Institut für Softwaretechnik
FB 4: Informatik / Universität Koblenz
- 0261/287-2722
- 0261/287-2721
Islam, Shareeful; Mouratidis, Haralambos; Jürjens, Jan
A framework to support alignment of secure software engineering with legal regulations.Software and System Modeling. Bd. 10. H. 3. 2011 S. 369 - 394
Islam, Shareeful; Mouratidis, Haralambos; Jürjens, Jan
A framework to support alignment of secure software engineeringwith legal regulationsSoftware and Systems Modeling. Bd. 10. H. 3. Berlin: Springer 2011 S. 369 - 394
Sheikh Sadi, Muhammad; Mizanur Rahman Khan, Md.; Nazim Uddin, Md. et al.
An Efficient Approach towards Mitigating Soft Errors RisksCoRR. Bd. abs/1110.3969. 2011
Jürjens, Jan
Automated Security Hardening for Evolving UML ModelsRichard N. Taylor;Harald Gall;Nenad Medvidović (Hrsg). Proceedings of the 33rd International Conference on Software Engineering ICSE 2011: May 21–28, 2011; Waikiki, Honolulu, Hawaii. New York, NY: ACM Association for Computing Machinery 2011 S. 986 - 988
Jürjens, Jan
Automated security hardening for evolving UML models.ICSE. 2011 S. 986 - 988
Schmidt, Holger; Jürjens, Jan
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsecHaralambos Mouratidis;Colette Rolland (Hrsg). Advanced Information Systems Engineering: 23rd International Conference, CAiSE 2011: London, UK, June 20-24, 2011; Proceedings. Berlin: Springer 2011 S. 367 - 382 (Lecture Notes in Computer Science)
Schmidt, Holger; Jürjens, Jan
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec.CAiSE. 2011 S. 367 - 382
Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic ExecutionCoRR. Bd. abs/1107.1017. 2011
Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan
Extracting and verifying cryptographic models from C protocol code by symbolic execution.ACM Conference on Computer and Communications Security. 2011 S. 331 - 340
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.
Guiding a General-Purpose C Verifier to Prove Cryptographic ProtocolsSteve Kremer;Michael Backes;Steve Zdancewic;Jonathan Herzog (Hrsg). 24th IEEE Computer Security Foundations Symposium CSF 2011: 27-29 June, 2011; Cernay-la-Ville, France. Los Alamitos, CA: IEEE Computer Society 2011 S. 3 - 17