SlideShare une entreprise Scribd logo
1  sur  11
FULL LIST OF
PUBLICATIONS
by Carlos A. Gutiérrez
List updated: January 2011
Full list of publications
• International Conferences
• Spanish and Latin American Conferences
• International Journals
• Spanish and Latin American Journals
• International Edited Books
• Book Chapters
• Technical Reports
Full list of publications
International Conferences (1/2)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is
the problem solved? Proceedings of the 2nd. International Workshop on
Security In Information Systems, WOSlS 2004 joined with ICEIS 2004,
INSTICC Press, Oporto (Portugal), April 2004, pp. 293-304.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Survey of Web Services
Security. Proceedings of the Workshop on Internet Communications
Security 2004 (WICS 2004), joined with 2004 International Conference on Computational
Science and lts Appllcations (ICCSA 2004), May 14-17, Assisi (PG) Italy, Springer-Verlag,
LNCS 3043, ISBN 3-540-22054-2, pp. 969-977.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Considerations in Web Services
Security. Proceedings of the International Symposium on Web Services
& Applications (ISWS’04), Las Vegas, Nevada (US), CSREA Press,
ISBN 1-932415- 45-9, pp. 99-105.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Proceedings of fhe 2nd. International Workshop on Security In
Information Systems, WOSlS 2005 joined with ICEIS 2005, INSTICC Press,
ISBN 972-8865-25-2, May 2005, Miami (US).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Requirements for Web
Services based on SIREN, Symposium on Requirements Engineering for Information
Security (SREIS) joined with RE 05 - l3th IEEE International Requirements Engineering Conference,
August 2005, Paris (France).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web services-based Security requirement
elicitation, lst. International Workshop on Service-Oriented Computing: Consequences for Engineering
Requirements (SOCCER’OS) joined with RE 05 - l3th IEEE International Requirements Engineer
Full list of publications
International Conferences (2/2)
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Study of
Security Architectural Patterns, The First International Conference on Availability, Reliability
and Security (ARES’06), pp.3S8-36S, IEEE Computer Society, ISBN 0-7695-2567-9,
20-22 April 2006, Vienna (Austria).
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security
Patterns related to Security Requirements, 3rd International Workshop on Security in
Information Systems (WOSIS 2006) joined with ICEIS 2005, INSTICC Press.,
May 2006, Paphos (Cyprus).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Risk Analysis in
Web Services Systems, International Conference on Security and Cryptography
(SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press.,
pp. 425-430, ISBN-972-8865-63-5.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Defining Viewpoints for Security Architectural Patterns, International
Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal),
August 2006, INSTICC Press, pp. 419-424, ISBN-972-8865-63-5.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Security Architectural
Patterns based on Viewpoints, 2007 International Conference on Computational Science and Its Applications
(ICCSA 2007), Kuala Lumpur, Malaysia, August 2007, LNCS 4707/2007, pp. 262-272.
Full list of publications
Spanish and Latin American Conferences (I/2)
Lecture on the State of the Art on Web Services Security,
October 2004, Zaragoza (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Estado del Arte en
Federación mediante Servicios Web, Primer Taller de Seguridad en
Ingeniería del Software y Bases de Datos (SISBD’04), pp. 21-32, 9 de
November, Málaga (Spain)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., PWSSEC: Proceso
de Desarrollo para Seguridad de Servicios Web, X Jornadas de Ingeniería
del Software y Bases de Datos (JISBD 2005) joined with the I Congreso
Español de Informática 2005. (CEDI’2005), pp. 203-210,
13-14 September, Granada (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Desarrollo de
sistemas basados en servicios web seguros, Jornadas Científico-Técnicas
en Servicios Web (JSWEB 2005) joined with the I Congreso Español de
Informática 2005 (CEDI’2005), pp. 141- 149, 13-14 September, Granada (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Patrones de Seguridad
conforme a los Requisitos de Seguridad para Servicios Web, IX
Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2006),
pp. 501-514, 7-9 September, Barcelona (Spain).
Full list of publications
Spanish and Latin American Conferences (2/2)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Elicitación
de Requisitos de Seguridad para Servicios Web en PWSSec,
3er. Congreso Iberoamericano de Seguridad Informática
— CIBSI 2005, pp. 385-400, 21-25 November 2005, Valparaíso (Chile).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparación
de Patrones de Seguridad para el desarrollo de Sistemas
Seguros, IV Congreso Internacional de Auditoría y Seguridad
de la Información – CIASI 2005, 14-16 December 2005, Madrid (Spain).
Rosado, G. D., Gutiérrez, C., & Fernández-Medina, E., The practical
application of a process for eliciting and designing security in
web service systems XV Jornadas de Ingeniería del Software
y Bases de Datos (JISBD 2010), pp. 143, 7-10 September, Valencia(Spain).
Full list of publications
International Journals
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the
problem solved?, Information Systems Security, 13 (3), pp. 23-31, July/August 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Journal of Research and Practice in Information
Technology, Australian Computer Society, 38(1), pp. 57-67, 2006.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Comparison of Security Patterns, IJCSNS International Journal of Computer
Science and Network Security, 6(2B), pp. 139-146, February 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Development of
Web Services Security Systems, International Journal of Web
Engineering and Technology (IJWET), 2(4), pp. 292-306, lnderscience
Publishers, 2006.
Rosado, G., Gutiérrez, C., Fernández-Medina, E., & Piattini, Security Patterns
and Security Requirements for Web Services, Internet Research, 16 (5), pp. 519-536,
November/December 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security Requirement
Elicitation, IEICE Transactions on Information and Systems, September 2007.
Full list of publications
Spanish and Latin American Journals
Gutiérrez, C., Fernández-Medina, E., & Piattini M., PWSSEC: Proceso de Desarrollo
para Seguridad de Servicios Web, IEEE América Latina (Special Edition JISBD 2005),
Vol. 4, April 2006.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E.,
& Piattini, M., Una Visión General sobre Patrones de
Seguridad, Revista del Círculo de Usuarios de Oracle,
pp.3-I5, February 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Federación de
dominios de confianza mediante servicios web, eSecurity European Security,
N°2, pp. 70-75, November 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Applying Security
Standards in Web Services, e.Security European Security (european edition)
N°1, pp. 54-57, October 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Aplicación de Estándares de Seguridad en Servicios Web,
e.Security European Security, N°1, pp. 62-65, September 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Seguridad en servicios
Web. Revista del Círculo de Usuarios de Oracle, May 2004.
Full list of publications
International Edited Books
Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2010): Web Services
Security: theoretical and practical issues, IGI Global (USA). January 2010.
Full list of publications
Chapter books
C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez,
D.G. Rosado, E. Fernández-Medina, M. Piattini (2011):
Security over the Information Systems Development
Cycle. In “Software Engineering for Secure Systems:
Industrial and Research Perspectives”. Haralambos
Mouratidis (Eds.). IGI Global (United States).
C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez,
D.G. Rosado, J. Lasheras, A. Toval, J. Trujillo,
E. Fernández-Medina, M. Piattini (2009):
Seguridad en Ingeniería del Software.
Editorial Ra-Ma (Spain).
Gutierrez, C., Fernandez-Medina, E., Piattini, M.
(2005): Web Services Security. Chapter 2 in the
book “Information and Web Security”, Bhavani
M. Thuraisingham, Elena Ferrari (Eds.), Idea Group
Publishing (United States) (FIRST CHAPTER OF
THIS BOOK WAS AUTHORED BY SIR. TIM
BERNERS-LEE)
Full list of publications
Technical Report
Gutiérrez, C., Fernández-Medina, E., & Piattini, Seguridad en Servicios
Web. Informe Técnico UCLM DIAB-05-01-2. Departamento de
Informática, Universidad de Castilla-La Mancha. January 2005. 386 pages.

Contenu connexe

Similaire à Publications of Carlos A. Gutierrez - January 2011

list of references.docx
list of references.docxlist of references.docx
list of references.docxSami Siddiqui
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...pijans
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanDeris Stiawan
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)aciijournal
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)IJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyAIRCC Publishing Corporation
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 

Similaire à Publications of Carlos A. Gutierrez - January 2011 (20)

Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
list of references.docx
list of references.docxlist of references.docx
list of references.docx
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang Kesehatan
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 

Dernier

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Publications of Carlos A. Gutierrez - January 2011

  • 1. FULL LIST OF PUBLICATIONS by Carlos A. Gutiérrez List updated: January 2011
  • 2. Full list of publications • International Conferences • Spanish and Latin American Conferences • International Journals • Spanish and Latin American Journals • International Edited Books • Book Chapters • Technical Reports
  • 3. Full list of publications International Conferences (1/2) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the problem solved? Proceedings of the 2nd. International Workshop on Security In Information Systems, WOSlS 2004 joined with ICEIS 2004, INSTICC Press, Oporto (Portugal), April 2004, pp. 293-304. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Survey of Web Services Security. Proceedings of the Workshop on Internet Communications Security 2004 (WICS 2004), joined with 2004 International Conference on Computational Science and lts Appllcations (ICCSA 2004), May 14-17, Assisi (PG) Italy, Springer-Verlag, LNCS 3043, ISBN 3-540-22054-2, pp. 969-977. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Considerations in Web Services Security. Proceedings of the International Symposium on Web Services & Applications (ISWS’04), Las Vegas, Nevada (US), CSREA Press, ISBN 1-932415- 45-9, pp. 99-105. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for Web Services Security, Proceedings of fhe 2nd. International Workshop on Security In Information Systems, WOSlS 2005 joined with ICEIS 2005, INSTICC Press, ISBN 972-8865-25-2, May 2005, Miami (US). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Requirements for Web Services based on SIREN, Symposium on Requirements Engineering for Information Security (SREIS) joined with RE 05 - l3th IEEE International Requirements Engineering Conference, August 2005, Paris (France). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web services-based Security requirement elicitation, lst. International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements (SOCCER’OS) joined with RE 05 - l3th IEEE International Requirements Engineer
  • 4. Full list of publications International Conferences (2/2) Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Study of Security Architectural Patterns, The First International Conference on Availability, Reliability and Security (ARES’06), pp.3S8-36S, IEEE Computer Society, ISBN 0-7695-2567-9, 20-22 April 2006, Vienna (Austria). Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Patterns related to Security Requirements, 3rd International Workshop on Security in Information Systems (WOSIS 2006) joined with ICEIS 2005, INSTICC Press., May 2006, Paphos (Cyprus). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Risk Analysis in Web Services Systems, International Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press., pp. 425-430, ISBN-972-8865-63-5. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Viewpoints for Security Architectural Patterns, International Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press, pp. 419-424, ISBN-972-8865-63-5. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Security Architectural Patterns based on Viewpoints, 2007 International Conference on Computational Science and Its Applications (ICCSA 2007), Kuala Lumpur, Malaysia, August 2007, LNCS 4707/2007, pp. 262-272.
  • 5. Full list of publications Spanish and Latin American Conferences (I/2) Lecture on the State of the Art on Web Services Security, October 2004, Zaragoza (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Estado del Arte en Federación mediante Servicios Web, Primer Taller de Seguridad en Ingeniería del Software y Bases de Datos (SISBD’04), pp. 21-32, 9 de November, Málaga (Spain) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., PWSSEC: Proceso de Desarrollo para Seguridad de Servicios Web, X Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2005) joined with the I Congreso Español de Informática 2005. (CEDI’2005), pp. 203-210, 13-14 September, Granada (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Desarrollo de sistemas basados en servicios web seguros, Jornadas Científico-Técnicas en Servicios Web (JSWEB 2005) joined with the I Congreso Español de Informática 2005 (CEDI’2005), pp. 141- 149, 13-14 September, Granada (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Patrones de Seguridad conforme a los Requisitos de Seguridad para Servicios Web, IX Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2006), pp. 501-514, 7-9 September, Barcelona (Spain).
  • 6. Full list of publications Spanish and Latin American Conferences (2/2) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Elicitación de Requisitos de Seguridad para Servicios Web en PWSSec, 3er. Congreso Iberoamericano de Seguridad Informática — CIBSI 2005, pp. 385-400, 21-25 November 2005, Valparaíso (Chile). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparación de Patrones de Seguridad para el desarrollo de Sistemas Seguros, IV Congreso Internacional de Auditoría y Seguridad de la Información – CIASI 2005, 14-16 December 2005, Madrid (Spain). Rosado, G. D., Gutiérrez, C., & Fernández-Medina, E., The practical application of a process for eliciting and designing security in web service systems XV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2010), pp. 143, 7-10 September, Valencia(Spain).
  • 7. Full list of publications International Journals Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the problem solved?, Information Systems Security, 13 (3), pp. 23-31, July/August 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for Web Services Security, Journal of Research and Practice in Information Technology, Australian Computer Society, 38(1), pp. 57-67, 2006. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparison of Security Patterns, IJCSNS International Journal of Computer Science and Network Security, 6(2B), pp. 139-146, February 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Development of Web Services Security Systems, International Journal of Web Engineering and Technology (IJWET), 2(4), pp. 292-306, lnderscience Publishers, 2006. Rosado, G., Gutiérrez, C., Fernández-Medina, E., & Piattini, Security Patterns and Security Requirements for Web Services, Internet Research, 16 (5), pp. 519-536, November/December 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security Requirement Elicitation, IEICE Transactions on Information and Systems, September 2007.
  • 8. Full list of publications Spanish and Latin American Journals Gutiérrez, C., Fernández-Medina, E., & Piattini M., PWSSEC: Proceso de Desarrollo para Seguridad de Servicios Web, IEEE América Latina (Special Edition JISBD 2005), Vol. 4, April 2006. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Una Visión General sobre Patrones de Seguridad, Revista del Círculo de Usuarios de Oracle, pp.3-I5, February 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Federación de dominios de confianza mediante servicios web, eSecurity European Security, N°2, pp. 70-75, November 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Applying Security Standards in Web Services, e.Security European Security (european edition) N°1, pp. 54-57, October 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Aplicación de Estándares de Seguridad en Servicios Web, e.Security European Security, N°1, pp. 62-65, September 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Seguridad en servicios Web. Revista del Círculo de Usuarios de Oracle, May 2004.
  • 9. Full list of publications International Edited Books Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2010): Web Services Security: theoretical and practical issues, IGI Global (USA). January 2010.
  • 10. Full list of publications Chapter books C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez, D.G. Rosado, E. Fernández-Medina, M. Piattini (2011): Security over the Information Systems Development Cycle. In “Software Engineering for Secure Systems: Industrial and Research Perspectives”. Haralambos Mouratidis (Eds.). IGI Global (United States). C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez, D.G. Rosado, J. Lasheras, A. Toval, J. Trujillo, E. Fernández-Medina, M. Piattini (2009): Seguridad en Ingeniería del Software. Editorial Ra-Ma (Spain). Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2005): Web Services Security. Chapter 2 in the book “Information and Web Security”, Bhavani M. Thuraisingham, Elena Ferrari (Eds.), Idea Group Publishing (United States) (FIRST CHAPTER OF THIS BOOK WAS AUTHORED BY SIR. TIM BERNERS-LEE)
  • 11. Full list of publications Technical Report Gutiérrez, C., Fernández-Medina, E., & Piattini, Seguridad en Servicios Web. Informe Técnico UCLM DIAB-05-01-2. Departamento de Informática, Universidad de Castilla-La Mancha. January 2005. 386 pages.