Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Görgen, Daniel; Frey, Hannes; Hutter, Christian
Information Dissemination Based on the En-Passant Communication PatternPaul Müller; Reinhard Gotzhein; Jens B. Schmitt (Hrsg). Kommunikation in Verteilten Systemen KiVS 2005: 14. Fachtagung; Kaiserslautern, 28. Februar – 3. März 2005. Berlin: Springer 2005 S. 129 - 141
Fox, Jorge; Jürjens, Jan
Introducing Security Aspects with Model TransformationJerzy Rozenblit; Tim O’Neill; Jianfeng Peng (Hrsg). Proceedings of the 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems ECBS 2005: 4-7 April 2005; Greenbelt, Maryland. Los Alamitos, CA: IEEE Computer Society 2005 S. 543 - 549
Jürjens, Jan; Lehrhuber, Markus; Wimmel, Guido
Model-Based Design and Analysis of Permission-Based SecurityCarlo Ghezzi; Yuxi Fu; Shaoying Liu; Jim Woodcock (Hrsg). Proceeding of the 10th IEEE International Conference on Engineering of Complex Computer Systems ICECCS 2005: 16-20 June 2005; Shanghai, China. Los Alamitos, CA: IEEE Computer Society 2005 S. 224 - 233
Wagner, Stefan; Jürjens, Jan
Model-Based Identification of Fault-Prone ComponentsMario Dal Cin; Mohamed Kaâniche; András Pataricza (Hrsg). Dependable Computing - EDCC 5: 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005. Proceedings. Berlin: Springer 2005 S. 435 - 452
Jürjens, Jan
Model-based Security Engineering with UMLAlessandro Aldini; Roberto Gorrieri; Fabio Martinelli (Hrsg). Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures. Berlin: Springer 2005 S. 42 - 77
Botaschanjan, Jewgenij; Jürjens, Jan
MoDll: Modeling and Analyzing Time-ConstraintsJerzy Rozenblit; Tim O’Neill; Jianfeng Peng (Hrsg). Proceedings of the 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems ECBS 2005: 4-7 April 2005; Greenbelt, Maryland. Los Alamitos, CA: IEEE Computer Society 2005 S. 299 - 306
Frey, Hannes; Görgen, Daniel
Planar graph routing on geographical clustersAd Hoc Networks. Bd. 3. H. 5. Amsterdam: Elsevier 2005 S. 560 - 574
Zöbel, Dieter; Polock, David
Priority Inheritance Revisited. Towards the conformance of real-time protocolsTechnique et Science Informatiques. Bd. 24. H. 8. Paris: Edition Hermès 2005 S. 939 - 961
Jürjens, Jan
Return on Security Investment - TutorialInfotage. Starnberger See. 2005
Jürjens, Jan; Golesteanu, Catinca
Reverse EngineeringMünchen: Technische Universität München, Institut für Informatik 2005 S. 1 - 49