Institut für Softwaretechnik
FB 4: Informatik / Universität Koblenz
- 0261/287-2722
- 0261/287-2721
Jürjens, Jan
Modellbasiertes Sicherheits-Testen für Cloud-basierte ProzesseSoftware-QS-Tag 2015. 2015
Jürjens, Jan
Ökonomische Analyse von Sicherheitsmaßnahmen (Eingeladener Vortrag)Arbeitstreffen der Allianz für Sicherheit in der Wirtschaft e.V. 2015
Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.
Preserving Validity of Batch-Job Nets under Change at Run-TimeSheikh Iqbal Ahamed; Carl K. Chang; William Chu; Ivica Crnkovic; Pao-Ann Hsiung; Gang Huang; Jingwei Yang (Hrsg). Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference Workshops COMPSAC 2015: Volume 2; 1–5 July 2015; Taichung, Taiwan. Los Alamitos, CA: IEEE Computer Society 2015 S. 169 - 178
Bürger, Jens; Jürjens, Jan; Wenzel, Sven
Restoring security of evolving software models using graph transformationInternational Journal on Software Tools for Technology Transfer. Bd. 17. H. 3. Berlin: Springer 2015 S. 267 - 289
Bürger, Jens; Gärtner, Stefan; Ruhroth, Thomas et al.
Restoring Security of Long-Living Systems by Co-evolutionSheikh Iqbal Ahamed; Carl K. Chang; William Chu; Ivica Crnkovic; Pao-Ann Hsiung; Gang Huang; Jingwei Yang (Hrsg). Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference Workshops COMPSAC 2015: Volume 2; 1–5 July 2015; Taichung, Taiwan. Los Alamitos, CA: IEEE Computer Society 2015 S. 153 - 158
Jürjens, Jan
Secure Database DevelopmentEncyclopedia of Database Systems. Springer 2015 S. TBD
Jürjens, Jan
Security Certification in the Presence of Evolution: Models vs. Code; Keynote Speaker of SaFoMe 2014Carlos Canal;Akram Idani (Hrsg). Software Engineering and Formal Methods: SEFM 2014 Collocated Workshops: HOFM, SaFoMe, OpenCert, MoKMaSD, WS-FMDS, Grenoble, France, September 1-2, 2014, Revised Selected Papers. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2015 S. XIX - XX
Rahman, Md. Shamimur; Sadi, Muhammad Sheikh; Ahammed, Sakib et al.
Soft Error Tolerance using Horizontal-Vertical- Double-Bit Diagonal parity methodFelix Pasila;Yusak Tanoto;Resmana Lim;Murtiyanto Santoso;Nemuel Daniel Pah (Hrsg). Proceeding of the 2nd International Conference on Electrical Engineering and Infomation Communication Technology iCEEiC 2015: 21 - 23 May 2015; Jahangirnagar University, Savar, Dhaka, Bangladesh. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2015 S. 1 - 6
Rosado, David G.; Lammari, Nadira; Jürjens, Jan
Special Issue on Secure Information Systems EngineeringThe Computer Journal. Bd. 58. H. 10. Oxford: Oxford University Press 2015 S. 2193 - 2194
Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan
Supporting the Security Certification of Cloud-Computing- Infrastructures: Invited PaperFifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 10