SlideShare una empresa de Scribd logo
1 de 11
FULL LIST OF
PUBLICATIONS
by Carlos A. Gutiérrez
List updated: January 2011
Full list of publications
• International Conferences
• Spanish and Latin American Conferences
• International Journals
• Spanish and Latin American Journals
• International Edited Books
• Book Chapters
• Technical Reports
Full list of publications
International Conferences (1/2)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is
the problem solved? Proceedings of the 2nd. International Workshop on
Security In Information Systems, WOSlS 2004 joined with ICEIS 2004,
INSTICC Press, Oporto (Portugal), April 2004, pp. 293-304.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Survey of Web Services
Security. Proceedings of the Workshop on Internet Communications
Security 2004 (WICS 2004), joined with 2004 International Conference on Computational
Science and lts Appllcations (ICCSA 2004), May 14-17, Assisi (PG) Italy, Springer-Verlag,
LNCS 3043, ISBN 3-540-22054-2, pp. 969-977.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Considerations in Web Services
Security. Proceedings of the International Symposium on Web Services
& Applications (ISWS’04), Las Vegas, Nevada (US), CSREA Press,
ISBN 1-932415- 45-9, pp. 99-105.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Proceedings of fhe 2nd. International Workshop on Security In
Information Systems, WOSlS 2005 joined with ICEIS 2005, INSTICC Press,
ISBN 972-8865-25-2, May 2005, Miami (US).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Requirements for Web
Services based on SIREN, Symposium on Requirements Engineering for Information
Security (SREIS) joined with RE 05 - l3th IEEE International Requirements Engineering Conference,
August 2005, Paris (France).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web services-based Security requirement
elicitation, lst. International Workshop on Service-Oriented Computing: Consequences for Engineering
Requirements (SOCCER’OS) joined with RE 05 - l3th IEEE International Requirements Engineer
Full list of publications
International Conferences (2/2)
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Study of
Security Architectural Patterns, The First International Conference on Availability, Reliability
and Security (ARES’06), pp.3S8-36S, IEEE Computer Society, ISBN 0-7695-2567-9,
20-22 April 2006, Vienna (Austria).
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security
Patterns related to Security Requirements, 3rd International Workshop on Security in
Information Systems (WOSIS 2006) joined with ICEIS 2005, INSTICC Press.,
May 2006, Paphos (Cyprus).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Risk Analysis in
Web Services Systems, International Conference on Security and Cryptography
(SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press.,
pp. 425-430, ISBN-972-8865-63-5.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Defining Viewpoints for Security Architectural Patterns, International
Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal),
August 2006, INSTICC Press, pp. 419-424, ISBN-972-8865-63-5.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Security Architectural
Patterns based on Viewpoints, 2007 International Conference on Computational Science and Its Applications
(ICCSA 2007), Kuala Lumpur, Malaysia, August 2007, LNCS 4707/2007, pp. 262-272.
Full list of publications
Spanish and Latin American Conferences (I/2)
Lecture on the State of the Art on Web Services Security,
October 2004, Zaragoza (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Estado del Arte en
Federación mediante Servicios Web, Primer Taller de Seguridad en
Ingeniería del Software y Bases de Datos (SISBD’04), pp. 21-32, 9 de
November, Málaga (Spain)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., PWSSEC: Proceso
de Desarrollo para Seguridad de Servicios Web, X Jornadas de Ingeniería
del Software y Bases de Datos (JISBD 2005) joined with the I Congreso
Español de Informática 2005. (CEDI’2005), pp. 203-210,
13-14 September, Granada (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Desarrollo de
sistemas basados en servicios web seguros, Jornadas Científico-Técnicas
en Servicios Web (JSWEB 2005) joined with the I Congreso Español de
Informática 2005 (CEDI’2005), pp. 141- 149, 13-14 September, Granada (Spain).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Patrones de Seguridad
conforme a los Requisitos de Seguridad para Servicios Web, IX
Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2006),
pp. 501-514, 7-9 September, Barcelona (Spain).
Full list of publications
Spanish and Latin American Conferences (2/2)
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Elicitación
de Requisitos de Seguridad para Servicios Web en PWSSec,
3er. Congreso Iberoamericano de Seguridad Informática
— CIBSI 2005, pp. 385-400, 21-25 November 2005, Valparaíso (Chile).
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparación
de Patrones de Seguridad para el desarrollo de Sistemas
Seguros, IV Congreso Internacional de Auditoría y Seguridad
de la Información – CIASI 2005, 14-16 December 2005, Madrid (Spain).
Rosado, G. D., Gutiérrez, C., & Fernández-Medina, E., The practical
application of a process for eliciting and designing security in
web service systems XV Jornadas de Ingeniería del Software
y Bases de Datos (JISBD 2010), pp. 143, 7-10 September, Valencia(Spain).
Full list of publications
International Journals
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the
problem solved?, Information Systems Security, 13 (3), pp. 23-31, July/August 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Journal of Research and Practice in Information
Technology, Australian Computer Society, 38(1), pp. 57-67, 2006.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Comparison of Security Patterns, IJCSNS International Journal of Computer
Science and Network Security, 6(2B), pp. 139-146, February 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Development of
Web Services Security Systems, International Journal of Web
Engineering and Technology (IJWET), 2(4), pp. 292-306, lnderscience
Publishers, 2006.
Rosado, G., Gutiérrez, C., Fernández-Medina, E., & Piattini, Security Patterns
and Security Requirements for Web Services, Internet Research, 16 (5), pp. 519-536,
November/December 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security Requirement
Elicitation, IEICE Transactions on Information and Systems, September 2007.
Full list of publications
Spanish and Latin American Journals
Gutiérrez, C., Fernández-Medina, E., & Piattini M., PWSSEC: Proceso de Desarrollo
para Seguridad de Servicios Web, IEEE América Latina (Special Edition JISBD 2005),
Vol. 4, April 2006.
Rosado, David G., Gutiérrez, C., Fernández-Medina, E.,
& Piattini, M., Una Visión General sobre Patrones de
Seguridad, Revista del Círculo de Usuarios de Oracle,
pp.3-I5, February 2006.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Federación de
dominios de confianza mediante servicios web, eSecurity European Security,
N°2, pp. 70-75, November 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Applying Security
Standards in Web Services, e.Security European Security (european edition)
N°1, pp. 54-57, October 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M.,
Aplicación de Estándares de Seguridad en Servicios Web,
e.Security European Security, N°1, pp. 62-65, September 2004.
Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Seguridad en servicios
Web. Revista del Círculo de Usuarios de Oracle, May 2004.
Full list of publications
International Edited Books
Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2010): Web Services
Security: theoretical and practical issues, IGI Global (USA). January 2010.
Full list of publications
Chapter books
C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez,
D.G. Rosado, E. Fernández-Medina, M. Piattini (2011):
Security over the Information Systems Development
Cycle. In “Software Engineering for Secure Systems:
Industrial and Research Perspectives”. Haralambos
Mouratidis (Eds.). IGI Global (United States).
C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez,
D.G. Rosado, J. Lasheras, A. Toval, J. Trujillo,
E. Fernández-Medina, M. Piattini (2009):
Seguridad en Ingeniería del Software.
Editorial Ra-Ma (Spain).
Gutierrez, C., Fernandez-Medina, E., Piattini, M.
(2005): Web Services Security. Chapter 2 in the
book “Information and Web Security”, Bhavani
M. Thuraisingham, Elena Ferrari (Eds.), Idea Group
Publishing (United States) (FIRST CHAPTER OF
THIS BOOK WAS AUTHORED BY SIR. TIM
BERNERS-LEE)
Full list of publications
Technical Report
Gutiérrez, C., Fernández-Medina, E., & Piattini, Seguridad en Servicios
Web. Informe Técnico UCLM DIAB-05-01-2. Departamento de
Informática, Universidad de Castilla-La Mancha. January 2005. 386 pages.

Más contenido relacionado

Similar a Publications of Carlos A. Gutierrez - January 2011

list of references.docx
list of references.docxlist of references.docx
list of references.docxSami Siddiqui
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...pijans
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanDeris Stiawan
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)aciijournal
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)IJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyAIRCC Publishing Corporation
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 

Similar a Publications of Carlos A. Gutierrez - January 2011 (20)

Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
list of references.docx
list of references.docxlist of references.docx
list of references.docx
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang Kesehatan
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 

Último

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 

Último (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Publications of Carlos A. Gutierrez - January 2011

  • 1. FULL LIST OF PUBLICATIONS by Carlos A. Gutiérrez List updated: January 2011
  • 2. Full list of publications • International Conferences • Spanish and Latin American Conferences • International Journals • Spanish and Latin American Journals • International Edited Books • Book Chapters • Technical Reports
  • 3. Full list of publications International Conferences (1/2) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the problem solved? Proceedings of the 2nd. International Workshop on Security In Information Systems, WOSlS 2004 joined with ICEIS 2004, INSTICC Press, Oporto (Portugal), April 2004, pp. 293-304. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Survey of Web Services Security. Proceedings of the Workshop on Internet Communications Security 2004 (WICS 2004), joined with 2004 International Conference on Computational Science and lts Appllcations (ICCSA 2004), May 14-17, Assisi (PG) Italy, Springer-Verlag, LNCS 3043, ISBN 3-540-22054-2, pp. 969-977. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Considerations in Web Services Security. Proceedings of the International Symposium on Web Services & Applications (ISWS’04), Las Vegas, Nevada (US), CSREA Press, ISBN 1-932415- 45-9, pp. 99-105. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for Web Services Security, Proceedings of fhe 2nd. International Workshop on Security In Information Systems, WOSlS 2005 joined with ICEIS 2005, INSTICC Press, ISBN 972-8865-25-2, May 2005, Miami (US). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Requirements for Web Services based on SIREN, Symposium on Requirements Engineering for Information Security (SREIS) joined with RE 05 - l3th IEEE International Requirements Engineering Conference, August 2005, Paris (France). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web services-based Security requirement elicitation, lst. International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements (SOCCER’OS) joined with RE 05 - l3th IEEE International Requirements Engineer
  • 4. Full list of publications International Conferences (2/2) Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., A Study of Security Architectural Patterns, The First International Conference on Availability, Reliability and Security (ARES’06), pp.3S8-36S, IEEE Computer Society, ISBN 0-7695-2567-9, 20-22 April 2006, Vienna (Austria). Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Patterns related to Security Requirements, 3rd International Workshop on Security in Information Systems (WOSIS 2006) joined with ICEIS 2005, INSTICC Press., May 2006, Paphos (Cyprus). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Security Risk Analysis in Web Services Systems, International Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press., pp. 425-430, ISBN-972-8865-63-5. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Viewpoints for Security Architectural Patterns, International Conference on Security and Cryptography (SECRYPT 2006), Setúbal (Portugal), August 2006, INSTICC Press, pp. 419-424, ISBN-972-8865-63-5. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Defining Security Architectural Patterns based on Viewpoints, 2007 International Conference on Computational Science and Its Applications (ICCSA 2007), Kuala Lumpur, Malaysia, August 2007, LNCS 4707/2007, pp. 262-272.
  • 5. Full list of publications Spanish and Latin American Conferences (I/2) Lecture on the State of the Art on Web Services Security, October 2004, Zaragoza (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Estado del Arte en Federación mediante Servicios Web, Primer Taller de Seguridad en Ingeniería del Software y Bases de Datos (SISBD’04), pp. 21-32, 9 de November, Málaga (Spain) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., PWSSEC: Proceso de Desarrollo para Seguridad de Servicios Web, X Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2005) joined with the I Congreso Español de Informática 2005. (CEDI’2005), pp. 203-210, 13-14 September, Granada (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Desarrollo de sistemas basados en servicios web seguros, Jornadas Científico-Técnicas en Servicios Web (JSWEB 2005) joined with the I Congreso Español de Informática 2005 (CEDI’2005), pp. 141- 149, 13-14 September, Granada (Spain). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Patrones de Seguridad conforme a los Requisitos de Seguridad para Servicios Web, IX Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2006), pp. 501-514, 7-9 September, Barcelona (Spain).
  • 6. Full list of publications Spanish and Latin American Conferences (2/2) Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Elicitación de Requisitos de Seguridad para Servicios Web en PWSSec, 3er. Congreso Iberoamericano de Seguridad Informática — CIBSI 2005, pp. 385-400, 21-25 November 2005, Valparaíso (Chile). Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparación de Patrones de Seguridad para el desarrollo de Sistemas Seguros, IV Congreso Internacional de Auditoría y Seguridad de la Información – CIASI 2005, 14-16 December 2005, Madrid (Spain). Rosado, G. D., Gutiérrez, C., & Fernández-Medina, E., The practical application of a process for eliciting and designing security in web service systems XV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2010), pp. 143, 7-10 September, Valencia(Spain).
  • 7. Full list of publications International Journals Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security: is the problem solved?, Information Systems Security, 13 (3), pp. 23-31, July/August 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Towards a Process for Web Services Security, Journal of Research and Practice in Information Technology, Australian Computer Society, 38(1), pp. 57-67, 2006. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Comparison of Security Patterns, IJCSNS International Journal of Computer Science and Network Security, 6(2B), pp. 139-146, February 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Development of Web Services Security Systems, International Journal of Web Engineering and Technology (IJWET), 2(4), pp. 292-306, lnderscience Publishers, 2006. Rosado, G., Gutiérrez, C., Fernández-Medina, E., & Piattini, Security Patterns and Security Requirements for Web Services, Internet Research, 16 (5), pp. 519-536, November/December 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Web Services Security Requirement Elicitation, IEICE Transactions on Information and Systems, September 2007.
  • 8. Full list of publications Spanish and Latin American Journals Gutiérrez, C., Fernández-Medina, E., & Piattini M., PWSSEC: Proceso de Desarrollo para Seguridad de Servicios Web, IEEE América Latina (Special Edition JISBD 2005), Vol. 4, April 2006. Rosado, David G., Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Una Visión General sobre Patrones de Seguridad, Revista del Círculo de Usuarios de Oracle, pp.3-I5, February 2006. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Federación de dominios de confianza mediante servicios web, eSecurity European Security, N°2, pp. 70-75, November 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Applying Security Standards in Web Services, e.Security European Security (european edition) N°1, pp. 54-57, October 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Aplicación de Estándares de Seguridad en Servicios Web, e.Security European Security, N°1, pp. 62-65, September 2004. Gutiérrez, C., Fernández-Medina, E., & Piattini, M., Seguridad en servicios Web. Revista del Círculo de Usuarios de Oracle, May 2004.
  • 9. Full list of publications International Edited Books Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2010): Web Services Security: theoretical and practical issues, IGI Global (USA). January 2010.
  • 10. Full list of publications Chapter books C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez, D.G. Rosado, E. Fernández-Medina, M. Piattini (2011): Security over the Information Systems Development Cycle. In “Software Engineering for Secure Systems: Industrial and Research Perspectives”. Haralambos Mouratidis (Eds.). IGI Global (United States). C. Blanco, D. Mellado, C. Gutiérrez, A. Rodríguez, D.G. Rosado, J. Lasheras, A. Toval, J. Trujillo, E. Fernández-Medina, M. Piattini (2009): Seguridad en Ingeniería del Software. Editorial Ra-Ma (Spain). Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2005): Web Services Security. Chapter 2 in the book “Information and Web Security”, Bhavani M. Thuraisingham, Elena Ferrari (Eds.), Idea Group Publishing (United States) (FIRST CHAPTER OF THIS BOOK WAS AUTHORED BY SIR. TIM BERNERS-LEE)
  • 11. Full list of publications Technical Report Gutiérrez, C., Fernández-Medina, E., & Piattini, Seguridad en Servicios Web. Informe Técnico UCLM DIAB-05-01-2. Departamento de Informática, Universidad de Castilla-La Mancha. January 2005. 386 pages.