Institut für Softwaretechnik
FB 4: Informatik / Universität Koblenz
- 0261/287-2722
- 0261/287-2721
Islam, Shareeful; Mouratidis, Haralambos; Jürjens, Jan
A framework to support alignment of secure software engineering with legal regulations.Software and System Modeling. Bd. 10. H. 3. 2011 S. 369 - 394
Islam, Shareeful; Mouratidis, Haralambos; Jürjens, Jan
A framework to support alignment of secure software engineeringwith legal regulationsSoftware and Systems Modeling. Bd. 10. H. 3. Berlin: Springer 2011 S. 369 - 394
Sheikh Sadi, Muhammad; Mizanur Rahman Khan, Md.; Nazim Uddin, Md. et al.
An Efficient Approach towards Mitigating Soft Errors RisksCoRR. Bd. abs/1110.3969. 2011
Jürjens, Jan
Automated Security Hardening for Evolving UML ModelsRichard N. Taylor;Harald Gall;Nenad Medvidović (Hrsg). Proceedings of the 33rd International Conference on Software Engineering ICSE 2011: May 21–28, 2011; Waikiki, Honolulu, Hawaii. New York, NY: ACM Association for Computing Machinery 2011 S. 986 - 988
Jürjens, Jan
Automated security hardening for evolving UML models.ICSE. 2011 S. 986 - 988
Schmidt, Holger; Jürjens, Jan
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsecHaralambos Mouratidis;Colette Rolland (Hrsg). Advanced Information Systems Engineering: 23rd International Conference, CAiSE 2011: London, UK, June 20-24, 2011; Proceedings. Berlin: Springer 2011 S. 367 - 382 (Lecture Notes in Computer Science)
Schmidt, Holger; Jürjens, Jan
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec.CAiSE. 2011 S. 367 - 382
Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic ExecutionCoRR. Bd. abs/1107.1017. 2011
Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan
Extracting and verifying cryptographic models from C protocol code by symbolic execution.ACM Conference on Computer and Communications Security. 2011 S. 331 - 340
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.
Guiding a General-Purpose C Verifier to Prove Cryptographic ProtocolsSteve Kremer;Michael Backes;Steve Zdancewic;Jonathan Herzog (Hrsg). 24th IEEE Computer Security Foundations Symposium CSF 2011: 27-29 June, 2011; Cernay-la-Ville, France. Los Alamitos, CA: IEEE Computer Society 2011 S. 3 - 17
Dupressoir, François; D. Gordon, Andrew; Jürjens, Jan et al.
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols.CSF. 2011 S. 3 - 17
Jürjens, Jan; Marchal, Loïc; Ochoa, Martín et al.
Incremental Security Verification for Evolving UMLsec modelsRobert B. France;Jochen M. Kuester;Behzad Bordbar;Richard F. Paige (Hrsg). Modelling Foundations and Applications: 7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings. Berlin: Springer 2011 S. 52 - 68 (Lecture Notes in Computer Science)
Jürjens, Jan; Marchal, Loïc; Ochoa, Martín et al.
Incremental Security Verification for Evolving UMLsec models.ECMFA. 2011 S. 52 - 68
Shaikh Sadi, Muhammad; Uddin, Md. Nazim; Khan, Md. Mizanur Rahman et al.
Mitigating Soft Error Risks through Protecting Critical Variables and BlocksSalah S. Al-Majeed;Chih-Lin Hu;Dhinaharan Nagamalai (Hrsg). Advances in Wireless, Mobile Networks and Applications: International Conferences, WiMoA 2011 and ICCSEA 2011, Dubai, United Arab Emirates, May 25-27, 2011. Proceedings. Berlin: Springer 2011 S. 137 - 145 (Communications in Computer and Information Science)
Fourneret, Elizabeta; Ochoa, Martin; Bouquet, Fabrice et al.
Model-Based Security Verification and Testing for Smart- cardsGünther Pernul;Juan-Carlos Trujillo Mondéjar;Edgar Weippl (Hrsg). Proceedings of the Sixth International Conference on Availability, Reliability and Security, ARES 2011: 22-26 August 2011; Vienna, Austria. Los Alamitos, CA: IEEE Computer Society 2011 S. 272 - 279
Fourneret, Elizabeta; Ochoa, Martín; Bouquet, Fabrice et al.
Model-Based Security Verification and Testing for Smart-cards.ARES. 2011 S. 272 - 279
Jürjens, Jan; Ochoa, Martín; Schmidt, Holger et al.
Modelling Secure Systems Evolution: Abstract and Concrete Change SpecificationsMarco Bernardo;Valérie Issarny (Hrsg). Formal Methods for Eternal Networked Software Systems: 11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2011, Bertinoro, Italy, June 13-18, 2011. Advanced Lectures. Berlin: Springer 2011 S. 504 - 526
Jürjens, Jan; Ochoa, Martín; Schmidt, Holger et al.
Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications.SFM. 2011 S. 504 - 526
Massacci, Fabio; Bouquet, Fabrice; Fourneret, Elizabeta et al.
Orchestrating Security and System Engineering for Evolving SystemsWitold Abramowicz;Ignacio M. Llorente;Mike Surridge;Andrea Zisman;Julien Vayssière (Hrsg). Towards a Service-Based Internet: 4th European Conference, ServiceWave 2011, Poznan, Poland, October 26-28, 2011. Proceedings. Berlin: Springer 2011 S. 134 - 143 (Lecture Notes in Computer Science)
Massacci, Fabio; Bouquet, Fabrice; Fourneret, Elizabeta et al.
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).ServiceWave. 2011 S. 134 - 143
Taubenberger, Stefan; Jürjens, Jan; Yu, Yijun et al.
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing DomainJan Camenisch;Simone Fischer-Hübner;Yuko Murayama;Armand Portmann;Carlos Rieder (Hrsg). Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings. Berlin: Springer 2011 S. 259 - 270
Taubenberger, Stefan; Jürjens, Jan; Yu, Yijun et al.
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain.SEC. 2011 S. 259 - 270
Rosado, David G.; Jürjens, Jan
Proceedings of the 8th International Workshop on Security in Information Systems WOSIS 2011; in conjunction with ICEIS 2011; Beijing, China; 8-9 June, 2011Setúbal: SciTePress 2011
Bauer, Andreas; Jürjens, Jan; Yu, Yijun
Run-Time Security Traceability for Evolving SystemsThe Computer Journal. Bd. 54. H. 1. Oxford: Oxford University Press 2011 S. 58 - 87
Bauer, Andreas; Jürjens, Jan; Yu, Yijun
Run-Time Security Traceability for Evolving Systems.Comput. J. Bd. 54. H. 1. 2011 S. 58 - 87
Jürjens, Jan
Security and Compliance in CloudsIT-Compliance 2011. Berlin (Germany). 2011 S. 1 - 25
Nhlabatsi, Armstrong; Bandara, Arosha; Hayashi, Shinpei et al.
Security Patterns: Comparing Modeling ApproachesHaralambos Mouratidis (Hrsg). Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: Information Science Reference 2011 S. 75 - 111
Lee, Seok-Won; Monga, Mattia; Jürjens, Jan
Seventh international workshop on software engineering for secure systems SESS 2011Richard N. Taylor;Harald Gall;Nenad Medvidović (Hrsg). Proceedings of the 33rd International Conference on Software Engineering ICSE 2011: May 21–28, 2011; Waikiki, Honolulu, Hawaii. New York, NY: ACM Association for Computing Machinery 2011 S. 1200 - 1201
Lee, Seok-Won; Monga, Mattia; Jürjens, Jan
Seventh international workshop on software engineering for secure systems: (SESS 2011).ICSE. 2011 S. 1200 - 1201
Jürjens, Jan; Nuseibeh, Bashar
Software Engineering for Secure Systems: Technical Briefing ACM 201133rd International Conference on Software Engineering (ICSE 2011). 2011 S. 1 - 28
Taubenberger, S.; Jürjens, Jan
Studie zu IT-Risikobewertungen in der PraxisPeter Schartner;Jürgen Taeger (Hrsg). D-A-CH security 2011: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Klagenfurt: Syssec 2011 S. 235 - 247
Knauss, Eric; Hilde Houmb, Siv; Schneider, Kurt et al.
Supporting Requirements Engineers in Recognising Security IssuesDaniel Berry;Xavier Franch (Hrsg). Requirements Engineering: Foundation for Software Quality; 17th International Working Conference, REFSQ 2011, Essen, Germany, March 28-30, 2011. Proceedings. Berlin: Springer 2011 S. 4 - 18 (Lecture Notes in Computer Science)
Knauss, Eric; Hilde Houmb, Siv; Schneider, Kurt et al.
Supporting Requirements Engineers in Recognising Security Issues.REFSQ. 2011 S. 4 - 18
Hatebur, Denis; Heisel, Maritta; Jürjens, Jan et al.
Systematic Development of UMLsec Design Models Based on Security RequirementsDimitra Giannakopoulou;Fernando Orejas (Hrsg). Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Berlin: Springer 2011 S. 232 - 246 (Lecture Notes in Computer Science)
Hatebur, Denis; Heisel, Maritta; Jürjens, Jan et al.
Systematic Development of UMLsec Design Models Based on Security Requirements.FASE. 2011 S. 232 - 246
Fernandez, Eduardo B.; Yoshioka, Nobukazu; Washizaki, Hironori et al.
Using Security Patterns to Develop Secure SystemsHaralambos Mouratidis (Hrsg). Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: Information Science Reference 2011 S. 16 - 31
Aizatulin, Mihhail; Dupressoir, François; Gordon, Andrew D. et al.
Verifying Cryptographic Code in C: Some Experience and the Csec ChallengeGilles Barthe;Anupam Datta;Sandro Etalle (Hrsg). Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Berlin: Springer 2011 S. 1 - 20
Aizatulin, Mihhail; Dupressoir, François; D. Gordon, Andrew et al.
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge.Formal Aspects in Security and Trust. 2011 S. 1 - 20
Peschke, Marc; Hirsch, Martin; Jürjens, Jan et al.
Werkzeuggestützte Identifikation von IT-SicherheitsrisikenPeter Schartner;Jürgen Taeger (Hrsg). D-A-CH security 2011: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Klagenfurt: Syssec 2011 S. 267 - 278
Beckers, Kristian; Hirsch, Martin; Jürjens, Jan
Compliance in Clouds: A cloud computing security perspectiveGI SECMGT-Workshop. Frankfurt (Germany). 2010 S. 1 - 26
Sheikh Sadi, Muhammad; Myers, D. G.; Ortega-Sanchez, Cesar et al.
Component criticality analysis to minimize soft errors riskInternational Journal of Computer Systems Science & Engineering. Bd. 25. H. 5. London: CRL 2010 S. 23 - 37
Sheikh Sadi, Muhammad; G. Myers, D.; Ortega-Sanchez, Cesar et al.
Component criticality analysis to minimize soft errors risk.Comput. Syst. Sci. Eng. Bd. 25. H. 5. 2010
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Cryptographic Security Verification for C by Symbolic Execution: A 5-minute presentationComputer Security Foundations Symposium (CSF). 2010
Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsecRequirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93
Hilde Houmb, Siv; Islam, Shareeful; Knauss, Eric et al.
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec.Requir. Eng. Bd. 15. H. 1. 2010 S. 63 - 93
Pironti, Alfredo; Jürjens, Jan
Formally-Based Black-Box Monitoring of Security ProtocolsFabio Massacci;Dan Wallach;Nicola Zannone (Hrsg). Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Berlin: Springer 2010 S. 79 - 95 (Lecture Notes in Computer Science)
Pironti, Alfredo; Jürjens, Jan
Formally-Based Black-Box Monitoring of Security Protocols.ESSoS. 2010 S. 79 - 95
Mouratidis, Haralambos; Jürjens, Jan
From goal-driven security requirements engineering to secure designInternational Journal of Intelligent Systems. Bd. 25. H. 8. New York, NY: Wiley 2010 S. 813 - 840
Mouratidis, Haralambos; Jürjens, Jan
From goal-driven security requirements engineering to secure design.Int. J. Intell. Syst. Bd. 25. H. 8. 2010 S. 813 - 840
Höhn, Sebastian; Lowis, Lutz; Jürjens, Jan et al.
Identification of Vulnerabilities in Web Services using Model-based SecurityCarlos A. Gutiérrez;Eduardo Fernández-Medina;Mario Piattini (Hrsg). Web Services Security Development and Architecture: Theoretical and Practical Issues. Hershey, PA: Information Science Reference 2010 S. 1 - 32
Jürjens, Jan
Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote)Paloma Díaz;Mary Beth Rosson;Christopher Hundhausen;Emmanuel Pietriga (Hrsg). IEEE Symposium on Visual Languages and Human-Centric Computing VL/HCC 2010: 21-25 September, 2010; Leganes, Madrid, Spain. Los Alamitos, CA: IEEE Computer Society 2010 S. 4 - 6
Jürjens, Jan
Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote).VL/HCC. 2010 S. 4
Jürjens, Jan
Modell-basierte Analyse von Geschäftsprozessen und Architekturen4. COMPARC Fokustag, Fraunhofer ISST, 20 Jan. 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010
Jürjens, Jan
Outsourcing, SaaS & Clouds: Aber sicher! (... und compliant)Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2010). Wuppertal (Germany). 2010
Lee, Seok-Won; Monga, Mattia; Jürjens, Jan
Proceeding of the 2010 ICSE Workshop on Software Engineering for Secure Systems SESS 2010: May 2, 2010; Cape Town, South Africa in conjunction with The 32nd ACM/IEEE International Conference on Software Engineering ICSE 2010; May 2–8, 2010New York, NY: ACM Association for Computing Machinery 2010
Bauer, Andreas; Jürjens, Jan
Runtime verification of cryptographic protocolsComputers & Security. Bd. 29. H. 3. Amsterdam: Elsevier 2010 S. 315 - 330
Bauer, Andreas; Jürjens, Jan
Runtime verification of cryptographic protocols.Computers & Security. Bd. 29. H. 3. 2010 S. 315 - 330
Beckers, K.; Jürjens, Jan
Security and Compliance in CloudsInformation Security Solutions Europe (ISSE 2010). Berlin (Germany). 2010
Beckers, Kristian; Jürjens, Jan
Security and Compliance in Clouds.ISSE. 2010 S. 91 - 100
Jürjens, Jan
Security und Compliance in Clouds5. COMPARC Fokustag, Fraunhofer ISST, 20 May 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010
Lee, Seok-Won; Monga, Mattia; Jürjens, Jan
The 6 International Workshop on Software Engineering for Secure Systems (SESS'10).ICSE (2). 2010 S. 433 - 434
Lee, Seok-Won; Monga, Mattia; Jürjens, Jan
The 6th International Workshop on Software Engineering for Secure Systems SESS 2010Jeff Kramer;Judith Bishop;Prem Devanbu;Sebastian Uchitel (Hrsg). Proceeding of the 32nd International Conference on Software Engineering ICSE 2010: Volume 2; 1-8 May 2010 Cape Town, South Africa. New York, NY: ACM Association for Computing Machinery 2010 S. 433 - 434
Montrieux, Lionel; Jürjens, Jan; B. Haley, Charles et al.
Tool Support for Code Generation from a UMLsec PropertyCharles Pecheur;Jamie Andrews;Elisabetta Di Nitto (Hrsg). Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering ASE 2010: September 20 - 24, 2010; Antwerp, Belgium. New York, NY: ACM Association for Computing Machinery 2010 S. 357 - 358
Montrieux, Lionel; Jürjens, Jan; B. Haley, Charles et al.
Tool support for code generation from a UMLsec property.ASE. 2010 S. 357 - 358
Blanco, Carlos; Fernández-Medina, Eduardo; Trujillo, Juan et al.
Towards the Secure Modelling of OLAP Users' Behaviour.Secure Data Management. 2010 S. 101 - 112
Blanco, Carlos; Fernández-Medina, Eduardo; Trujillo, Juan et al.
Towards the Secure Modelling of OLAP Users’ BehaviourWillem Jonker;Milan Petković (Hrsg). Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings. Berlin: Springer 2010 S. 101 - 112 (Lecture Notes in Computer Science)
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan
Verifying authentication properties of C security protocol code using general verifiersFourth International Workshop on Analysis of Security APIs,. 2010
Jürjens, Jan
A domain-specific language for cryptographic protocols based on streamsThe Journal of Logic and Algebraic Programming. Bd. 78. H. 2. Amsterdam: Elsevier 2009 S. 54 - 73
Jürjens, Jan
A domain-specific language for cryptographic protocols based on streams.J. Log. Algebr. Program. Bd. 78. H. 2. 2009 S. 54 - 73
Sadi, Muhammad Sheikh; Jürjens, Jan
A Novel Approach to Minimizing the Risks of Soft Errors in Mobile and Ubiquitous SystemsLalit Goel;King-Jet Tseng;Sabu Emmanuel;Geok-See Ng (Hrsg). Proceeding of the IEEE Region 10 Conference TENCON 2009; 23 – 26 November 2009; Singapore. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2009 S. 1 - 6
Jürjens, Jan
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie ProjectElectronic Notes in Theoretical Computer Science. Bd. 250. H. 1. Amsterdam: Elsevier 2009 S. 123 - 136
Jürjens, Jan
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project.Electr. Notes Theor. Comput. Sci. Bd. 250. H. 1. 2009 S. 123 - 136
Jürjens, Jan; Weber, Tjark
Finite Models in FOL-Based Crypto-Protocol VerificationPierpaolo Degano;Luca Viganò (Hrsg). Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers. Berlin: Springer 2009 S. 155 - 172 (Lecture Notes in Computer Science)
Jürjens, Jan; Weber, Tjark
Finite Models in FOL-Based Crypto-Protocol Verification.ARSPA-WITS. 2009 S. 155 - 172
Jürjens, Jan
Formal Foundations for Verifying Security-Critical Software: A Tutorial12th European Joint Conferences on Theory and Practice of Software (ETAPS 2009). 2009
Jürjens, Jan
Model-based Security Engineering with UMLsecSerenity Day: Establishing IT Security as a full engineering discipline. Brussels. 2009
Jürjens, Jan
Model-based Security Testing Supporting Evolution14th Software & Systems Quality Conferences (SQC’09). Congress Center Düsseldorf (Germany). 2009 S. 1 - 34
Fernández-Medina, Eduardo; Jürjens, Jan; Trujillo, Juan et al.
Model-Driven Development for secure information systemsInformation and Software Technology. Bd. 51. H. 5. Amsterdam: Elsevier 2009 S. 809 - 814
Fernández-Medina, Eduardo; Jürjens, Jan; Trujillo, Juan et al.
Model-Driven Development for secure information systems.Information & Software Technology. Bd. 51. H. 5. 2009 S. 809 - 814
Washizaki, Hironori; Yoshioka, Nobukazu; B. Fernández, Eduardo et al.
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09).OOPSLA Companion. 2009 S. 713 - 714
Washizaki, Hironori; Yoshioka, Nobukazu; Fernández, Eduardo B. et al.
Overview of the 3rd international workshop on software patterns and quality (SPAQu’09)Shail Arora;Bernd Bruegge;Gary Leavens;Yvonne Coady;Simon Peyton-Jones (Hrsg). Proceeding of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications OOPSLA 2009: Orlando, Florida, USA; October 25 - 29, 2009. New York, NY: ACM Association for Computing Machinery 2009 S. 713 - 714
Woodside, Murray; Petriu, Dorina C.; Petriu, Dorin Bogdan et al.
Performance analysis of security aspects by weaving scenarios extracted from UML modelsJournal of Systems and Software. Bd. 82. H. 1. Amsterdam: Elsevier 2009 S. 56 - 74
Murray Woodside, C.; C. Petriu, Dorina; Bogdan Petriu, Dorin et al.
Performance analysis of security aspects by weaving scenarios extracted from UML models.Journal of Systems and Software. Bd. 82. H. 1. 2009 S. 56 - 74
Jürjens, Jan; Fernandez, Eduardo
Secure Database DevelopmentLiu, Ling; Özsu, M. Tamer (Hrsg). Encyclopedia of Database Systems. Springer 2009 S. 2528 - 2534
Jürjens, Jan; B. Fernández, Eduardo
Secure Database Development.Encyclopedia of Database Systems. 2009 S. 2528 - 2534
Mouratidis, Haralambos; Sunyaev, Ali; Jürjens, Jan
Secure Information Systems Engineering: Experiences and Lessons Learned from two Health Care ProjectsPascal van Eck;Jaap Gordijn;Roel Wieringa (Hrsg). Advanced Information Systems Engineering: 21st International Conference, CAiSE 2009: Amsterdam, The Netherlands, June 8-12, 2009; Proceedings. Berlin: Springer 2009 S. 231 - 245 (Lecture Notes in Computer Science)
Mouratidis, Haralambos; Sunyaev, Ali; Jürjens, Jan
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects.CAiSE. 2009 S. 231 - 245
Lloyd, John; Jürjens, Jan
Security Analysis of a Biometric Authentication System using UMLsec and JMLAndy Schürr;Bran Selic (Hrsg). Model Driven Engineering Languages and Systems: 12th International Conference, MODELS 2009, Denver, CO, USA, October 4-9, 2009. Proceedings. Berlin: Springer 2009 S. 77 - 91 (Lecture Notes in Computer Science)
Lloyd, John; Jürjens, Jan
Security Analysis of a Biometric Authentication System Using UMLsec and JML.MoDELS. 2009 S. 77 - 91
Jürjens, Jan
Security and Dependability EngineeringSpyros Kokolakis;Antonio Maña Gómez;George Spanoudakis (Hrsg). Security and Dependability for Ambient Intelligence. Boston: Springer 2009 S. 21 - 36 (Lecture Notes in Computer Science)
Jürjens, Jan
Security and Dependability Engineering.Security and Dependability for Ambient Intelligence. 2009 S. 21 - 36
Ratiu, Daniel; Marinescu, Radu; Jürjens, Jan
The Logical Modularity of ProgramsAndy Zaidman;Giuliano Antoniol;Stéphane Ducasee (Hrsg). Proceedings of the 16th Working Conference on Reverse Engineering WCRE 2009: 13th - 16th October 2009; Lille, France. Los Alamitos, CA: IEEE Computer Society 2009 S. 123 - 127
Ratiu, Daniel; Marinescu, Radu; Jürjens, Jan
The Logical Modularity of Programs.WCRE. 2009 S. 123 - 127
Jürjens, Jan; Schreck, Jörg; Yu, Yijun
Automated Analysis of Permission-Based Security using UMLsecJosé Luiz Fiadeiro;Paola Inverardi (Hrsg). Fundamental Approaches to Software Engineering: 11th International Conference, FASE 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings. Berlin: Springer 2008 S. 292 - 295 (Lecture Notes in Computer Science)
Jürjens, Jan; Schreck, Jörg; Yu, Yijun
Automated Analysis of Permission-Based Security Using UMLsec.FASE. 2008 S. 292 - 295
Giddings, Michael; Jürjens, Jan; Allen, Pat
Challenges for the model based development of distributed real time systems: Position PaperMarko Bošković;Dragan Gašević;Claus Pahl;Bernhard Schätz (Hrsg). Proceedings of the 1st International Workshop on Non-functional System Properties in Domain Specific Modeling Languages NFPinDSML-2008; Affiliated with the 11th International Conference on Model Driven Engineering Languages and Systems MoDELS 2008: Toulouse, France; September 28, 2008. Aachen: CEUR/RWTH 2008 S. 1 - 8