Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
Ergebnisse pro Seite:  10

Islam, Shareeful; Mouratidis, Haralambos; Jürjens, Jan

A framework to support alignment of secure software engineering with legal regulations.

Software and System Modeling. Bd. 10. H. 3. 2011 S. 369 - 394


Islam, Shareeful; Mouratidis, Haralambos; Jürjens, Jan

A framework to support alignment of secure software engineeringwith legal regulations

Software and Systems Modeling. Bd. 10. H. 3. Berlin: Springer 2011 S. 369 - 394


Sheikh Sadi, Muhammad; Mizanur Rahman Khan, Md.; Nazim Uddin, Md. et al.

An Efficient Approach towards Mitigating Soft Errors Risks

CoRR. Bd. abs/1110.3969. 2011


Jürjens, Jan

Automated Security Hardening for Evolving UML Models

Richard N. Taylor;Harald Gall;Nenad Medvidović (Hrsg). Proceedings of the 33rd International Conference on Software Engineering ICSE 2011: May 21–28, 2011; Waikiki, Honolulu, Hawaii. New York, NY: ACM Association for Computing Machinery 2011 S. 986 - 988


Jürjens, Jan

Automated security hardening for evolving UML models.

ICSE. 2011 S. 986 - 988


Schmidt, Holger; Jürjens, Jan

Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec

Haralambos Mouratidis;Colette Rolland (Hrsg). Advanced Information Systems Engineering: 23rd International Conference, CAiSE 2011: London, UK, June 20-24, 2011; Proceedings. Berlin: Springer 2011 S. 367 - 382 (Lecture Notes in Computer Science)


Schmidt, Holger; Jürjens, Jan

Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec.

CAiSE. 2011 S. 367 - 382


Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan

Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution

CoRR. Bd. abs/1107.1017. 2011


Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan

Extracting and verifying cryptographic models from C protocol code by symbolic execution.

ACM Conference on Computer and Communications Security. 2011 S. 331 - 340


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.

Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols

Steve Kremer;Michael Backes;Steve Zdancewic;Jonathan Herzog (Hrsg). 24th IEEE Computer Security Foundations Symposium CSF 2011: 27-29 June, 2011; Cernay-la-Ville, France. Los Alamitos, CA: IEEE Computer Society 2011 S. 3 - 17