Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
PDF | RTF
Ergebnisse pro Seite:  10

Fox, Jorge; Jürjens, Jan

Introducing Security Aspects with Model Transformation

Jerzy Rozenblit; Tim O’Neill; Jianfeng Peng (Hrsg). Proceedings of the 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems ECBS 2005: 4-7 April 2005; Greenbelt, Maryland. Los Alamitos, CA: IEEE Computer Society 2005 S. 543 - 549


Jürjens, Jan; Lehrhuber, Markus; Wimmel, Guido

Model-Based Design and Analysis of Permission-Based Security

Carlo Ghezzi; Yuxi Fu; Shaoying Liu; Jim Woodcock (Hrsg). Proceeding of the 10th IEEE International Conference on Engineering of Complex Computer Systems ICECCS 2005: 16-20 June 2005; Shanghai, China. Los Alamitos, CA: IEEE Computer Society 2005 S. 224 - 233


Wagner, Stefan; Jürjens, Jan

Model-Based Identification of Fault-Prone Components

Mario Dal Cin; Mohamed Kaâniche; András Pataricza (Hrsg). Dependable Computing - EDCC 5: 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005. Proceedings. Berlin: Springer 2005 S. 435 - 452


Jürjens, Jan

Model-based Security Engineering with UML

Alessandro Aldini; Roberto Gorrieri; Fabio Martinelli (Hrsg). Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures. Berlin: Springer 2005 S. 42 - 77


Jürjens, Jan

Model-based Security Engineering with UML

Aldini, A.; , ; Martinelli, F. (Hrsg). Foundations of Security Analysis and Desing III: FOSAD 2004/2005 Tutorial Lectures. 2005 S. 42 - 77 (Lecture Notes in Computer Science)


Botaschanjan, Jewgenij; Jürjens, Jan

MoDll: Modeling and Analyzing Time-Constraints

Jerzy Rozenblit; Tim O’Neill; Jianfeng Peng (Hrsg). Proceedings of the 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems ECBS 2005: 4-7 April 2005; Greenbelt, Maryland. Los Alamitos, CA: IEEE Computer Society 2005 S. 299 - 306


Jürjens, Jan

Return on Security Investment - Tutorial

Infotage. Starnberger See. 2005


Jürjens, Jan

Secure Systems Development with UML

Berlin: Springer 2005



Jürjens, Jan

Sound Methods and Effective Tools for Model-based Security Engineering with UML

Gruia-Catalin Roman; William Griswold; Bashar Nuseibeh (Hrsg). Proceedings of the 27th International Conference on Software Engineering ICSE 2005: May 15. - 21., 2005; St. Louis; MO, USA. New York, NY: ACM Association for Computing Machinery 2005 S. 322 - 331