Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
Ergebnisse pro Seite:  100

Islam, Shareeful; Mouratidis, Haralambos; Jürjens, Jan

A framework to support alignment of secure software engineering with legal regulations.

Software and System Modeling. Bd. 10. H. 3. 2011 S. 369 - 394


Islam, Shareeful; Mouratidis, Haralambos; Jürjens, Jan

A framework to support alignment of secure software engineeringwith legal regulations

Software and Systems Modeling. Bd. 10. H. 3. Berlin: Springer 2011 S. 369 - 394


Sheikh Sadi, Muhammad; Mizanur Rahman Khan, Md.; Nazim Uddin, Md. et al.

An Efficient Approach towards Mitigating Soft Errors Risks

CoRR. Bd. abs/1110.3969. 2011


Jürjens, Jan

Automated Security Hardening for Evolving UML Models

Richard N. Taylor;Harald Gall;Nenad Medvidović (Hrsg). Proceedings of the 33rd International Conference on Software Engineering ICSE 2011: May 21–28, 2011; Waikiki, Honolulu, Hawaii. New York, NY: ACM Association for Computing Machinery 2011 S. 986 - 988


Jürjens, Jan

Automated security hardening for evolving UML models.

ICSE. 2011 S. 986 - 988


Schmidt, Holger; Jürjens, Jan

Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec

Haralambos Mouratidis;Colette Rolland (Hrsg). Advanced Information Systems Engineering: 23rd International Conference, CAiSE 2011: London, UK, June 20-24, 2011; Proceedings. Berlin: Springer 2011 S. 367 - 382 (Lecture Notes in Computer Science)


Schmidt, Holger; Jürjens, Jan

Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec.

CAiSE. 2011 S. 367 - 382


Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan

Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution

CoRR. Bd. abs/1107.1017. 2011


Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan

Extracting and verifying cryptographic models from C protocol code by symbolic execution.

ACM Conference on Computer and Communications Security. 2011 S. 331 - 340


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.

Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols

Steve Kremer;Michael Backes;Steve Zdancewic;Jonathan Herzog (Hrsg). 24th IEEE Computer Security Foundations Symposium CSF 2011: 27-29 June, 2011; Cernay-la-Ville, France. Los Alamitos, CA: IEEE Computer Society 2011 S. 3 - 17


Dupressoir, François; D. Gordon, Andrew; Jürjens, Jan et al.

Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols.

CSF. 2011 S. 3 - 17


Jürjens, Jan; Marchal, Loïc; Ochoa, Martín et al.

Incremental Security Verification for Evolving UMLsec models

Robert B. France;Jochen M. Kuester;Behzad Bordbar;Richard F. Paige (Hrsg). Modelling Foundations and Applications: 7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings. Berlin: Springer 2011 S. 52 - 68 (Lecture Notes in Computer Science)


Jürjens, Jan; Marchal, Loïc; Ochoa, Martín et al.

Incremental Security Verification for Evolving UMLsec models.

ECMFA. 2011 S. 52 - 68


Shaikh Sadi, Muhammad; Uddin, Md. Nazim; Khan, Md. Mizanur Rahman et al.

Mitigating Soft Error Risks through Protecting Critical Variables and Blocks

Salah S. Al-Majeed;Chih-Lin Hu;Dhinaharan Nagamalai (Hrsg). Advances in Wireless, Mobile Networks and Applications: International Conferences, WiMoA 2011 and ICCSEA 2011, Dubai, United Arab Emirates, May 25-27, 2011. Proceedings. Berlin: Springer 2011 S. 137 - 145 (Communications in Computer and Information Science)


Fourneret, Elizabeta; Ochoa, Martin; Bouquet, Fabrice et al.

Model-Based Security Verification and Testing for Smart- cards

Günther Pernul;Juan-Carlos Trujillo Mondéjar;Edgar Weippl (Hrsg). Proceedings of the Sixth International Conference on Availability, Reliability and Security, ARES 2011: 22-26 August 2011; Vienna, Austria. Los Alamitos, CA: IEEE Computer Society 2011 S. 272 - 279


Fourneret, Elizabeta; Ochoa, Martín; Bouquet, Fabrice et al.

Model-Based Security Verification and Testing for Smart-cards.

ARES. 2011 S. 272 - 279


Jürjens, Jan; Ochoa, Martín; Schmidt, Holger et al.

Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications

Marco Bernardo;Valérie Issarny (Hrsg). Formal Methods for Eternal Networked Software Systems: 11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2011, Bertinoro, Italy, June 13-18, 2011. Advanced Lectures. Berlin: Springer 2011 S. 504 - 526


Jürjens, Jan; Ochoa, Martín; Schmidt, Holger et al.

Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications.

SFM. 2011 S. 504 - 526


Massacci, Fabio; Bouquet, Fabrice; Fourneret, Elizabeta et al.

Orchestrating Security and System Engineering for Evolving Systems

Witold Abramowicz;Ignacio M. Llorente;Mike Surridge;Andrea Zisman;Julien Vayssière (Hrsg). Towards a Service-Based Internet: 4th European Conference, ServiceWave 2011, Poznan, Poland, October 26-28, 2011. Proceedings. Berlin: Springer 2011 S. 134 - 143 (Lecture Notes in Computer Science)


Massacci, Fabio; Bouquet, Fabrice; Fourneret, Elizabeta et al.

Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).

ServiceWave. 2011 S. 134 - 143


Taubenberger, Stefan; Jürjens, Jan; Yu, Yijun et al.

Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain

Jan Camenisch;Simone Fischer-Hübner;Yuko Murayama;Armand Portmann;Carlos Rieder (Hrsg). Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings. Berlin: Springer 2011 S. 259 - 270






Bauer, Andreas; Jürjens, Jan; Yu, Yijun

Run-Time Security Traceability for Evolving Systems

The Computer Journal. Bd. 54. H. 1. Oxford: Oxford University Press 2011 S. 58 - 87


Bauer, Andreas; Jürjens, Jan; Yu, Yijun

Run-Time Security Traceability for Evolving Systems.

Comput. J. Bd. 54. H. 1. 2011 S. 58 - 87


Jürjens, Jan

Security and Compliance in Clouds

IT-Compliance 2011. Berlin (Germany). 2011 S. 1 - 25


Nhlabatsi, Armstrong; Bandara, Arosha; Hayashi, Shinpei et al.

Security Patterns: Comparing Modeling Approaches

Haralambos Mouratidis (Hrsg). Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: Information Science Reference 2011 S. 75 - 111


Lee, Seok-Won; Monga, Mattia; Jürjens, Jan

Seventh international workshop on software engineering for secure systems SESS 2011

Richard N. Taylor;Harald Gall;Nenad Medvidović (Hrsg). Proceedings of the 33rd International Conference on Software Engineering ICSE 2011: May 21–28, 2011; Waikiki, Honolulu, Hawaii. New York, NY: ACM Association for Computing Machinery 2011 S. 1200 - 1201


Lee, Seok-Won; Monga, Mattia; Jürjens, Jan

Seventh international workshop on software engineering for secure systems: (SESS 2011).

ICSE. 2011 S. 1200 - 1201


Jürjens, Jan; Nuseibeh, Bashar

Software Engineering for Secure Systems: Technical Briefing ACM 2011

33rd International Conference on Software Engineering (ICSE 2011). 2011 S. 1 - 28


Taubenberger, S.; Jürjens, Jan

Studie zu IT-Risikobewertungen in der Praxis

Peter Schartner;Jürgen Taeger (Hrsg). D-A-CH security 2011: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Klagenfurt: Syssec 2011 S. 235 - 247


Knauss, Eric; Hilde Houmb, Siv; Schneider, Kurt et al.

Supporting Requirements Engineers in Recognising Security Issues

Daniel Berry;Xavier Franch (Hrsg). Requirements Engineering: Foundation for Software Quality; 17th International Working Conference, REFSQ 2011, Essen, Germany, March 28-30, 2011. Proceedings. Berlin: Springer 2011 S. 4 - 18 (Lecture Notes in Computer Science)


Knauss, Eric; Hilde Houmb, Siv; Schneider, Kurt et al.

Supporting Requirements Engineers in Recognising Security Issues.

REFSQ. 2011 S. 4 - 18


Hatebur, Denis; Heisel, Maritta; Jürjens, Jan et al.

Systematic Development of UMLsec Design Models Based on Security Requirements

Dimitra Giannakopoulou;Fernando Orejas (Hrsg). Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Berlin: Springer 2011 S. 232 - 246 (Lecture Notes in Computer Science)


Hatebur, Denis; Heisel, Maritta; Jürjens, Jan et al.

Systematic Development of UMLsec Design Models Based on Security Requirements.

FASE. 2011 S. 232 - 246


Fernandez, Eduardo B.; Yoshioka, Nobukazu; Washizaki, Hironori et al.

Using Security Patterns to Develop Secure Systems

Haralambos Mouratidis (Hrsg). Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: Information Science Reference 2011 S. 16 - 31


Aizatulin, Mihhail; Dupressoir, François; Gordon, Andrew D. et al.

Verifying Cryptographic Code in C: Some Experience and the Csec Challenge

Gilles Barthe;Anupam Datta;Sandro Etalle (Hrsg). Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Berlin: Springer 2011 S. 1 - 20


Aizatulin, Mihhail; Dupressoir, François; D. Gordon, Andrew et al.

Verifying Cryptographic Code in C: Some Experience and the Csec Challenge.

Formal Aspects in Security and Trust. 2011 S. 1 - 20


Peschke, Marc; Hirsch, Martin; Jürjens, Jan et al.

Werkzeuggestützte Identifikation von IT-Sicherheitsrisiken

Peter Schartner;Jürgen Taeger (Hrsg). D-A-CH security 2011: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Klagenfurt: Syssec 2011 S. 267 - 278



Beckers, Kristian; Hirsch, Martin; Jürjens, Jan

Compliance in Clouds: A cloud computing security perspective

GI SECMGT-Workshop. Frankfurt (Germany). 2010 S. 1 - 26


Sheikh Sadi, Muhammad; Myers, D. G.; Ortega-Sanchez, Cesar et al.

Component criticality analysis to minimize soft errors risk

International Journal of Computer Systems Science & Engineering. Bd. 25. H. 5. London: CRL 2010 S. 23 - 37


Sheikh Sadi, Muhammad; G. Myers, D.; Ortega-Sanchez, Cesar et al.

Component criticality analysis to minimize soft errors risk.

Comput. Syst. Sci. Eng. Bd. 25. H. 5. 2010


Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Cryptographic Security Verification for C by Symbolic Execution: A 5-minute presentation

Computer Security Foundations Symposium (CSF). 2010


Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.

Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec

Requirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93


Hilde Houmb, Siv; Islam, Shareeful; Knauss, Eric et al.

Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec.

Requir. Eng. Bd. 15. H. 1. 2010 S. 63 - 93


Pironti, Alfredo; Jürjens, Jan

Formally-Based Black-Box Monitoring of Security Protocols

Fabio Massacci;Dan Wallach;Nicola Zannone (Hrsg). Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Berlin: Springer 2010 S. 79 - 95 (Lecture Notes in Computer Science)


Pironti, Alfredo; Jürjens, Jan

Formally-Based Black-Box Monitoring of Security Protocols.

ESSoS. 2010 S. 79 - 95


Mouratidis, Haralambos; Jürjens, Jan

From goal-driven security requirements engineering to secure design

International Journal of Intelligent Systems. Bd. 25. H. 8. New York, NY: Wiley 2010 S. 813 - 840


Mouratidis, Haralambos; Jürjens, Jan

From goal-driven security requirements engineering to secure design.

Int. J. Intell. Syst. Bd. 25. H. 8. 2010 S. 813 - 840



Höhn, Sebastian; Lowis, Lutz; Jürjens, Jan et al.

Identification of Vulnerabilities in Web Services using Model-based Security

Carlos A. Gutiérrez;Eduardo Fernández-Medina;Mario Piattini (Hrsg). Web Services Security Development and Architecture: Theoretical and Practical Issues. Hershey, PA: Information Science Reference 2010 S. 1 - 32


Jürjens, Jan

Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote)

Paloma Díaz;Mary Beth Rosson;Christopher Hundhausen;Emmanuel Pietriga (Hrsg). IEEE Symposium on Visual Languages and Human-Centric Computing VL/HCC 2010: 21-25 September, 2010; Leganes, Madrid, Spain. Los Alamitos, CA: IEEE Computer Society 2010 S. 4 - 6



Jürjens, Jan

Modell-basierte Analyse von Geschäftsprozessen und Architekturen

4. COMPARC Fokustag, Fraunhofer ISST, 20 Jan. 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010


Jürjens, Jan

Outsourcing, SaaS & Clouds: Aber sicher! (... und compliant)

Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2010). Wuppertal (Germany). 2010



Bauer, Andreas; Jürjens, Jan

Runtime verification of cryptographic protocols

Computers & Security. Bd. 29. H. 3. Amsterdam: Elsevier 2010 S. 315 - 330


Bauer, Andreas; Jürjens, Jan

Runtime verification of cryptographic protocols.

Computers & Security. Bd. 29. H. 3. 2010 S. 315 - 330


Beckers, K.; Jürjens, Jan

Security and Compliance in Clouds

Information Security Solutions Europe (ISSE 2010). Berlin (Germany). 2010


Beckers, Kristian; Jürjens, Jan

Security and Compliance in Clouds.

ISSE. 2010 S. 91 - 100


Jürjens, Jan

Security und Compliance in Clouds

5. COMPARC Fokustag, Fraunhofer ISST, 20 May 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010


Lee, Seok-Won; Monga, Mattia; Jürjens, Jan

The 6 International Workshop on Software Engineering for Secure Systems (SESS'10).

ICSE (2). 2010 S. 433 - 434


Lee, Seok-Won; Monga, Mattia; Jürjens, Jan

The 6th International Workshop on Software Engineering for Secure Systems SESS 2010

Jeff Kramer;Judith Bishop;Prem Devanbu;Sebastian Uchitel (Hrsg). Proceeding of the 32nd International Conference on Software Engineering ICSE 2010: Volume 2; 1-8 May 2010 Cape Town, South Africa. New York, NY: ACM Association for Computing Machinery 2010 S. 433 - 434


Montrieux, Lionel; Jürjens, Jan; B. Haley, Charles et al.

Tool Support for Code Generation from a UMLsec Property

Charles Pecheur;Jamie Andrews;Elisabetta Di Nitto (Hrsg). Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering ASE 2010: September 20 - 24, 2010; Antwerp, Belgium. New York, NY: ACM Association for Computing Machinery 2010 S. 357 - 358


Montrieux, Lionel; Jürjens, Jan; B. Haley, Charles et al.

Tool support for code generation from a UMLsec property.

ASE. 2010 S. 357 - 358


Blanco, Carlos; Fernández-Medina, Eduardo; Trujillo, Juan et al.

Towards the Secure Modelling of OLAP Users' Behaviour.

Secure Data Management. 2010 S. 101 - 112


Blanco, Carlos; Fernández-Medina, Eduardo; Trujillo, Juan et al.

Towards the Secure Modelling of OLAP Users’ Behaviour

Willem Jonker;Milan Petković (Hrsg). Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings. Berlin: Springer 2010 S. 101 - 112 (Lecture Notes in Computer Science)


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan

Verifying authentication properties of C security protocol code using general verifiers

Fourth International Workshop on Analysis of Security APIs,. 2010


Jürjens, Jan

A domain-specific language for cryptographic protocols based on streams

The Journal of Logic and Algebraic Programming. Bd. 78. H. 2. Amsterdam: Elsevier 2009 S. 54 - 73


Jürjens, Jan

A domain-specific language for cryptographic protocols based on streams.

J. Log. Algebr. Program. Bd. 78. H. 2. 2009 S. 54 - 73


Sadi, Muhammad Sheikh; Jürjens, Jan

A Novel Approach to Minimizing the Risks of Soft Errors in Mobile and Ubiquitous Systems

Lalit Goel;King-Jet Tseng;Sabu Emmanuel;Geok-See Ng (Hrsg). Proceeding of the IEEE Region 10 Conference TENCON 2009; 23 – 26 November 2009; Singapore. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2009 S. 1 - 6


Jürjens, Jan

Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project

Electronic Notes in Theoretical Computer Science. Bd. 250. H. 1. Amsterdam: Elsevier 2009 S. 123 - 136


Jürjens, Jan

Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project.

Electr. Notes Theor. Comput. Sci. Bd. 250. H. 1. 2009 S. 123 - 136


Jürjens, Jan; Weber, Tjark

Finite Models in FOL-Based Crypto-Protocol Verification

Pierpaolo Degano;Luca Viganò (Hrsg). Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers. Berlin: Springer 2009 S. 155 - 172 (Lecture Notes in Computer Science)


Jürjens, Jan; Weber, Tjark

Finite Models in FOL-Based Crypto-Protocol Verification.

ARSPA-WITS. 2009 S. 155 - 172


Jürjens, Jan

Formal Foundations for Verifying Security-Critical Software: A Tutorial

12th European Joint Conferences on Theory and Practice of Software (ETAPS 2009). 2009


Jürjens, Jan

Model-based Security Engineering with UMLsec

Serenity Day: Establishing IT Security as a full engineering discipline. Brussels. 2009


Jürjens, Jan

Model-based Security Testing Supporting Evolution

14th Software & Systems Quality Conferences (SQC’09). Congress Center Düsseldorf (Germany). 2009 S. 1 - 34


Fernández-Medina, Eduardo; Jürjens, Jan; Trujillo, Juan et al.

Model-Driven Development for secure information systems

Information and Software Technology. Bd. 51. H. 5. Amsterdam: Elsevier 2009 S. 809 - 814


Fernández-Medina, Eduardo; Jürjens, Jan; Trujillo, Juan et al.

Model-Driven Development for secure information systems.

Information & Software Technology. Bd. 51. H. 5. 2009 S. 809 - 814


Washizaki, Hironori; Yoshioka, Nobukazu; B. Fernández, Eduardo et al.

Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09).

OOPSLA Companion. 2009 S. 713 - 714


Washizaki, Hironori; Yoshioka, Nobukazu; Fernández, Eduardo B. et al.

Overview of the 3rd international workshop on software patterns and quality (SPAQu’09)

Shail Arora;Bernd Bruegge;Gary Leavens;Yvonne Coady;Simon Peyton-Jones (Hrsg). Proceeding of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications OOPSLA 2009: Orlando, Florida, USA; October 25 - 29, 2009. New York, NY: ACM Association for Computing Machinery 2009 S. 713 - 714


Woodside, Murray; Petriu, Dorina C.; Petriu, Dorin Bogdan et al.

Performance analysis of security aspects by weaving scenarios extracted from UML models

Journal of Systems and Software. Bd. 82. H. 1. Amsterdam: Elsevier 2009 S. 56 - 74


Murray Woodside, C.; C. Petriu, Dorina; Bogdan Petriu, Dorin et al.

Performance analysis of security aspects by weaving scenarios extracted from UML models.

Journal of Systems and Software. Bd. 82. H. 1. 2009 S. 56 - 74


Jürjens, Jan; Fernandez, Eduardo

Secure Database Development

Liu, Ling; Özsu, M. Tamer (Hrsg). Encyclopedia of Database Systems. Springer 2009 S. 2528 - 2534


Jürjens, Jan; B. Fernández, Eduardo

Secure Database Development.

Encyclopedia of Database Systems. 2009 S. 2528 - 2534


Mouratidis, Haralambos; Sunyaev, Ali; Jürjens, Jan

Secure Information Systems Engineering: Experiences and Lessons Learned from two Health Care Projects

Pascal van Eck;Jaap Gordijn;Roel Wieringa (Hrsg). Advanced Information Systems Engineering: 21st International Conference, CAiSE 2009: Amsterdam, The Netherlands, June 8-12, 2009; Proceedings. Berlin: Springer 2009 S. 231 - 245 (Lecture Notes in Computer Science)


Mouratidis, Haralambos; Sunyaev, Ali; Jürjens, Jan

Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects.

CAiSE. 2009 S. 231 - 245


Lloyd, John; Jürjens, Jan

Security Analysis of a Biometric Authentication System using UMLsec and JML

Andy Schürr;Bran Selic (Hrsg). Model Driven Engineering Languages and Systems: 12th International Conference, MODELS 2009, Denver, CO, USA, October 4-9, 2009. Proceedings. Berlin: Springer 2009 S. 77 - 91 (Lecture Notes in Computer Science)


Lloyd, John; Jürjens, Jan

Security Analysis of a Biometric Authentication System Using UMLsec and JML.

MoDELS. 2009 S. 77 - 91


Jürjens, Jan

Security and Dependability Engineering

Spyros Kokolakis;Antonio Maña Gómez;George Spanoudakis (Hrsg). Security and Dependability for Ambient Intelligence. Boston: Springer 2009 S. 21 - 36 (Lecture Notes in Computer Science)


Jürjens, Jan

Security and Dependability Engineering.

Security and Dependability for Ambient Intelligence. 2009 S. 21 - 36


Ratiu, Daniel; Marinescu, Radu; Jürjens, Jan

The Logical Modularity of Programs

Andy Zaidman;Giuliano Antoniol;Stéphane Ducasee (Hrsg). Proceedings of the 16th Working Conference on Reverse Engineering WCRE 2009: 13th - 16th October 2009; Lille, France. Los Alamitos, CA: IEEE Computer Society 2009 S. 123 - 127


Ratiu, Daniel; Marinescu, Radu; Jürjens, Jan

The Logical Modularity of Programs.

WCRE. 2009 S. 123 - 127


Jürjens, Jan; Schreck, Jörg; Yu, Yijun

Automated Analysis of Permission-Based Security using UMLsec

José Luiz Fiadeiro;Paola Inverardi (Hrsg). Fundamental Approaches to Software Engineering: 11th International Conference, FASE 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings. Berlin: Springer 2008 S. 292 - 295 (Lecture Notes in Computer Science)


Jürjens, Jan; Schreck, Jörg; Yu, Yijun

Automated Analysis of Permission-Based Security Using UMLsec.

FASE. 2008 S. 292 - 295


Giddings, Michael; Jürjens, Jan; Allen, Pat

Challenges for the model based development of distributed real time systems: Position Paper

Marko Bošković;Dragan Gašević;Claus Pahl;Bernhard Schätz (Hrsg). Proceedings of the 1st International Workshop on Non-functional System Properties in Domain Specific Modeling Languages NFPinDSML-2008; Affiliated with the 11th International Conference on Model Driven Engineering Languages and Systems MoDELS 2008: Toulouse, France; September 28, 2008. Aachen: CEUR/RWTH 2008 S. 1 - 8