Institut für Softwaretechnik
FB 4: Informatik / Universität Koblenz
- 0261/287-2722
- 0261/287-2721
Aizatulin, Mihhail; Dupressoir, François; Gordon, Andrew D. et al.
Verifying Cryptographic Code in C: Some Experience and the Csec ChallengeGilles Barthe; Anupam Datta; Sandro Etalle (Hrsg). Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Berlin: Springer 2011 S. 1 - 20
Peschke, Marc; Hirsch, Martin; Jürjens, Jan et al.
Werkzeuggestützte Identifikation von IT-SicherheitsrisikenPeter Schartner;Jürgen Taeger (Hrsg). D-A-CH security 2011: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Klagenfurt: Syssec 2011 S. 267 - 278
Beckers, Kristian; Hirsch, Martin; Jürjens, Jan
Compliance in Clouds: A cloud computing security perspectiveGI SECMGT-Workshop. Frankfurt (Germany). 2010 S. 1 - 26
Sheikh Sadi, Muhammad; Myers, D. G.; Ortega-Sanchez, Cesar et al.
Component criticality analysis to minimize soft errors riskInternational Journal of Computer Systems Science & Engineering. Bd. 25. H. 5. London: CRL 2010 S. 23 - 37
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Cryptographic Security Verification for C by Symbolic Execution: A 5-minute presentationComputer Security Foundations Symposium (CSF). 2010
Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsecRequirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93
Pironti, Alfredo; Jürjens, Jan
Formally-Based Black-Box Monitoring of Security ProtocolsFabio Massacci; Dan Wallach; Nicola Zannone (Hrsg). Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Berlin: Springer 2010 S. 79 - 95
Mouratidis, Haralambos; Jürjens, Jan
From goal-driven security requirements engineering to secure designInternational Journal of Intelligent Systems. Bd. 25. H. 8. New York, NY: Wiley 2010 S. 813 - 840
Höhn, Sebastian; Lowis, Lutz; Jürjens, Jan et al.
Identification of Vulnerabilities in Web Services using Model-based SecurityCarlos A. Gutiérrez;Eduardo Fernández-Medina;Mario Piattini (Hrsg). Web Services Security Development and Architecture: Theoretical and Practical Issues. Hershey, PA: Information Science Reference 2010 S. 1 - 32
Jürjens, Jan
Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote)Paloma Díaz; Mary Beth Rosson; Christopher Hundhausen; Emmanuel Pietriga (Hrsg). IEEE Symposium on Visual Languages and Human-Centric Computing VL/HCC 2010: 21-25 September, 2010; Leganes, Madrid, Spain. Los Alamitos, CA: IEEE Computer Society 2010 S. 4 - 6