, International Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press., pp. 425-430, ISBN-972-8865-63-5. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Viewpoints for Security Architectural Patterns, International Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press, pp. 419-424, ISBN-972-8865-63-5. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Security Architectural Patterns based on Viewpoints, 2007 International Conference on Computational Science and Its Applications (ICCSA 2007), Kuala Lumpur, Malaysia, August 2007, LNCS 4707/2007, pp. 262-272.
  • 5. Full list of publications Spanish and Latin American Conferences (I/2) Lecture on the State of the Art on Web Services Security, October 2004, Zaragoza (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Estado del Arte en Federación mediante Servicios Web, Primer Taller de Seguridad en Ingeniería del Software y Bases de Datos (SISBD’04), pp. 21-32, 9 de November, Málaga (Spain) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., PWSSEC: Proceso de Desarrollo para Seguridad de Servicios Web, X Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2005) joined with the I Congreso Español de Informática 2005. (CEDI’2005), pp. 203-210, 13-14 September, Granada (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Desarrollo de sistemas basados en servicios web seguros, Jornadas Científico-Técnicas en Servicios Web (JSWEB 2005) joined with the I Congreso Español de Informática 2005 (CEDI’2005), pp. 141- 149, 13-14 September, Granada (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Patrones de Seguridad conforme a los Requisitos de Seguridad para Servicios Web, IX Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2006), pp. 501-514, 7-9 September, Barcelona (Spain).
  • 6. Full list of publications Spanish and Latin American Conferences (2/2) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Elicitación de Requisitos de Seguridad para Servicios Web en PWSSec, 3er. Congreso Iberoamericano de Seguridad Informática — CIBSI 2005, pp. 385-400, 21-25 November 2005, Valparaíso (Chile). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparación de Patrones de Seguridad para el desarrollo de Sistemas Seguros, IV Congreso Internacional de Auditoría y Seguridad de la Información – CIASI 2005, 14-16 December 2005, Madrid (Spain). Rosado, G. D., Gutiérrez, C., & Fernández-Medina, E., The practical application of a process for eliciting and designing security in web service systems XV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2010), pp. 143, 7-10 September, Valencia(Spain).
  • 7. Full list of publications International Journals Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the problem solved?, Information Systems Security, 13 (3), pp. 23-31, July/August 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for Web Services Security, Journal of Research and Practice in Information Technology, Australian Computer Society, 38(1), pp. 57-67, 2006. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparison of Security Patterns, IJCSNS International Journal of Computer Science and Network Security, 6(2B), pp. 139-146, February 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Development of Web Services Security Systems, International Journal of Web Engineering and Technology (IJWET), 2(4), pp. 292-306, lnderscience Publishers, 2006. Rosado, G., Gutiérrez, C., Fernández-Medina, E., & Piattini, Security Patterns and Security Requirements for Web Services, Internet Research, 16 (5), pp. 519-536, November/December 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security Requirement Elicitation, IEICE Transactions on Information and Systems, September 2007.
  • 8. Full list of publications Spanish and Latin American Journals Gutiérrez, C., Fernández-Medina, E., & Piattini M., PWSSEC: Proceso de Desarrollo para Seguridad de Servicios Web, IEEE América Latina (Special Edition JISBD 2005), Vol. 4, April 2006. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Una Visión General sobre Patrones de Seguridad, Revista del Círculo de Usuarios de Oracle, pp.3-I5, February 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Federación de dominios de confianza mediante servicios web, eSecurity European Security, N°2, pp. 70-75, November 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Applying Security Standards in Web Services, e.Security European Security (european edition) N°1, pp. 54-57, October 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Aplicación de Estándares de Seguridad en Servicios Web, e.Security European Security, N°1, pp. 62-65, September 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Seguridad en servicios Web. Revista del Círculo de Usuarios de Oracle, May 2004.
  • 9. Full list of publications International Edited Books Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2010): Web Services Security: theoretical and practical issues, IGI Global (USA). January 2010.
  • 10. Full list of publications Chapter books C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez, D.G. Rosado, E. Fernández-Medina, M. Piattini (2011): Security over the Information Systems Development Cycle. In “Software Engineering for Secure Systems: Industrial and Research Perspectives”. Haralambos Mouratidis (Eds.). IGI Global (United States). C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez, D.G. Rosado, J. Lasheras, A. Toval, J. Trujillo, E. Fernández-Medina, M. Piattini (2009): Seguridad en Ingeniería del Software. Editorial Ra-Ma (Spain). Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2005): Web Services Security. Chapter 2 in the book “Information and Web Security”, Bhavani M. Thuraisingham, Elena Ferrari (Eds.), Idea Group Publishing (United States) (FIRST CHAPTER OF THIS BOOK WAS AUTHORED BY SIR. TIM BERNERS-LEE)
  • 11. Full list of publications Technical Report Gutiérrez, C., Fernández-Medina, E., & Piattini, Seguridad en Servicios Web. Informe Técnico UCLM DIAB-05-01-2. Departamento de Informática, Universidad de Castilla-La Mancha. January 2005. 386 pages.