Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
Ergebnisse pro Seite:  50

Wimmel, Guido; Jürjens, Jan

Specification-based Test Generation for Security-Critical Systems Using Mutations

Chris George;Huaikou Miao (Hrsg). Formal Methods and Software Engineering: 4th International Conference on Formal Engineering Methods, ICFEM 2002 Shanghai, China, October 21. - 25., 2002 Proceedings. Berlin: Springer 2002 S. 471 - 482 (Lecture Notes in Computer Science)


Wimmel, Guido; Jürjens, Jan

Specification-Based Test Generation for Security-Critical Systems Using Mutations.

ICFEM. 2002 S. 471 - 482


Wimmel, Guido; Popp, Gerhard; Jürjens, Jan

Towards Using Security Patterns in Model-based System Development

7th European Conference on Pattern Languages of Programs (EuroPLoP 2002). Kloster Irsee. 2002


Jürjens, Jan

UMLsec - Presenting the Profile: A Half-day tutorial

6th Annual Workshop on Distributed Objects and Components Security (DOCsec 2002). Baltimore, Maryland. 2002


Jürjens, Jan

UMLsec: Extending UML for Secure Systems Development

Jean-Marc Jézéquel;Heinrich Hussmann;Stephen Cook (Hrsg). ≪UML≫ 2002 - The Unified Modeling Language: Model Engineering, Concepts, and Tools 5th International Conference Dresden, Germany, September 30 – October 4, 2002 Proceedings. Berlin: Springer 2002 S. 412 - 425 (Lecture Notes in Computer Science)


Jürjens, Jan

UMLsec: Extending UML for Secure Systems Development.

UML. 2002 S. 412 - 425


Jürjens, Jan

Using UMLsec and goal trees for secure systems development.

SAC. 2002 S. 1026 - 1030


Jürjens, Jan

Using UMLsec and Goal-Trees for Secure Systems Development

Gary B. Lamont;Hisham Haddad;George Papadopoulos;Brajendra Panda (Hrsg). Proceedings of the ACM Symposium on Applied Computing SAC 2002: Madrid, Spain; March 11 - 14, 2002. New York, NY: ACM Association for Computing Machinery 2002 S. 1026 - 1030


Cengarle, Maria Victoria; Fernandez, Eduardo B.; Jürjens, Jan et al.

Workshop on Critical Systems Development with UML: CSDUML 2002; September 30, 2002 Dresden

München: Technische Universität München, Institut für Informatik 2002 (TU München Technical Report TUM-I0208)


Jürjens, Jan

Abstracting from Failure Probabilities

Antti Valmari;Alex Yakovlev (Hrsg). Proceedings of the Second International Conference on Application of Concurrency to System Design ACSD 2001: 25 - 29 June 2001; Newcastle upon Tyne, UK. Los Alamitos, CA: IEEE Computer Society 2001 S. 53 - 64


Jürjens, Jan

Abstracting from Failure Probabilities.

ACSD. 2001 S. 53


Jürjens, Jan

Composability of Secrecy

Vladimir I. Gorodetski;Victor A. Skormin;Leonard J. Popyack (Hrsg). Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings. Berlin: Springer 2001 S. 28 - 38 (Lecture Notes in Computer Science)


Jürjens, Jan

Composability of Secrecy.

MMM-ACNS. 2001 S. 28 - 38


Jürjens, Jan

Developing Secure Systems with UMLsec - From Business Processes to Implementation

Dirk Fox;Marit Köhntopp;Andreas Pfitzmann (Hrsg). Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen. Wiesbaden: Vieweg + Teubner 2001 S. 151 - 161 (DuD-Fachbeiträge)


Jürjens, Jan

Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion).

Security Protocols Workshop. 2001 S. 102 - 106


Jürjens, Jan

Encapsulating Rules of Prudent Security Engineering: (Transcript of Discussion)

Bruce Christianson;James A. Malcolm;Bruno Crispo;Michael Roe (Hrsg). Security Protocols: 9th International Workshop Cambridge, UK, April 25–27, 2001 Revised Papers. Berlin: Springer 2001 S. 102 - 106 (Lecture Notes in Computer Science)


Jürjens, Jan

Encapsulating Rules of Prudent Security Engineering.

Security Protocols Workshop. 2001 S. 95 - 101



Abadi, Martín; Jürjens, Jan

Formal Eavesdropping and Its Computational Interpretation

Naoki Kobayashi;Benjamin C. Pierce (Hrsg). Theoretical Aspects of Computer Software: 4th International Symposium, TACS 2001 Sendai, Japan, October 29–31, 2001 Proceedings. Berlin: Springer 2001 S. 82 - 94 (Lecture Notes in Computer Science)


Abadi, Martín; Jürjens, Jan

Formal Eavesdropping and Its Computational Interpretation.

TACS. 2001 S. 82 - 94


Wimmel, Guido; Jürjens, Jan

Formally Testing Fail-safety of Electronic Purse Protocols

Debra Richardson;Martin S. Feather;Michael Goedicke (Hrsg). Proceedings of the16th Annual International Conference on Automated Software Engineering ASE 2001: 26-29 November 2001; Loew’s Coronado Bay Resort, Coronado Island, San Diego, California. Los Alamitos, CA: IEEE Computer Society 2001 S. 408 - 411


Jürjens, Jan; Wimmel, Guido

Formally Testing Fail-Safety of Electronic Purse Protocols.

ASE. 2001 S. 408 - 411


Jürjens, Jan

Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC

Michel Dupuy;Pierre Paradinas (Hrsg). Trusted Information: The New Decade Challenge. Boston: Springer 2001 S. 93 - 107



Jürjens, Jan

On a problem of Gabriel and Ulmer

Journal of Pure and Applied Algebra. Bd. 158. H. 2-3. Amsterdam: Elsevier 2001 S. 183 - 196


Jürjens, Jan

Secrecy-preserving Refinement

José Nuno Oliveira;Pamela Zave (Hrsg). FME 2001: Formal Methods for Increasing Software Productivity: International Symposium of Formal Methods Europe Berlin, Germany, March 12–16, 2001 Proceedings. Berlin: Springer 2001 S. 135 - 152 (Lecture Notes in Computer Science)


Jürjens, Jan

Secrecy-Preserving Refinement.

FME. 2001 S. 135 - 152


Jürjens, Jan

Secure Java Development with UML.

Network Security. 2001 S. 107 - 124


Jürjens, Jan; Wimmel, Guido

Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications

Beat Schmid;Katarina Stanoevska-Slabeva;Volker Tschammer (Hrsg). Towards the E-Society: E-Commerce, E-Business, and E-Government The First IFIP Conference on E-Commerce, E-Business, E-Government I3E 2001: October 3-5, 2001; Zürich, Switzerland. New York: Kluwer Academic Publishers 2001 S. 489 - 505



Jürjens, Jan; Wimmel, Guido

Specification-Based Testing of Firewalls

Dines Bjørner;Manfred Broy;Alexandre V. Zamulin (Hrsg). Perspectives of System Informatics: 4th International Andrei Ershov Memorial Conference, PSI 2001 Akademgorodok, Novosibirsk, Russia, July 2–6, 2001 Revised Papers. Berlin: Springer 2001 S. 308 - 316 (Lecture Notes in Computer Science)


Jürjens, Jan; Wimmel, Guido

Specification-Based Testing of Firewalls.

Ershov Memorial Conference. 2001 S. 308 - 316


Jürjens, Jan

Towards Development of Secure Systems Using UMLsec

Heinrich Hussmann (Hrsg). Fundamental Approaches to Software Engineering: 4th International Conference, FASE 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genova, Italy, April 2–6, 2001 Proceedings. Berlin: Springer 2001 S. 187 - 200 (Lecture Notes in Computer Science)


Jürjens, Jan

Towards Development of Secure Systems Using UMLsec.

FASE. 2001 S. 187 - 200


Jürjens, Jan

Transformations for Introducing Patterns - A Secure Systems Case Study

Workshop on Transformations in UML (WTUML, ETAPS 2001 Satellite Event). Genova. 2001 S. 1 - 5


Jürjens, Jan

Bridging the gap: Formal vs. Complexity-Theoretical Reasoning about Cryptography

Dagstuhl Seminar Reports. Wadern: Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2000 S. 10


Jürjens, Jan

Secure Information Flow for Concurrent Processes

Catuscia Palamidessi (Hrsg). CONCUR 2000 - Concurrency Theory: 11th International Conference University Park, PA, USA, August 22–25, 2000 Proceedings. Berlin: Springer 2000 S. 395 - 409 (Lecture Notes in Computer Science)


Jürjens, Jan

Secure Information Flow for Concurrent Processes.

CONCUR. 2000 S. 395 - 409


Jürjens, Jan

Kleine Objekte in Kategorien von Algebren

Bremen: Universität Bremen 1998


Sadi, Muhammad Sheikh; Mizanur, Rahman Khan; Uddin, Md. Nazim et al.

An Efficient Approach towards Mitigating Soft Errors Risks

CoRR. S. 1 - 18


Wagner, Stefan; Jürjens, Jan; Koller, Claudia et al.

Comparing Bug Finding Tools with Reviews and Tests

CoRR. S. 1 - 16



Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution

CoRR. S. 1 - 29


Jürjens, Jan

Model-based Security-Engineering (Invited Lecture)

Eingeladener Vortrag in der Ringvorlesung ‘‘Standort Internet"Invited talk in the colloquium. Institut für Informatik und Gesellschaft, Abt. Telematik, Universität Freiburg, Nov. 2005 eingeladen vonon invitation of Prof. Dr. Günter Müller