References
1. Fernandez, E. B., and Yuan, X.: Semantic analysis patterns. In: Proceedings of 19th Inter-
national Conference on Conceptual Modeling, (2000) 183-195. Also available from:
http://www.cse.fau.edu/~ed/SAPpaper2.pdf
2. Fernandez, E. B., and Yuan, X.: An analysis pattern for reservation and use of entities. In:
Proceedings of the Pattern Languages of Programs Conference, PLoP99 (1999).
http://st-www.cs.uiuc.edu/~plop/plop99
3. Fernandez,E. B., Yuan, X., and Brey, S.: Analysis Patterns for the Order and Shipment of
a Product. In: Proceeding of the Pattern Languages of Programs Conference, PLoP00,
(2000). http://hillside.net/plop/2000/
4. Fernandez, E. B., and Yuan, X.: An Analysis Pattern for Repair of an Entity. In: Proceed-
ings of the Pattern Languages of Programs Conference, PLoP01 (2001).
http://jerry.cs.uiuc.edu/~plop/plop2001/accepted_submissions
5. Sorgente, T., and Fernandez, E. B.: Analysis patterns for patient treatment. In: Proceedings
of the Pattern Languages of Programs Conference, PLoP04 (2004).
http://jerry.cs.uiuc.edu/~plop/plop2004/accepted_submissions
6. Yuan, X., and Fernandez, E. B.: An analysis pattern for course management. In: Proceed-
ings of the Pattern Languages of Programs Conference, PLoP03 (2003).
http://hillside.net/europlop
7. Fowler, M.: Analysis patterns – Reusable object models, Addison-Wesley (1997).
8. Hamza, H. S. and Fayad, M. E.: The Negotiation Analysis Pattern. In: Proceedings of the
Pattern Languages of Programs Conference, PLoP04 (2004). http://hillside.net/plop/2004/
9. Fernandez, E. B.: A methodology for secure software design. In: Proceedings of the 2004
Intl. Symposium on Web Services and Applications, ISWS'04, Las Vegas, Nevada, 21-24
June 2004 (2004).
10. Fernandez, E. B., and Pan, R.: A Pattern Language for security models. In: Proceedings of
the Pattern Languages of Programs Conference, PLoP01 (2001).
http://jerry.cs.uiuc.edu/~plop/plop2001/accepted_submissions
11. Delessy-Gassant, N., Fernandez, E.B., Rajput, S., and Larrondo-Petrie, M. M: "Patterns for
application firewalls. In: Proceedings of the Pattern Languages of Programs Conference
(PLoP2004).
http://hillside.net/plop/2004/
12. Fernandez, E. B.: Layers and non-functional patterns. In: Proceedings of ChiliPLoP03,
Phoenix, Arizona, 10-15March 2003 (2003).
http://hillside.net/chiliplop/2003/
13. Larman, C.: Applying UML and Patterns: An Introduction to Object-Oriented Analysis
and Design and Iterative Development, 3rd edition, Prentice-Hall (2005).
14. Fernandez, E. B., and Hawkins, J. C.: Determining Role Rights from Use Cases. In: Pro-
ceedings of the 2nd ACM Workshop on Role-Based Access Control, ACM (1997) 121-125.
http://www.cse.fau.edu/~ed/RBAC.pdf
15. Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., and Stal, M.: Pattern-Oriented
Software Architecture: A System of Patterns, Vol. 1, Wiley (1996).
16. Koved, L., Nadalin, A., Nagarathan, N., Pistoia, M., and Schrader, T.: Security challenges
for Enterprise Java in an e-business environment. In: IBM Systems Journal, Vol. 40, No. 1,
(2001), 130-152.
17. Fernandez, E. B.: Coordination of security levels for Internet architectures. In: Proceedings
of the 10th International Workshop on Database and Expert Systems Applications (1999)
837-841.
http://www.cse.fau.edu/~ed/Coordinationsecurity4.pdf
18. Wood, C. Summers, R. C. and Fernandez, E. B.: Authorization in multilevel database
models. In: Information Systems, Vol. 4 (1979) 155-161.
215