Institut für Softwaretechnik
FB 4: Informatik / Universität Koblenz
- 0261/287-2722
- 0261/287-2721
Jürjens, Jan
Der Industrial Data Space: Eine unternehmensübergreifende Plattform für Big-Data-Analysen (eingeladener Vortrag)Zukunftsworkshop Big Data. 2015
Jürjens, Jan
Digitalisierung - Chancen für den Mittelstand (Podiumsdiskussion)2015
Peldszus, Sven; Kulcsár, Géza; Lochau, Malte et al.
Incremental Co-Evolution of Java Programs based on Bidirectional Graph Transformation.PPPJ. 2015 S. 138 - 151
Jürjens, Jan
Industrial Data Space: Eine Plattform für Smart Services und Industrial Analytics: Eingeladener Vortrag auf der Mitgliederversammlung des SOA Innovation LabMitgliederversammlung des SOA Innovation Lab. 2015
Großer, Katharina
Investigating the use of ontology techniques as a support for on-board software requirement engineeringKoblenz: Universität Koblenz-Landau 2015 147 S.
Großer, Katharina
Investigating the use of ontology techniques as a support for on-board software requirement engineeringKoblenz: Universität Koblenz-Landau 2015
Stocker, Joachim; Wenzel, Sven; Jürjens, Jan
IT-Risiko-Check: Das Wissen um geschäftskritische IT- RisikenPeter Schartner;Kerstin Lemke-Rust;Markus Ullmann (Hrsg). D-A-CH security 2015: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Frechen: Syssec 2015 S. 279 - 290
Jürjens, Jan; Ahmadian, Amirshayan
Model-based Security Analysis and Applications to Security EconomicsHammoudi, Slimane u. a. (Hrsg). Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development : ESEO, Angers, Loire Valley, France, 9 - 11 February 2015. SciTePress. 2015 S. 674 - 677
Jürjens, Jan; Shayan Ahmadian, Amir
Model-based Security Analysis and Applications to Security Economics: Invited TalkInternational Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015). 2015
Jürjens, Jan; Shayan Ahmadian, Amir
Model-based Security Analysis and Applications to Security Economics.MODELSWARD. 2015 S. 674 - 677
Jürjens, Jan
Modellbasiertes Sicherheits-Testen für Cloud-basierte ProzesseSoftware-QS-Tag 2015. 2015
Kulcsár, Géza; Peldszus, Sven; Lochau, Malte
Object-oriented Refactoring of Java Programs using Graph Transformation.TTC@STAF. 2015 S. 53 - 82
Jürjens, Jan
Ökonomische Analyse von Sicherheitsmaßnahmen (Eingeladener Vortrag)Arbeitstreffen der Allianz für Sicherheit in der Wirtschaft e.V. 2015
Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.
Preserving Validity of Batch-Job Nets under Change at Run-TimeSheikh Iqbal Ahamed;Carl K. Chang;William Chu;Ivica Crnkovic;Pao-Ann Hsiung;Gang Huang;Jingwei Yang (Hrsg). Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference Workshops COMPSAC 2015: Volume 2; 1–5 July 2015; Taichung, Taiwan. Los Alamitos, CA: IEEE Computer Society 2015 S. 169 - 178
Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.
Preserving Validity of Batch-Job Nets under Change at Run-Time.COMPSAC. 2015 S. 169 - 178
Bürger, Jens; Jürjens, Jan; Wenzel, Sven
Restoring security of evolving software models using graph transformationInternational Journal on Software Tools for Technology Transfer. Bd. 17. H. 3. Berlin: Springer 2015 S. 267 - 289
Bürger, Jens; Jürjens, Jan; Wenzel, Sven
Restoring security of evolving software models using graph transformation.STTT. Bd. 17. H. 3. 2015 S. 267 - 289
Bürger, Jens; Gärtner, Stefan; Ruhroth, Thomas et al.
Restoring Security of Long-Living Systems by Co-evolution.COMPSAC. 2015 S. 153 - 158
Jürjens, Jan
Secure Database DevelopmentEncyclopedia of Database Systems. Springer 2015 S. TBD
Jürjens, Jan
Security Certification in the Presence of Evolution: Models vs. Code (Invited talk)Software Engineering and Formal Methods - SEFM 2014 Collocated Workshops, Revised Selected Papers. 2015 S. XIX - XX (LNCS)
Rahman, Md. Shamimur; Sadi, Muhammad Sheikh; Ahammed, Sakib et al.
Soft Error Tolerance using Horizontal-Vertical- Double-Bit Diagonal parity methodFelix Pasila;Yusak Tanoto;Resmana Lim;Murtiyanto Santoso;Nemuel Daniel Pah (Hrsg). Proceeding of the 2nd International Conference on Electrical Engineering and Infomation Communication Technology iCEEiC 2015: 21 - 23 May 2015; Jahangirnagar University, Savar, Dhaka, Bangladesh. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2015 S. 1 - 6
Rosado, David G.; Lammari, Nadira; Jürjens, Jan
Special Issue on Secure Information Systems EngineeringThe Computer Journal. Bd. 58. H. 10. Oxford: Oxford University Press 2015 S. 2193 - 2194
G. Rosado, David; Lammari, Nadira; Jürjens, Jan
Special Issue on Secure Information Systems Engineering.Comput. J. Bd. 58. H. 10. 2015 S. 2193 - 2194
Ahmadian, Amirshayan; Coerschulte, Fabian; Jürjens, Jan
Supporting the Security Certification and Privacy Level Agreements in the Context of CloudsShishkov, Boris (Hrsg). Business Modeling and Software Design : 5th International Symposium, BMSD 2015, Milan, Italy, July 6–8, 2015, Revised Selected Papers. Cham: Springer International Publishing 2015 S. 80 - 95 (Lecture Notes in Business Information Processing)
Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan
Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds.BMSD. 2015 S. 80 - 95
Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan
Supporting the Security Certification of Cloud-Computing- Infrastructures: Invited PaperFifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 10
Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.
The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution.International Journal of Software Engineering and Knowledge Engineering. Bd. 25. H. 9-10. 2015 S. 1715 - 1720
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Towards Maintaining Long-Living Information Systems by Incorporating Security KnowledgeUwe Aßmann;Birgit Demuth;Thorsten Spitta;Georg Püschel;Ronny Kaiser (Hrsg). Software Engineering & Management 2015 - Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März - 20. März 2015 in Dresden. Bonn: Gesellschaft für Informatik 2015 S. 83 - 84 (Lecture Notes in Informatics)
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge.Software Engineering & Management. 2015 S. 83 - 84
Jürjens, Jan
Towards Security of Adaptable Information Systems - Current Views and Future Perspectives: Invited Panel ParticipationFifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 3
Jürjens, Jan
Transparenz und Sicherheit in der LieferketteArbeitstreffen des Bundesverband Deutscher Postdienstleister. 2015
Jürjens, Jan; Wenzel, Sven
Werkzeug für Wirtschaftlichkeit und Effektivität zum Erstellen von SicherheitskonzeptenWIK : Zeitschrift für die Sicherheit der Wirtschaft. Bd. 5. Ingelheim: SecuMedia 2015 S. keine Angaben
Jürjens, Jan; B. Fernández, Eduardo; B. France, Robert et al.
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop).CoRR. Bd. abs/1409.6608. 2014
Jürjens, Jan; Piessens, Frank; Bielova, Nataliia
Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, ProceedingsGorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 (LNCS)
Felderer, Michael; Katt, Basel; Kalb, Philipp et al.
Evolution of Security Engineering Artifacts: A State of the Art SurveyInternational Journal of Secure Software Engineering. Bd. 5. H. 4. Hershey, PA: IGI Global 2014 S. 48 - 98
Felderer, Michael; Katt, Basel; Kalb, Philipp et al.
Evolution of Security Engineering Artifacts: A State of the Art Survey.IJSSE. Bd. 5. H. 4. 2014 S. 48 - 98
Jürjens, Jan
Geschäftsprozesse in der Cloud -- aber sicher! (... und compliant)Software Engineering + Architecture (SEACON 2014). 2014 S. 1 - 83
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.
Guiding a general-purpose C verifier to prove cryptographic protocolsJournal of Computer Security. Bd. 22. H. 5. Amsterdam: IOS Press 2014 S. 823 - 866
Dupressoir, François; D. Gordon, Andrew; Jürjens, Jan et al.
Guiding a general-purpose C verifier to prove cryptographic protocols.Journal of Computer Security. Bd. 22. H. 5. 2014 S. 823 - 866
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Maintaining Requirements for Long-Living Software Systems by Incorporating Security KnowledgeTony Gorschek;Robyn Lutz (Hrsg). Proceeding of the 2014 IEEE 22nd International Requirements Engineering Conference RE: August 25-29, 2014; Karlskrona, Sweden. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2014 S. 103 - 112
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Maintaining requirements for long-living software systems by incorporating security knowledge.RE. 2014 S. 103 - 112
Bürger, Jens; Jürjens, Jan; Ruhroth, Thomas et al.
Model-based Security Engineering: Managed Co-Evolution of Security Knowledge and Software ModelsAlessandro Aldini;Javier Lopez;Fabio Martinelli (Hrsg). Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial Lectures. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 34 - 53 (Lecture Notes in Computer Science)
Lochau, Malte; Peldszus, Sven; Kowal, Matthias et al.
Model-Based Testing.SFM. 2014 S. 310 - 342
Jürjens, Jan
Security Certification in the Presence of Evolution: Models vs. Code (Keynote)International Workshop on Safety and Formal Methods (SaFoMe@SEFM 2014). 2014
Blanco, Carlos; Rosado, David G.; Sanchez, Luís Enrique et al.
Security in information systems: Advances and new challengesComputer Standards & Interfaces. Bd. 36. H. 4. Amsterdam: Elsevier 2014 S. 687 - 688
Blanco, Carlos; G. Rosado, David; Enrique Sanchez, Luís et al.
Security in information systems: Advances and new challenges.Computer Standards & Interfaces. Bd. 36. H. 4. 2014 S. 687 - 688
Rosado, David G.; Blanco, Carlos; Mellado, Daniel et al.
Security in Information Systems: Proceedings of the 11th International Workshop on Security in Information Systems WOSIS 2014; in conjunction with ICEIS 2014; Lisbon, Portugal; April 27-27, 2014Setúbal: SciTePress 2014
Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.
Specifying model changes with UMLchange to support security verification of potential evolutionComputer Standards & Interfaces. Bd. 36. H. 4. Amsterdam: Elsevier 2014 S. 776 - 791
Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.
Specifying model changes with UMLchange to support security verification of potential evolution.Computer Standards & Interfaces. Bd. 36. H. 4. 2014 S. 776 - 791
Jürjens, Jan; Schneider, Kurt
The SecReq Approach: From Security Requirements to Secure Design while Managing Software EvolutionWilhelm Hasselbring;Nils Christian Ehmke (Hrsg). Software Engineering 2014: Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar - 28. Februar 2014 in Kiel, Deutschland. Bonn: Gesellschaft für Informatik 2014 S. 89 - 90 (Lecture Notes in Informatics)
Jürjens, Jan; Schneider, Kurt
The SecReq approach: From Security Requirements to Secure Design while Managing Software Evolution.Software Engineering. 2014 S. 89 - 90
Ruhroth, Thomas; Gärtner, Stefan; Bürger, Jens et al.
Towards Adaptation and Evolution of Domain-specific Knowledge for Maintaining Secure SystemsAndreas Jedlitschka;Pasi Kuvaja;Marco Kuhrmann;Tomi Männistö;Jürgen Münch;Mikko Raatikainen (Hrsg). Product-Focused Software Process Improvement: 15th International Conference, PROFES 2014, Helsinki, Finland, December 10-12, 2014. Proceedings. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 239 - 253 (LNCS)
Ruhroth, Thomas; Gärtner, Stefan; Bürger, Jens et al.
Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems.PROFES. 2014 S. 239 - 253
Humberg, Thorsten; Wessel, Christian; Poggenpohl, Daniel et al.
Using Ontologies to Analyze Compliance Requirements of Cloud-Based ProcessesMarkus Helfert;Frédéric Desprez;Donald Ferguson;Frank Leymann (Hrsg). Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 36 - 51 (Communications in Computer and Information Science)
Ruhroth, Thomas; Gärtner, Stefan; Bürger, Jens et al.
Versioning and Evolution Requirements for Model-Based System DevelopmentSoftwaretechnik-Trends. Bd. 34. H. 2. Bonn: Gesellschaft für Informatik 2014 S. 20 - 24
Ruhroth, Thomas; Gärtner, Stefan; Bürger, Jens et al.
Versioning and Evolution Requirements for Model-Based System Development.Softwaretechnik-Trends. Bd. 34. H. 2. 2014
Gärtner, Stefan; Bürger, Jens; Schneider, Kurt et al.
Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem WissenKlaus Schmid;Wolfgang Böhm;Robert Heinrich;Andrea Hermann;Anne Hoffmann;Dieter Landes;Marco Konersmann;Thomas Ruhroth;Oliver Sander;Volker Stolz;Baltasar Trancón Widemann;Rüdiger Weißbach (Hrsg). Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering SE-WS 2014 Software Engineering Workshops: 25.-26. Februar 2014 in Kiel, Deutschland. Aachen: CEUR/RWTH 2014 S. 6 - 7
Gärtner, Stefan; Bürger, Jens; Schneider, Kurt et al.
Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen.Software Engineering (Workshops). 2014 S. 6 - 7
Jürjens, Jan; Livshits, Benjamin; Scandariato, Riccardo
Engineering Secure Software and Systems: 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. ProceedingsBerlin: Springer 2013 (LNCS)
Jürjens, Jan
Evolution vs. semantische Konsistenz2013
Dupressoir, François; D. Gordon, Andrew; Jürjens, Jan et al.
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols.CoRR. Bd. abs/1312.6532. 2013
Jürjens, Jan
Hot Topics in Model-based Security (Invited Panel Contribution)2013
Jürjens, Jan
IT-Architekturen für auditierbare Geschäftsprozessanwendungen (Eingeladener Vortrag)Fraunhofer-Symposium Netzwert 2013. München. 2013
Bürger, Jens; Jürjens, Jan; Ruhroth, Thomas et al.
Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models.FOSAD. 2013 S. 34 - 53
Jürjens, Jan
Model-centric Security Verification subject to Evolution (Invited Talk)2013
Jürjens, Jan
Modellbasiertes Sicherheits- und Compliance-Management2013 S. 1 - 26
Becker, Stefan; Hück, Benjamin; Naujokat, Katharina et al.
ODRL 2.0 Revisited.GI-Jahrestagung. 2013 S. 3081 - 3095
Humberg, Thorsten; Wessel, Christian; Poggenpohl, Daniel et al.
Ontology-based Analysis of Compliance and Regulatory Requirements of Business ProcessesFrédéric Desprez;Donald Ferguson;Ethan Hadar;Frank Leymann;Matthias Jarke;Markus Helfert (Hrsg). Proceedings of the 3rd International Conference on Cloud Computing and Services Science CLOSER 2013; Aachen, Germany; 8- 10 May, 2013. Setúbal: SciTePress 2013 S. 553 - 561
Humberg, Thorsten; Wessel, Christian; Poggenpohl, Daniel et al.
Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes.CLOSER. 2013 S. 553 - 561
Taubenberger, Stefan; Jürjens, Jan; Yu, Yijun et al.
Resolving vulnerability identification errors using security requirements on business process modelsInformation Management & Computer Security. Bd. 21. H. 3. Bingley: Emerald 2013 S. 202 - 223
Taubenberger, Stefan; Jürjens, Jan; Yu, Yijun et al.
Resolving vulnerability identification errors using security requirements on business process models.Inf. Manag. Comput. Security. Bd. 21. H. 3. 2013 S. 202 - 223
Jürjens, Jan
Security for Changing Software and Systems (Invited Talk)tubs.CITY Symposium 2013. Braunschweig. 2013 S. 1 - 19
Jürjens, Jan
Sicherheit und Compliance in der Cloudmicrofin Jahresempfang 2013. Frankfurt. 2013 S. 1 - 23
Humberg, Thorsten; Wessel, Christian; Poggenpohl, Daniel et al.
Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes.CLOSER (Selected Papers). 2013 S. 36 - 51
Jürjens, Jan
Zertifizierung für sichere Cyber-Physikalische SystemeTag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2013). Paderborn (Germany). 2013
Ochoa, Martín; Jürjens, Jan; Warzecha, Daniel
A Sound Decision Procedure for the Compositionality of SecrecyGilles Barthe;Benjamin Livshits;Riccardo Scandariato (Hrsg). Engineering Secure Software and Systems: 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings. Berlin: Springer 2012 S. 97 - 105 (Lecture Notes in Computer Science)
Ochoa, Martín; Jürjens, Jan; Warzecha, Daniel
A Sound Decision Procedure for the Compositionality of Secrecy.ESSoS. 2012 S. 97 - 105
Jürjens, Jan; Schneider, Kurt
Beyond One-Shot SecurityNorbert Seyff;Anne Koziolek (Hrsg). Modelling and Quality in requirements Engineering: Essays Dedicated to Martin Glinz on the Occasion of His 60th Birthday. Münster: Monsenstein und Vannerdat 2012 S. 121 - 132
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Computational Verification of C Protocol Implementations by Symbolic ExecutionTing Yu;George Danezis;Virgil Gligor (Hrsg). Proceedings of the 19th ACM Conference on Computer and Communications Security CCS 2012: October 16–18, 2012; Raleigh, North Carolina, USA. New York, NY: ACM Association for Computing Machinery 2012 S. 712 - 723
Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan
Computational verification of C protocol implementations by symbolic execution.ACM Conference on Computer and Communications Security. 2012 S. 712 - 723
Jürjens, Jan
Den Nebel lichten: Von Compliance-Regularien zu testbaren Sicherheitsanforderungeniqnite 2012. 2012
Schneider, Kurt; Knauss, Eric; Houmb, Siv Hilde et al.
Enhancing security requirements engineering by organizational learningRequirements Engineering. Bd. 17. H. 1. London: Springer 2012 S. 35 - 56
Schneider, Kurt; Knauss, Eric; Hilde Houmb, Siv et al.
Enhancing security requirements engineering by organizational learning.Requir. Eng. Bd. 17. H. 1. 2012 S. 35 - 56
Wessel, Christian; Humberg, Thorsten; Wenzel, Sven et al.
Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte AnwendungenStefan Jähnichen;Bernhard Rumpe;Holger Schlingloff (Hrsg). Software Engineering 2012: Workshopband; Tagung vom 27. Februar - 02. März 2012 in Berlin. Bonn: Gesellschaft für Informatik 2012 S. 175 - 181
Wessel, Christian; Humberg, Thorsten; Wenzel, Sven et al.
Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen.Software Engineering (Workshops). 2012 S. 175 - 181
Jürjens, Jan
Informationssicherheit im Cloud ComputingWeb-Konferenz des Anwenderkreis Informationstechnik und Telekommunikation (AKIT). 2012 S. 1 - 40
Jürjens, Jan
Model-based Security Engineering12th International School on Foundations of Security Analysis and Design (FOSAD 2012). Bertinoro (Italy). 2012
Blanco, Carlos; Fernandez-Medina, Eduardo; Trujillo, Juan et al.
Modelado Seguro de Consultas OLAP y su EvoluciónJornadas de Ingenieria del Software y Bases de Datos (JISBD 2012). Almeria. 2012
Ochoa, Martín; Jürjens, Jan; Cuéllar, Jorge
Non-interference on UML State-ChartsCarlo A. Furia;Sebastian Nanz (Hrsg). Objects, Models, Components, Patterns: 50th International Conference, TOOLS 2012, Prague, Czech Republic, May 29-31, 2012. Proceedings. Berlin: Springer 2012 S. 219 - 235 (Lecture Notes in Computer Science)
Ochoa, Martín; Jürjens, Jan; Cuéllar, Jorge
Non-interference on UML State-Charts.TOOLS (50). 2012 S. 219 - 235
Wenzel, Sven; Wessel, Christian; Humberg, Thorsten et al.
Securing Processes for Outsourcing into the CloudFrank Leymann;Ivan Ivanov;Marten van Sinderen;Tony Shan (Hrsg). Proceedings of the 2nd International Conference on Cloud Computing and Services Science CLOSER 2012; Porto, Portugal; 18-21 April, 2012. Setúbal: SciTePress 2012 S. 675 - 680
Wenzel, Sven; Wessel, Christian; Humberg, Thorsten et al.
Securing Processes for Outsourcing into the Cloud.CLOSER. 2012 S. 675 - 680
Rosado, David G.; Sanchez, Luís Enrique; Fernández-Medina, Eduardo et al.
Security in Information Systems: New Challenges and OpportunitiesJournal of Universal Computer Science. Bd. 18. H. 6. Graz: Verlag der Technischen Universität Graz 2012 S. 728 - 731
G. Rosado, David; Enrique Sanchez, Luís; Fernández-Medina, Eduardo et al.
Security in Information Systems: New Challenges and Opportunities.J. UCS. Bd. 18. H. 6. 2012 S. 728 - 731
Ruhroth, Thomas; Jürjens, Jan
Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsecVictor Winter;Robin Gandhi;Abhishek Parakh (Hrsg). Proceeding of the 14th IEEE International Symposium on High Assurance Systems Engineering HASE 2012: 25. - 27. October, 2012; Omaha, Nebraska. Los Alamitos, CA: IEEE Computer Society 2012 S. 177 - 184
Ruhroth, Thomas; Jürjens, Jan
Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec.HASE. 2012 S. 177 - 184
Fourneret, Elizabeta; Bouquet, Fabrice; Ochoa, Martin et al.
Vérification et Test pour des systémes évolutifsAFADL 2012. Grenoble. 2012