Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
Ergebnisse pro Seite:  100



Peldszus, Sven; Kulcsár, Géza; Lochau, Malte et al.

Incremental Co-Evolution of Java Programs based on Bidirectional Graph Transformation.

PPPJ. 2015 S. 138 - 151



Großer, Katharina

Investigating the use of ontology techniques as a support for on-board software requirement engineering

Koblenz: Universität Koblenz-Landau 2015 147 S.



Stocker, Joachim; Wenzel, Sven; Jürjens, Jan

IT-Risiko-Check: Das Wissen um geschäftskritische IT- Risiken

Peter Schartner;Kerstin Lemke-Rust;Markus Ullmann (Hrsg). D-A-CH security 2015: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Frechen: Syssec 2015 S. 279 - 290


Jürjens, Jan; Ahmadian, Amirshayan

Model-based Security Analysis and Applications to Security Economics

Hammoudi, Slimane u. a. (Hrsg). Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development : ESEO, Angers, Loire Valley, France, 9 - 11 February 2015. SciTePress. 2015 S. 674 - 677


Jürjens, Jan; Shayan Ahmadian, Amir

Model-based Security Analysis and Applications to Security Economics: Invited Talk

International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015). 2015


Jürjens, Jan; Shayan Ahmadian, Amir

Model-based Security Analysis and Applications to Security Economics.

MODELSWARD. 2015 S. 674 - 677


Jürjens, Jan

Modellbasiertes Sicherheits-Testen für Cloud-basierte Prozesse

Software-QS-Tag 2015. 2015


Kulcsár, Géza; Peldszus, Sven; Lochau, Malte

Object-oriented Refactoring of Java Programs using Graph Transformation.

TTC@STAF. 2015 S. 53 - 82


Jürjens, Jan

Ökonomische Analyse von Sicherheitsmaßnahmen (Eingeladener Vortrag)

Arbeitstreffen der Allianz für Sicherheit in der Wirtschaft e.V. 2015


Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.

Preserving Validity of Batch-Job Nets under Change at Run-Time

Sheikh Iqbal Ahamed;Carl K. Chang;William Chu;Ivica Crnkovic;Pao-Ann Hsiung;Gang Huang;Jingwei Yang (Hrsg). Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference Workshops COMPSAC 2015: Volume 2; 1–5 July 2015; Taichung, Taiwan. Los Alamitos, CA: IEEE Computer Society 2015 S. 169 - 178


Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.

Preserving Validity of Batch-Job Nets under Change at Run-Time.

COMPSAC. 2015 S. 169 - 178


Bürger, Jens; Jürjens, Jan; Wenzel, Sven

Restoring security of evolving software models using graph transformation

International Journal on Software Tools for Technology Transfer. Bd. 17. H. 3. Berlin: Springer 2015 S. 267 - 289


Bürger, Jens; Jürjens, Jan; Wenzel, Sven

Restoring security of evolving software models using graph transformation.

STTT. Bd. 17. H. 3. 2015 S. 267 - 289


Bürger, Jens; Gärtner, Stefan; Ruhroth, Thomas et al.

Restoring Security of Long-Living Systems by Co-evolution.

COMPSAC. 2015 S. 153 - 158


Jürjens, Jan

Secure Database Development

Encyclopedia of Database Systems. Springer 2015 S. TBD


Jürjens, Jan

Security Certification in the Presence of Evolution: Models vs. Code (Invited talk)

Software Engineering and Formal Methods - SEFM 2014 Collocated Workshops, Revised Selected Papers. 2015 S. XIX - XX (LNCS)


Rahman, Md. Shamimur; Sadi, Muhammad Sheikh; Ahammed, Sakib et al.

Soft Error Tolerance using Horizontal-Vertical- Double-Bit Diagonal parity method

Felix Pasila;Yusak Tanoto;Resmana Lim;Murtiyanto Santoso;Nemuel Daniel Pah (Hrsg). Proceeding of the 2nd International Conference on Electrical Engineering and Infomation Communication Technology iCEEiC 2015: 21 - 23 May 2015; Jahangirnagar University, Savar, Dhaka, Bangladesh. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2015 S. 1 - 6


Rosado, David G.; Lammari, Nadira; Jürjens, Jan

Special Issue on Secure Information Systems Engineering

The Computer Journal. Bd. 58. H. 10. Oxford: Oxford University Press 2015 S. 2193 - 2194


G. Rosado, David; Lammari, Nadira; Jürjens, Jan

Special Issue on Secure Information Systems Engineering.

Comput. J. Bd. 58. H. 10. 2015 S. 2193 - 2194


Ahmadian, Amirshayan; Coerschulte, Fabian; Jürjens, Jan

Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds

Shishkov, Boris (Hrsg). Business Modeling and Software Design : 5th International Symposium, BMSD 2015, Milan, Italy, July 6–8, 2015, Revised Selected Papers. Cham: Springer International Publishing 2015 S. 80 - 95 (Lecture Notes in Business Information Processing)


Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan

Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds.

BMSD. 2015 S. 80 - 95


Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan

Supporting the Security Certification of Cloud-Computing- Infrastructures: Invited Paper

Fifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 10


Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.

The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution.

International Journal of Software Engineering and Knowledge Engineering. Bd. 25. H. 9-10. 2015 S. 1715 - 1720


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge

Uwe Aßmann;Birgit Demuth;Thorsten Spitta;Georg Püschel;Ronny Kaiser (Hrsg). Software Engineering & Management 2015 - Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März - 20. März 2015 in Dresden. Bonn: Gesellschaft für Informatik 2015 S. 83 - 84 (Lecture Notes in Informatics)


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge.

Software Engineering & Management. 2015 S. 83 - 84


Jürjens, Jan

Towards Security of Adaptable Information Systems - Current Views and Future Perspectives: Invited Panel Participation

Fifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 3


Jürjens, Jan

Transparenz und Sicherheit in der Lieferkette

Arbeitstreffen des Bundesverband Deutscher Postdienstleister. 2015


Jürjens, Jan; Wenzel, Sven

Werkzeug für Wirtschaftlichkeit und Effektivität zum Erstellen von Sicherheitskonzepten

WIK : Zeitschrift für die Sicherheit der Wirtschaft. Bd. 5. Ingelheim: SecuMedia 2015 S. keine Angaben




Jürjens, Jan; Piessens, Frank; Bielova, Nataliia

Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings

Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 (LNCS)


Felderer, Michael; Katt, Basel; Kalb, Philipp et al.

Evolution of Security Engineering Artifacts: A State of the Art Survey

International Journal of Secure Software Engineering. Bd. 5. H. 4. Hershey, PA: IGI Global 2014 S. 48 - 98


Felderer, Michael; Katt, Basel; Kalb, Philipp et al.

Evolution of Security Engineering Artifacts: A State of the Art Survey.

IJSSE. Bd. 5. H. 4. 2014 S. 48 - 98


Jürjens, Jan

Geschäftsprozesse in der Cloud -- aber sicher! (... und compliant)

Software Engineering + Architecture (SEACON 2014). 2014 S. 1 - 83


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.

Guiding a general-purpose C verifier to prove cryptographic protocols

Journal of Computer Security. Bd. 22. H. 5. Amsterdam: IOS Press 2014 S. 823 - 866


Dupressoir, François; D. Gordon, Andrew; Jürjens, Jan et al.

Guiding a general-purpose C verifier to prove cryptographic protocols.

Journal of Computer Security. Bd. 22. H. 5. 2014 S. 823 - 866


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge

Tony Gorschek;Robyn Lutz (Hrsg). Proceeding of the 2014 IEEE 22nd International Requirements Engineering Conference RE: August 25-29, 2014; Karlskrona, Sweden. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2014 S. 103 - 112


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Maintaining requirements for long-living software systems by incorporating security knowledge.

RE. 2014 S. 103 - 112


Bürger, Jens; Jürjens, Jan; Ruhroth, Thomas et al.

Model-based Security Engineering: Managed Co-Evolution of Security Knowledge and Software Models

Alessandro Aldini;Javier Lopez;Fabio Martinelli (Hrsg). Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial Lectures. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 34 - 53 (Lecture Notes in Computer Science)


Lochau, Malte; Peldszus, Sven; Kowal, Matthias et al.

Model-Based Testing.

SFM. 2014 S. 310 - 342


Jürjens, Jan

Security Certification in the Presence of Evolution: Models vs. Code (Keynote)

International Workshop on Safety and Formal Methods (SaFoMe@SEFM 2014). 2014


Blanco, Carlos; Rosado, David G.; Sanchez, Luís Enrique et al.

Security in information systems: Advances and new challenges

Computer Standards & Interfaces. Bd. 36. H. 4. Amsterdam: Elsevier 2014 S. 687 - 688


Blanco, Carlos; G. Rosado, David; Enrique Sanchez, Luís et al.

Security in information systems: Advances and new challenges.

Computer Standards & Interfaces. Bd. 36. H. 4. 2014 S. 687 - 688



Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.

Specifying model changes with UMLchange to support security verification of potential evolution

Computer Standards & Interfaces. Bd. 36. H. 4. Amsterdam: Elsevier 2014 S. 776 - 791


Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.

Specifying model changes with UMLchange to support security verification of potential evolution.

Computer Standards & Interfaces. Bd. 36. H. 4. 2014 S. 776 - 791


Jürjens, Jan; Schneider, Kurt

The SecReq Approach: From Security Requirements to Secure Design while Managing Software Evolution

Wilhelm Hasselbring;Nils Christian Ehmke (Hrsg). Software Engineering 2014: Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar - 28. Februar 2014 in Kiel, Deutschland. Bonn: Gesellschaft für Informatik 2014 S. 89 - 90 (Lecture Notes in Informatics)


Jürjens, Jan; Schneider, Kurt

The SecReq approach: From Security Requirements to Secure Design while Managing Software Evolution.

Software Engineering. 2014 S. 89 - 90


Ruhroth, Thomas; Gärtner, Stefan; Bürger, Jens et al.

Towards Adaptation and Evolution of Domain-specific Knowledge for Maintaining Secure Systems

Andreas Jedlitschka;Pasi Kuvaja;Marco Kuhrmann;Tomi Männistö;Jürgen Münch;Mikko Raatikainen (Hrsg). Product-Focused Software Process Improvement: 15th International Conference, PROFES 2014, Helsinki, Finland, December 10-12, 2014. Proceedings. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 239 - 253 (LNCS)


Ruhroth, Thomas; Gärtner, Stefan; Bürger, Jens et al.

Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems.

PROFES. 2014 S. 239 - 253


Humberg, Thorsten; Wessel, Christian; Poggenpohl, Daniel et al.

Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes

Markus Helfert;Frédéric Desprez;Donald Ferguson;Frank Leymann (Hrsg). Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 36 - 51 (Communications in Computer and Information Science)


Ruhroth, Thomas; Gärtner, Stefan; Bürger, Jens et al.

Versioning and Evolution Requirements for Model-Based System Development

Softwaretechnik-Trends. Bd. 34. H. 2. Bonn: Gesellschaft für Informatik 2014 S. 20 - 24


Ruhroth, Thomas; Gärtner, Stefan; Bürger, Jens et al.

Versioning and Evolution Requirements for Model-Based System Development.

Softwaretechnik-Trends. Bd. 34. H. 2. 2014



Gärtner, Stefan; Bürger, Jens; Schneider, Kurt et al.

Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen

Klaus Schmid;Wolfgang Böhm;Robert Heinrich;Andrea Hermann;Anne Hoffmann;Dieter Landes;Marco Konersmann;Thomas Ruhroth;Oliver Sander;Volker Stolz;Baltasar Trancón Widemann;Rüdiger Weißbach (Hrsg). Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering SE-WS 2014 Software Engineering Workshops: 25.-26. Februar 2014 in Kiel, Deutschland. Aachen: CEUR/RWTH 2014 S. 6 - 7


Gärtner, Stefan; Bürger, Jens; Schneider, Kurt et al.

Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen.

Software Engineering (Workshops). 2014 S. 6 - 7





Dupressoir, François; D. Gordon, Andrew; Jürjens, Jan et al.

Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols.

CoRR. Bd. abs/1312.6532. 2013



Jürjens, Jan

IT-Architekturen für auditierbare Geschäftsprozessanwendungen (Eingeladener Vortrag)

Fraunhofer-Symposium Netzwert 2013. München. 2013


Bürger, Jens; Jürjens, Jan; Ruhroth, Thomas et al.

Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models.

FOSAD. 2013 S. 34 - 53




Becker, Stefan; Hück, Benjamin; Naujokat, Katharina et al.

ODRL 2.0 Revisited.

GI-Jahrestagung. 2013 S. 3081 - 3095


Humberg, Thorsten; Wessel, Christian; Poggenpohl, Daniel et al.

Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes

Frédéric Desprez;Donald Ferguson;Ethan Hadar;Frank Leymann;Matthias Jarke;Markus Helfert (Hrsg). Proceedings of the 3rd International Conference on Cloud Computing and Services Science CLOSER 2013; Aachen, Germany; 8- 10 May, 2013. Setúbal: SciTePress 2013 S. 553 - 561


Humberg, Thorsten; Wessel, Christian; Poggenpohl, Daniel et al.

Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes.

CLOSER. 2013 S. 553 - 561


Taubenberger, Stefan; Jürjens, Jan; Yu, Yijun et al.

Resolving vulnerability identification errors using security requirements on business process models

Information Management & Computer Security. Bd. 21. H. 3. Bingley: Emerald 2013 S. 202 - 223


Taubenberger, Stefan; Jürjens, Jan; Yu, Yijun et al.

Resolving vulnerability identification errors using security requirements on business process models.

Inf. Manag. Comput. Security. Bd. 21. H. 3. 2013 S. 202 - 223


Jürjens, Jan

Security for Changing Software and Systems (Invited Talk)

tubs.CITY Symposium 2013. Braunschweig. 2013 S. 1 - 19


Jürjens, Jan

Sicherheit und Compliance in der Cloud

microfin Jahresempfang 2013. Frankfurt. 2013 S. 1 - 23


Humberg, Thorsten; Wessel, Christian; Poggenpohl, Daniel et al.

Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes.

CLOSER (Selected Papers). 2013 S. 36 - 51


Jürjens, Jan

Zertifizierung für sichere Cyber-Physikalische Systeme

Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2013). Paderborn (Germany). 2013


Ochoa, Martín; Jürjens, Jan; Warzecha, Daniel

A Sound Decision Procedure for the Compositionality of Secrecy

Gilles Barthe;Benjamin Livshits;Riccardo Scandariato (Hrsg). Engineering Secure Software and Systems: 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings. Berlin: Springer 2012 S. 97 - 105 (Lecture Notes in Computer Science)


Ochoa, Martín; Jürjens, Jan; Warzecha, Daniel

A Sound Decision Procedure for the Compositionality of Secrecy.

ESSoS. 2012 S. 97 - 105


Jürjens, Jan; Schneider, Kurt

Beyond One-Shot Security

Norbert Seyff;Anne Koziolek (Hrsg). Modelling and Quality in requirements Engineering: Essays Dedicated to Martin Glinz on the Occasion of His 60th Birthday. Münster: Monsenstein und Vannerdat 2012 S. 121 - 132


Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Computational Verification of C Protocol Implementations by Symbolic Execution

Ting Yu;George Danezis;Virgil Gligor (Hrsg). Proceedings of the 19th ACM Conference on Computer and Communications Security CCS 2012: October 16–18, 2012; Raleigh, North Carolina, USA. New York, NY: ACM Association for Computing Machinery 2012 S. 712 - 723


Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan

Computational verification of C protocol implementations by symbolic execution.

ACM Conference on Computer and Communications Security. 2012 S. 712 - 723



Schneider, Kurt; Knauss, Eric; Houmb, Siv Hilde et al.

Enhancing security requirements engineering by organizational learning

Requirements Engineering. Bd. 17. H. 1. London: Springer 2012 S. 35 - 56


Schneider, Kurt; Knauss, Eric; Hilde Houmb, Siv et al.

Enhancing security requirements engineering by organizational learning.

Requir. Eng. Bd. 17. H. 1. 2012 S. 35 - 56


Wessel, Christian; Humberg, Thorsten; Wenzel, Sven et al.

Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen

Stefan Jähnichen;Bernhard Rumpe;Holger Schlingloff (Hrsg). Software Engineering 2012: Workshopband; Tagung vom 27. Februar - 02. März 2012 in Berlin. Bonn: Gesellschaft für Informatik 2012 S. 175 - 181


Wessel, Christian; Humberg, Thorsten; Wenzel, Sven et al.

Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen.

Software Engineering (Workshops). 2012 S. 175 - 181


Jürjens, Jan

Informationssicherheit im Cloud Computing

Web-Konferenz des Anwenderkreis Informationstechnik und Telekommunikation (AKIT). 2012 S. 1 - 40


Jürjens, Jan

Model-based Security Engineering

12th International School on Foundations of Security Analysis and Design (FOSAD 2012). Bertinoro (Italy). 2012


Blanco, Carlos; Fernandez-Medina, Eduardo; Trujillo, Juan et al.

Modelado Seguro de Consultas OLAP y su Evolución

Jornadas de Ingenieria del Software y Bases de Datos (JISBD 2012). Almeria. 2012


Ochoa, Martín; Jürjens, Jan; Cuéllar, Jorge

Non-interference on UML State-Charts

Carlo A. Furia;Sebastian Nanz (Hrsg). Objects, Models, Components, Patterns: 50th International Conference, TOOLS 2012, Prague, Czech Republic, May 29-31, 2012. Proceedings. Berlin: Springer 2012 S. 219 - 235 (Lecture Notes in Computer Science)


Ochoa, Martín; Jürjens, Jan; Cuéllar, Jorge

Non-interference on UML State-Charts.

TOOLS (50). 2012 S. 219 - 235


Wenzel, Sven; Wessel, Christian; Humberg, Thorsten et al.

Securing Processes for Outsourcing into the Cloud

Frank Leymann;Ivan Ivanov;Marten van Sinderen;Tony Shan (Hrsg). Proceedings of the 2nd International Conference on Cloud Computing and Services Science CLOSER 2012; Porto, Portugal; 18-21 April, 2012. Setúbal: SciTePress 2012 S. 675 - 680


Wenzel, Sven; Wessel, Christian; Humberg, Thorsten et al.

Securing Processes for Outsourcing into the Cloud.

CLOSER. 2012 S. 675 - 680


Rosado, David G.; Sanchez, Luís Enrique; Fernández-Medina, Eduardo et al.

Security in Information Systems: New Challenges and Opportunities

Journal of Universal Computer Science. Bd. 18. H. 6. Graz: Verlag der Technischen Universität Graz 2012 S. 728 - 731


G. Rosado, David; Enrique Sanchez, Luís; Fernández-Medina, Eduardo et al.

Security in Information Systems: New Challenges and Opportunities.

J. UCS. Bd. 18. H. 6. 2012 S. 728 - 731


Ruhroth, Thomas; Jürjens, Jan

Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec

Victor Winter;Robin Gandhi;Abhishek Parakh (Hrsg). Proceeding of the 14th IEEE International Symposium on High Assurance Systems Engineering HASE 2012: 25. - 27. October, 2012; Omaha, Nebraska. Los Alamitos, CA: IEEE Computer Society 2012 S. 177 - 184



Fourneret, Elizabeta; Bouquet, Fabrice; Ochoa, Martin et al.

Vérification et Test pour des systémes évolutifs

AFADL 2012. Grenoble. 2012