Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
PDF | RTF
Ergebnisse pro Seite:  10

Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Extracting and verifying cryptographic models from C protocol code by symbolic execution

Yan Chen; George Danezis; Vitaly Shmatikov (Hrsg). Proceedings of the 18th ACM Conference on Computer and Communications Security CCS '11: October 17. - 21., 2011; Chicago, Illinois, USA. New York, NY: ACM Association for Computing Machinery 2011 S. 331 - 340


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.

Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols

Steve Kremer; Michael Backes; Steve Zdancewic; Jonathan Herzog (Hrsg). 24th IEEE Computer Security Foundations Symposium CSF 2011: 27-29 June, 2011; Cernay-la-Ville, France. Los Alamitos, CA: IEEE Computer Society 2011 S. 3 - 17


Jürjens, Jan; Marchal, Loïc; Ochoa, Martín et al.

Incremental Security Verification for Evolving UMLsec models

Robert B. France; Jochen M. Kuester; Behzad Bordbar; Richard F. Paige (Hrsg). Modelling Foundations and Applications: 7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings. Berlin: Springer 2011 S. 52 - 68


Shaikh Sadi, Muhammad; Uddin, Md. Nazim; Khan, Md. Mizanur Rahman et al.

Mitigating Soft Error Risks through Protecting Critical Variables and Blocks

Salah S. Al-Majeed;Chih-Lin Hu;Dhinaharan Nagamalai (Hrsg). Advances in Wireless, Mobile Networks and Applications: International Conferences, WiMoA 2011 and ICCSEA 2011, Dubai, United Arab Emirates, May 25-27, 2011. Proceedings. Berlin: Springer 2011 S. 137 - 145 (Communications in Computer and Information Science)


Fourneret, Elizabeta; Ochoa, Martin; Bouquet, Fabrice et al.

Model-Based Security Verification and Testing for Smart- cards

Günther Pernul; Juan-Carlos Trujillo Mondéjar; Edgar Weippl (Hrsg). Proceedings of the Sixth International Conference on Availability, Reliability and Security, ARES 2011: 22-26 August 2011; Vienna, Austria. Los Alamitos, CA: IEEE Computer Society 2011 S. 272 - 279


Jürjens, Jan; Ochoa, Martín; Schmidt, Holger et al.

Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications

Marco Bernardo; Valérie Issarny (Hrsg). Formal Methods for Eternal Networked Software Systems: 11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2011, Bertinoro, Italy, June 13-18, 2011. Advanced Lectures. Berlin: Springer 2011 S. 504 - 526


Massacci, Fabio; Bouquet, Fabrice; Fourneret, Elizabeta et al.

Orchestrating Security and System Engineering for Evolving Systems

Witold Abramowicz; Ignacio M. Llorente; Mike Surridge; Andrea Zisman; Julien Vayssière (Hrsg). Towards a Service-Based Internet: 4th European Conference, ServiceWave 2011, Poznan, Poland, October 26-28, 2011. Proceedings. Berlin: Springer 2011 S. 134 - 143


Taubenberger, Stefan; Jürjens, Jan; Yu, Yijun et al.

Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain

Jan Camenisch; Simone Fischer-Hübner; Yuko Murayama; Armand Portmann; Carlos Rieder (Hrsg). Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings. Berlin: Springer 2011 S. 259 - 270



Jürjens, Jan; Lee, Seok-Won; Monga, Mattia

Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011: May 22, 2011; Waikiki, Honolulu, HI, USA

New York, NY: ACM Association for Computing Machinery 2011