Institut für Softwaretechnik
FB 4: Informatik / Universität Koblenz
- 0261/287-2722
- 0261/287-2721
Jürjens, Jan; Schneider, Kurt
Beyond One-Shot SecurityNorbert Seyff;Anne Koziolek (Hrsg). Modelling and Quality in requirements Engineering: Essays Dedicated to Martin Glinz on the Occasion of His 60th Birthday. Münster: Monsenstein und Vannerdat 2012 S. 121 - 132
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Computational Verification of C Protocol Implementations by Symbolic ExecutionTing Yu;George Danezis;Virgil Gligor (Hrsg). Proceedings of the 19th ACM Conference on Computer and Communications Security CCS 2012: October 16–18, 2012; Raleigh, North Carolina, USA. New York, NY: ACM Association for Computing Machinery 2012 S. 712 - 723
Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan
Computational verification of C protocol implementations by symbolic execution.ACM Conference on Computer and Communications Security. 2012 S. 712 - 723
Jürjens, Jan
Den Nebel lichten: Von Compliance-Regularien zu testbaren Sicherheitsanforderungeniqnite 2012. 2012
Schneider, Kurt; Knauss, Eric; Houmb, Siv Hilde et al.
Enhancing security requirements engineering by organizational learningRequirements Engineering. Bd. 17. H. 1. London: Springer 2012 S. 35 - 56
Schneider, Kurt; Knauss, Eric; Hilde Houmb, Siv et al.
Enhancing security requirements engineering by organizational learning.Requir. Eng. Bd. 17. H. 1. 2012 S. 35 - 56
Wessel, Christian; Humberg, Thorsten; Wenzel, Sven et al.
Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte AnwendungenStefan Jähnichen;Bernhard Rumpe;Holger Schlingloff (Hrsg). Software Engineering 2012: Workshopband; Tagung vom 27. Februar - 02. März 2012 in Berlin. Bonn: Gesellschaft für Informatik 2012 S. 175 - 181
Wessel, Christian; Humberg, Thorsten; Wenzel, Sven et al.
Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen.Software Engineering (Workshops). 2012 S. 175 - 181
Jürjens, Jan
Informationssicherheit im Cloud ComputingWeb-Konferenz des Anwenderkreis Informationstechnik und Telekommunikation (AKIT). 2012 S. 1 - 40
Jürjens, Jan
Model-based Security Engineering12th International School on Foundations of Security Analysis and Design (FOSAD 2012). Bertinoro (Italy). 2012