際際滷

際際滷Share a Scribd company logo
FULL LIST OF
PUBLICATIONS
by Carlos A. Guti辿rrez
List updated: January 2011
Full list of publications
 International Conferences
 Spanish and Latin American Conferences
 International Journals
 Spanish and Latin American Journals
 International Edited Books
 Book Chapters
 Technical Reports
Full list of publications
International Conferences (1/2)
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web Services Security: is
the problem solved? Proceedings of the 2nd. International Workshop on
Security In Information Systems, WOSlS 2004 joined with ICEIS 2004,
INSTICC Press, Oporto (Portugal), April 2004, pp. 293-304.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., A Survey of Web Services
Security. Proceedings of the Workshop on Internet Communications
Security 2004 (WICS 2004), joined with 2004 International Conference on Computational
Science and lts Appllcations (ICCSA 2004), May 14-17, Assisi (PG) Italy, Springer-Verlag,
LNCS 3043, ISBN 3-540-22054-2, pp. 969-977.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Considerations in Web Services
Security. Proceedings of the International Symposium on Web Services
& Applications (ISWS04), Las Vegas, Nevada (US), CSREA Press,
ISBN 1-932415- 45-9, pp. 99-105.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Proceedings of fhe 2nd. International Workshop on Security In
Information Systems, WOSlS 2005 joined with ICEIS 2005, INSTICC Press,
ISBN 972-8865-25-2, May 2005, Miami (US).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Security Requirements for Web
Services based on SIREN, Symposium on Requirements Engineering for Information
Security (SREIS) joined with RE 05 - l3th IEEE International Requirements Engineering Conference,
August 2005, Paris (France).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web services-based Security requirement
elicitation, lst. International Workshop on Service-Oriented Computing: Consequences for Engineering
Requirements (SOCCEROS) joined with RE 05 - l3th IEEE International Requirements Engineer
Full list of publications
International Conferences (2/2)
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., A Study of
Security Architectural Patterns, The First International Conference on Availability, Reliability
and Security (ARES06), pp.3S8-36S, IEEE Computer Society, ISBN 0-7695-2567-9,
20-22 April 2006, Vienna (Austria).
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Security
Patterns related to Security Requirements, 3rd International Workshop on Security in
Information Systems (WOSIS 2006) joined with ICEIS 2005, INSTICC Press.,
May 2006, Paphos (Cyprus).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Security Risk Analysis in
Web Services Systems, International Conference on Security and Cryptography
(SECRYPT 2006), Set炭bal (Portugal), August 2006, INSTICC Press.,
pp. 425-430, ISBN-972-8865-63-5.
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M.,
Defining Viewpoints for Security Architectural Patterns, International
Conference on Security and Cryptography (SECRYPT 2006), Set炭bal (Portugal),
August 2006, INSTICC Press, pp. 419-424, ISBN-972-8865-63-5.
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Defining Security Architectural
Patterns based on Viewpoints, 2007 International Conference on Computational Science and Its Applications
(ICCSA 2007), Kuala Lumpur, Malaysia, August 2007, LNCS 4707/2007, pp. 262-272.
Full list of publications
Spanish and Latin American Conferences (I/2)
Lecture on the State of the Art on Web Services Security,
October 2004, Zaragoza (Spain).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Estado del Arte en
Federaci坦n mediante Servicios Web, Primer Taller de Seguridad en
Ingenier鱈a del Software y Bases de Datos (SISBD04), pp. 21-32, 9 de
November, M叩laga (Spain)
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., PWSSEC: Proceso
de Desarrollo para Seguridad de Servicios Web, X Jornadas de Ingenier鱈a
del Software y Bases de Datos (JISBD 2005) joined with the I Congreso
Espa単ol de Inform叩tica 2005. (CEDI2005), pp. 203-210,
13-14 September, Granada (Spain).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Desarrollo de
sistemas basados en servicios web seguros, Jornadas Cient鱈fico-T辿cnicas
en Servicios Web (JSWEB 2005) joined with the I Congreso Espa単ol de
Inform叩tica 2005 (CEDI2005), pp. 141- 149, 13-14 September, Granada (Spain).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Patrones de Seguridad
conforme a los Requisitos de Seguridad para Servicios Web, IX
Reuni坦n Espa単ola sobre Criptolog鱈a y Seguridad de la Informaci坦n (RECSI 2006),
pp. 501-514, 7-9 September, Barcelona (Spain).
Full list of publications
Spanish and Latin American Conferences (2/2)
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Elicitaci坦n
de Requisitos de Seguridad para Servicios Web en PWSSec,
3er. Congreso Iberoamericano de Seguridad Inform叩tica
 CIBSI 2005, pp. 385-400, 21-25 November 2005, Valpara鱈so (Chile).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Comparaci坦n
de Patrones de Seguridad para el desarrollo de Sistemas
Seguros, IV Congreso Internacional de Auditor鱈a y Seguridad
de la Informaci坦n  CIASI 2005, 14-16 December 2005, Madrid (Spain).
Rosado, G. D., Guti辿rrez, C., & Fern叩ndez-Medina, E., The practical
application of a process for eliciting and designing security in
web service systems XV Jornadas de Ingenier鱈a del Software
y Bases de Datos (JISBD 2010), pp. 143, 7-10 September, Valencia(Spain).
Full list of publications
International Journals
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web Services Security: is the
problem solved?, Information Systems Security, 13 (3), pp. 23-31, July/August 2004.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Journal of Research and Practice in Information
Technology, Australian Computer Society, 38(1), pp. 57-67, 2006.
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M.,
Comparison of Security Patterns, IJCSNS International Journal of Computer
Science and Network Security, 6(2B), pp. 139-146, February 2006.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Development of
Web Services Security Systems, International Journal of Web
Engineering and Technology (IJWET), 2(4), pp. 292-306, lnderscience
Publishers, 2006.
Rosado, G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, Security Patterns
and Security Requirements for Web Services, Internet Research, 16 (5), pp. 519-536,
November/December 2006.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web Services Security Requirement
Elicitation, IEICE Transactions on Information and Systems, September 2007.
Full list of publications
Spanish and Latin American Journals
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini M., PWSSEC: Proceso de Desarrollo
para Seguridad de Servicios Web, IEEE Am辿rica Latina (Special Edition JISBD 2005),
Vol. 4, April 2006.
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E.,
& Piattini, M., Una Visi坦n General sobre Patrones de
Seguridad, Revista del C鱈rculo de Usuarios de Oracle,
pp.3-I5, February 2006.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Federaci坦n de
dominios de confianza mediante servicios web, eSecurity European Security,
N属2, pp. 70-75, November 2004.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Applying Security
Standards in Web Services, e.Security European Security (european edition)
N属1, pp. 54-57, October 2004.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M.,
Aplicaci坦n de Est叩ndares de Seguridad en Servicios Web,
e.Security European Security, N属1, pp. 62-65, September 2004.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Seguridad en servicios
Web. Revista del C鱈rculo de Usuarios de Oracle, May 2004.
Full list of publications
International Edited Books
Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2010): Web Services
Security: theoretical and practical issues, IGI Global (USA). January 2010.
Full list of publications
Chapter books
C. Blanco, D. Mellado, C. Guti辿rrez, A. Rodr鱈guez,
D.G. Rosado, E. Fern叩ndez-Medina, M. Piattini (2011):
Security over the Information Systems Development
Cycle. In Software Engineering for Secure Systems:
Industrial and Research Perspectives. Haralambos
Mouratidis (Eds.). IGI Global (United States).
C. Blanco, D. Mellado, C. Guti辿rrez, A. Rodr鱈guez,
D.G. Rosado, J. Lasheras, A. Toval, J. Trujillo,
E. Fern叩ndez-Medina, M. Piattini (2009):
Seguridad en Ingenier鱈a del Software.
Editorial Ra-Ma (Spain).
Gutierrez, C., Fernandez-Medina, E., Piattini, M.
(2005): Web Services Security. Chapter 2 in the
book Information and Web Security, Bhavani
M. Thuraisingham, Elena Ferrari (Eds.), Idea Group
Publishing (United States) (FIRST CHAPTER OF
THIS BOOK WAS AUTHORED BY SIR. TIM
BERNERS-LEE)
Full list of publications
Technical Report
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, Seguridad en Servicios
Web. Informe T辿cnico UCLM DIAB-05-01-2. Departamento de
Inform叩tica, Universidad de Castilla-La Mancha. January 2005. 386 pages.

More Related Content

Similar to Publications of Carlos A. Gutierrez - January 2011 (20)

Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
Olivera Kotevska, Ph.D.
list of references.docx
list of references.docxlist of references.docx
list of references.docx
Sami Siddiqui
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
IJNSA Journal
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
newbie2019
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
pijans
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang Kesehatan
Deris Stiawan
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
CFP: 5th International Conference on IOT, Big Data and Security (IOTBS 2025)
CFP: 5th International Conference on IOT, Big Data and Security (IOTBS 2025)CFP: 5th International Conference on IOT, Big Data and Security (IOTBS 2025)
CFP: 5th International Conference on IOT, Big Data and Security (IOTBS 2025)
pijans
4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)
aciijournal
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
IJNSA Journal
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
IJNSA Journal
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
AIRCC Publishing Corporation
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
July 2024 - Top 10 Read Articles in Network Security and Its Applications
July 2024 - Top 10 Read Articles in Network Security and Its ApplicationsJuly 2024 - Top 10 Read Articles in Network Security and Its Applications
July 2024 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
list of references.docx
list of references.docxlist of references.docx
list of references.docx
Sami Siddiqui
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
IJNSA Journal
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
newbie2019
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
pijans
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang Kesehatan
Deris Stiawan
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
CFP: 5th International Conference on IOT, Big Data and Security (IOTBS 2025)
CFP: 5th International Conference on IOT, Big Data and Security (IOTBS 2025)CFP: 5th International Conference on IOT, Big Data and Security (IOTBS 2025)
CFP: 5th International Conference on IOT, Big Data and Security (IOTBS 2025)
pijans
4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)4th International Conference on NLP & Big Data (NLPD 2023)
4th International Conference on NLP & Big Data (NLPD 2023)
aciijournal
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
IJNSA Journal
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
IJNSA Journal
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
AIRCC Publishing Corporation
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
July 2024 - Top 10 Read Articles in Network Security and Its Applications
July 2024 - Top 10 Read Articles in Network Security and Its ApplicationsJuly 2024 - Top 10 Read Articles in Network Security and Its Applications
July 2024 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal

Recently uploaded (20)

Teaching Prompting and Prompt Sharing to End Users.pptx
Teaching Prompting and Prompt Sharing to End Users.pptxTeaching Prompting and Prompt Sharing to End Users.pptx
Teaching Prompting and Prompt Sharing to End Users.pptx
Michael Blumenthal (Microsoft MVP)
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev
EaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial KeyEaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial Key
kherorpacca127
Build with AI on Google Cloud Session #3
Build with AI on Google Cloud Session #3Build with AI on Google Cloud Session #3
Build with AI on Google Cloud Session #3
Margaret Maynard-Reid
ISOIEC 42001 AI Management System 際際滷s
ISOIEC 42001 AI Management System 際際滷sISOIEC 42001 AI Management System 際際滷s
ISOIEC 42001 AI Management System 際際滷s
GilangRamadhan884333
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial PresentationMIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND CTI
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
ThousandEyes
Temporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptxTemporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptx
Samir Sharma
Data-Driven Public Safety: Reliable Data When Every Second Counts
Data-Driven Public Safety: Reliable Data When Every Second CountsData-Driven Public Safety: Reliable Data When Every Second Counts
Data-Driven Public Safety: Reliable Data When Every Second Counts
Safe Software
AI Trends and Fun Demos Sothebys Rehoboth Presentation
AI Trends and Fun Demos  Sothebys Rehoboth PresentationAI Trends and Fun Demos  Sothebys Rehoboth Presentation
AI Trends and Fun Demos Sothebys Rehoboth Presentation
Ethan Holland
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meterWebinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
DanBrown980551
Q4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor PresentationQ4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor Presentation
Dropbox
Caching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory DatastoreCaching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory Datastore
ScyllaDB
UiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and OpportunitiesUiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and Opportunities
DianaGray10
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
Caching for Performance Masterclass: Caching at Scale
Caching for Performance Masterclass: Caching at ScaleCaching for Performance Masterclass: Caching at Scale
Caching for Performance Masterclass: Caching at Scale
ScyllaDB
Blockchain for Businesses Practical Use Cases & Benefits.pdf
Blockchain for Businesses Practical Use Cases & Benefits.pdfBlockchain for Businesses Practical Use Cases & Benefits.pdf
Blockchain for Businesses Practical Use Cases & Benefits.pdf
Yodaplus Technologies Private Limited
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptxUnderstanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
shyamraj55
UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10
10 FinTech Solutions Every Business Should Know!.pdf
10 FinTech Solutions Every Business Should Know!.pdf10 FinTech Solutions Every Business Should Know!.pdf
10 FinTech Solutions Every Business Should Know!.pdf
Yodaplus Technologies Private Limited
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev
EaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial KeyEaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial Key
kherorpacca127
Build with AI on Google Cloud Session #3
Build with AI on Google Cloud Session #3Build with AI on Google Cloud Session #3
Build with AI on Google Cloud Session #3
Margaret Maynard-Reid
ISOIEC 42001 AI Management System 際際滷s
ISOIEC 42001 AI Management System 際際滷sISOIEC 42001 AI Management System 際際滷s
ISOIEC 42001 AI Management System 際際滷s
GilangRamadhan884333
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial PresentationMIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND CTI
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
ThousandEyes
Temporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptxTemporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptx
Samir Sharma
Data-Driven Public Safety: Reliable Data When Every Second Counts
Data-Driven Public Safety: Reliable Data When Every Second CountsData-Driven Public Safety: Reliable Data When Every Second Counts
Data-Driven Public Safety: Reliable Data When Every Second Counts
Safe Software
AI Trends and Fun Demos Sothebys Rehoboth Presentation
AI Trends and Fun Demos  Sothebys Rehoboth PresentationAI Trends and Fun Demos  Sothebys Rehoboth Presentation
AI Trends and Fun Demos Sothebys Rehoboth Presentation
Ethan Holland
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meterWebinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
DanBrown980551
Q4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor PresentationQ4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor Presentation
Dropbox
Caching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory DatastoreCaching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory Datastore
ScyllaDB
UiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and OpportunitiesUiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and Opportunities
DianaGray10
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
Caching for Performance Masterclass: Caching at Scale
Caching for Performance Masterclass: Caching at ScaleCaching for Performance Masterclass: Caching at Scale
Caching for Performance Masterclass: Caching at Scale
ScyllaDB
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptxUnderstanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
shyamraj55
UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10

Publications of Carlos A. Gutierrez - January 2011

  • 1. FULL LIST OF PUBLICATIONS by Carlos A. Guti辿rrez List updated: January 2011
  • 2. Full list of publications International Conferences Spanish and Latin American Conferences International Journals Spanish and Latin American Journals International Edited Books Book Chapters Technical Reports
  • 3. Full list of publications International Conferences (1/2) Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web Services Security: is the problem solved? Proceedings of the 2nd. International Workshop on Security In Information Systems, WOSlS 2004 joined with ICEIS 2004, INSTICC Press, Oporto (Portugal), April 2004, pp. 293-304. Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., A Survey of Web Services Security. Proceedings of the Workshop on Internet Communications Security 2004 (WICS 2004), joined with 2004 International Conference on Computational Science and lts Appllcations (ICCSA 2004), May 14-17, Assisi (PG) Italy, Springer-Verlag, LNCS 3043, ISBN 3-540-22054-2, pp. 969-977. Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Considerations in Web Services Security. Proceedings of the International Symposium on Web Services & Applications (ISWS04), Las Vegas, Nevada (US), CSREA Press, ISBN 1-932415- 45-9, pp. 99-105. Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Towards a Process for Web Services Security, Proceedings of fhe 2nd. International Workshop on Security In Information Systems, WOSlS 2005 joined with ICEIS 2005, INSTICC Press, ISBN 972-8865-25-2, May 2005, Miami (US). Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Security Requirements for Web Services based on SIREN, Symposium on Requirements Engineering for Information Security (SREIS) joined with RE 05 - l3th IEEE International Requirements Engineering Conference, August 2005, Paris (France). Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web services-based Security requirement elicitation, lst. International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements (SOCCEROS) joined with RE 05 - l3th IEEE International Requirements Engineer
  • 4. Full list of publications International Conferences (2/2) Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., A Study of Security Architectural Patterns, The First International Conference on Availability, Reliability and Security (ARES06), pp.3S8-36S, IEEE Computer Society, ISBN 0-7695-2567-9, 20-22 April 2006, Vienna (Austria). Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Security Patterns related to Security Requirements, 3rd International Workshop on Security in Information Systems (WOSIS 2006) joined with ICEIS 2005, INSTICC Press., May 2006, Paphos (Cyprus). Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Security Risk Analysis in Web Services Systems, International Conference on Security and Cryptography (SECRYPT 2006), Set炭bal (Portugal), August 2006, INSTICC Press., pp. 425-430, ISBN-972-8865-63-5. Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Defining Viewpoints for Security Architectural Patterns, International Conference on Security and Cryptography (SECRYPT 2006), Set炭bal (Portugal), August 2006, INSTICC Press, pp. 419-424, ISBN-972-8865-63-5. Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Defining Security Architectural Patterns based on Viewpoints, 2007 International Conference on Computational Science and Its Applications (ICCSA 2007), Kuala Lumpur, Malaysia, August 2007, LNCS 4707/2007, pp. 262-272.
  • 5. Full list of publications Spanish and Latin American Conferences (I/2) Lecture on the State of the Art on Web Services Security, October 2004, Zaragoza (Spain). Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Estado del Arte en Federaci坦n mediante Servicios Web, Primer Taller de Seguridad en Ingenier鱈a del Software y Bases de Datos (SISBD04), pp. 21-32, 9 de November, M叩laga (Spain) Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., PWSSEC: Proceso de Desarrollo para Seguridad de Servicios Web, X Jornadas de Ingenier鱈a del Software y Bases de Datos (JISBD 2005) joined with the I Congreso Espa単ol de Inform叩tica 2005. (CEDI2005), pp. 203-210, 13-14 September, Granada (Spain). Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Desarrollo de sistemas basados en servicios web seguros, Jornadas Cient鱈fico-T辿cnicas en Servicios Web (JSWEB 2005) joined with the I Congreso Espa単ol de Inform叩tica 2005 (CEDI2005), pp. 141- 149, 13-14 September, Granada (Spain). Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Patrones de Seguridad conforme a los Requisitos de Seguridad para Servicios Web, IX Reuni坦n Espa単ola sobre Criptolog鱈a y Seguridad de la Informaci坦n (RECSI 2006), pp. 501-514, 7-9 September, Barcelona (Spain).
  • 6. Full list of publications Spanish and Latin American Conferences (2/2) Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Elicitaci坦n de Requisitos de Seguridad para Servicios Web en PWSSec, 3er. Congreso Iberoamericano de Seguridad Inform叩tica CIBSI 2005, pp. 385-400, 21-25 November 2005, Valpara鱈so (Chile). Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Comparaci坦n de Patrones de Seguridad para el desarrollo de Sistemas Seguros, IV Congreso Internacional de Auditor鱈a y Seguridad de la Informaci坦n CIASI 2005, 14-16 December 2005, Madrid (Spain). Rosado, G. D., Guti辿rrez, C., & Fern叩ndez-Medina, E., The practical application of a process for eliciting and designing security in web service systems XV Jornadas de Ingenier鱈a del Software y Bases de Datos (JISBD 2010), pp. 143, 7-10 September, Valencia(Spain).
  • 7. Full list of publications International Journals Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web Services Security: is the problem solved?, Information Systems Security, 13 (3), pp. 23-31, July/August 2004. Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Towards a Process for Web Services Security, Journal of Research and Practice in Information Technology, Australian Computer Society, 38(1), pp. 57-67, 2006. Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Comparison of Security Patterns, IJCSNS International Journal of Computer Science and Network Security, 6(2B), pp. 139-146, February 2006. Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Development of Web Services Security Systems, International Journal of Web Engineering and Technology (IJWET), 2(4), pp. 292-306, lnderscience Publishers, 2006. Rosado, G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, Security Patterns and Security Requirements for Web Services, Internet Research, 16 (5), pp. 519-536, November/December 2006. Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web Services Security Requirement Elicitation, IEICE Transactions on Information and Systems, September 2007.
  • 8. Full list of publications Spanish and Latin American Journals Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini M., PWSSEC: Proceso de Desarrollo para Seguridad de Servicios Web, IEEE Am辿rica Latina (Special Edition JISBD 2005), Vol. 4, April 2006. Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Una Visi坦n General sobre Patrones de Seguridad, Revista del C鱈rculo de Usuarios de Oracle, pp.3-I5, February 2006. Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Federaci坦n de dominios de confianza mediante servicios web, eSecurity European Security, N属2, pp. 70-75, November 2004. Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Applying Security Standards in Web Services, e.Security European Security (european edition) N属1, pp. 54-57, October 2004. Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Aplicaci坦n de Est叩ndares de Seguridad en Servicios Web, e.Security European Security, N属1, pp. 62-65, September 2004. Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Seguridad en servicios Web. Revista del C鱈rculo de Usuarios de Oracle, May 2004.
  • 9. Full list of publications International Edited Books Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2010): Web Services Security: theoretical and practical issues, IGI Global (USA). January 2010.
  • 10. Full list of publications Chapter books C. Blanco, D. Mellado, C. Guti辿rrez, A. Rodr鱈guez, D.G. Rosado, E. Fern叩ndez-Medina, M. Piattini (2011): Security over the Information Systems Development Cycle. In Software Engineering for Secure Systems: Industrial and Research Perspectives. Haralambos Mouratidis (Eds.). IGI Global (United States). C. Blanco, D. Mellado, C. Guti辿rrez, A. Rodr鱈guez, D.G. Rosado, J. Lasheras, A. Toval, J. Trujillo, E. Fern叩ndez-Medina, M. Piattini (2009): Seguridad en Ingenier鱈a del Software. Editorial Ra-Ma (Spain). Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2005): Web Services Security. Chapter 2 in the book Information and Web Security, Bhavani M. Thuraisingham, Elena Ferrari (Eds.), Idea Group Publishing (United States) (FIRST CHAPTER OF THIS BOOK WAS AUTHORED BY SIR. TIM BERNERS-LEE)
  • 11. Full list of publications Technical Report Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, Seguridad en Servicios Web. Informe T辿cnico UCLM DIAB-05-01-2. Departamento de Inform叩tica, Universidad de Castilla-La Mancha. January 2005. 386 pages.