Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Prof. Dr. Jan Jürjens

Institut für Softwaretechnik, Universität Koblenz

Publikationen
Ergebnisse pro Seite:  100

Bürger, Jens; Strüber, Daniel; Gärtner, Stefan et al.

A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary)

Jörg Becker;Dmitriy Novikov;Raisa Uskenbaeva;Dmitry M. Nazarov;Olga A. Tsukanova;Judith Barrios Albornoz;Elena Kornyshova;Oscar Pastor;A V. Shchepkin;V. O. Korepanov;D. Fedyanin;V.N. Burkov (Hrsg). Proceedings of the 21st IEEE Conference on Business Informatics CBI 2019: 15 - 17 July 2019; Moscow, Russia. Los Alamitos, CA: IEEE Computer Society 2019 S. 179 - 180 (LNI)


Jürjens, Jan

Aktuelle Innovationen in Software Engineering, Data Analytics und IT-Sicherheit

Debeka Innovationswoche, Debeka Innovation Center (DICE), 22.5.2019. Debeka Innovation Center (DICE) 2019


Jürjens, Jan

Erfahrungen mit Design Thinking: Design eines MVP für 3-D-Druck mittels Blockchain

Debeka Innovation Center (DICE), 17.5.2019. Debeka Innovation Center (DICE) 2019


Ramadan, Qusai; Ahmadian, Amir Shayan; Jürjens, Jan et al.

Explaining Algorithmic Decisions with respect to Fairness

Jörg Becker;Dmitriy Novikov;Raisa Uskenbaeva;Dmitry M. Nazarov;Olga A. Tsukanova;Judith Barrios Albornoz;Elena Kornyshova;Oscar Pastor;A V. Shchepkin;V. O. Korepanov;D. Fedyanin;V.N. Burkov (Hrsg). Proceedings of the 21st IEEE Conference on Business Informatics CBI 2019: 15 - 17 July 2019; Moscow, Russia. Los Alamitos, CA: IEEE Computer Society 2019 S. 161 - 162 (LNI)


Jürjens, Jan; Schneider, Kurt; Bürger, Jens et al.

Maintaining Security in Software Evolution

Reussner, Ralf; Hasselbring, Wilhelm; Vogel-Heuser, Birgit; Keim, Jan; Märtin, Lukas; Goedicke, Michael (Hrsg). Managed Software Evolution. Springer 2019 S. 207 - 253


Ahmadian, Amir Shayan; Strüber, Daniel; Jürjens, Jan

Privacy-enhanced system design modeling based on privacy features

Chih-Cheng Hung;George A. Papadopoulos (Hrsg). Proceedings of the 34th ACM Symposium on Applied Computing SAC 2019; Limassol, Cyprus; April 8-12, 2019. New York, NY: ACM Association for Computing Machinery 2019 S. 1492 - 1499


Jürjens, Jan

Smart Data Analytics im Gesundheitswesen: Aber sicher ! (... und compliant)

Zukunftskongress Gesundheit DiGital, Koblenz, 3.-4.9.2019. 2019



Bürger, Jens; Strüber, Daniel; Gärtner, Stefan et al.

A framework for semi-automated co-evolution of security knowledge and system models

Journal of Systems and Software. Bd. 139. H. 5. Amsterdam: Elsevier 2018 S. 142 - 160


Jürjens, Jan

Advanced Smart Data Analytics

MCT Summit 2018, Brühl, 21.-26.10.2018. 2018


Jürjens, Jan

AMable - IDS and Blockchain for Additive Manufacturing

1st Industrial Data Space Association Summit, Frankfurt, 22.-23.3.2018. 2018


Jürjens, Jan

Big Data und Datenanalyse für Versicherungsunternehmen: Technologischer Ausblick (Eingeladene Vorlesung)

Big Data Werkstattreihe, Leipzig, 12 July 2018. Versicherungsforen Leipzig 2018


Jürjens, Jan

Blockchains für die Industrie 4.0 mit dem Industrial Data Space

Blockchain Summit 2018, Nürnberg, 19.6.2018. 2018


Stewart, Harrison; Jürjens, Jan

Data security and consumer trust in FinTech innovation in Germany

Information and Computer Security. Bd. 26. H. 1. Bingley: Emerald 2018 S. 109 - 128


Ramadan, Qusai; Strüber, Daniel; Salnitri, Mattia et al.

Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models

Alfonso Pierantonio;Salvador Trujillo (Hrsg). Modelling Foundations and Applications: 14th European Conference, ECMFA 2018, Held as Part of STAF 2018, Toulouse, France, June 26-28, 2018, Proceedings. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2018 S. 179 - 198 (Lecture Notes in Computer Science)


Ahmadian, Amir Shayan; Jürjens, Jan; Strüber, Daniel

Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements

Hisham M. Haddad;Roger L. Wainwright;Richard Chbeir (Hrsg). Proceeding of the 33rd ACM Symposium on Applied Computing SAC 2018: Pau, France; April 9-13, 2018. New York, NY: ACM Association for Computing Machinery 2018 S. 1142 - 1149


Jürjens, Jan

I4.0-Datenanalyse, aber sicher

Deutscher Schneidkongress 2018, Essen, 18.4.2018. 2018


Ramadan, Qusai; Salnitri, Mattia; Strüber, Daniel et al.

Integrating BPMN- and UML-based Security Engineering via Model Transformation

Matthias Tichy;Eric Bodden;Marco Kuhrmann;Stefan Wagner;Jan-Philipp Steghöfer (Hrsg). Software Engineering und Software Management 2018: 5.-9. März, 2018; Ulm, Deutschland; Proceedings. Bonn: Gesellschaft für Informatik 2018 S. 63 - 64 (LNI)


Ramadan, Qusai; Ahmadian, Amir Shayan; Strüber, Daniel et al.

Model-based discrimination analysis: a position paper

, ; , ; , (Hrsg). Proceedings of the International Workshop on Software Fairness, FairWare@ICSE 2018, Gothenburg, Sweden, May 29, 2018. ACM 2018 S. 22 - 28


Peldszus, Sven; Strüber, Daniel; Jürjens, Jan

Model-Based Security Analysis of Feature-Oriented Software Product Lines

Erik Van Wyk;Tiark Rompf (Hrsg). Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences GPCE 2018: November 5–6, 2018; Boston, MA, USA. New York, NY: ACM Association for Computing Machinery 2018 S. 93 - 106


Jürjens, Jan

Security by Design for Web Applications

MCT Summit 2018, Brühl, 21.-26.10.2018. 2018


Jürjens, Jan

Security Testing

SymfonyLive Berlin, 25.-26.10.2018. 2018


Jürjens, Jan

Smart Data Analytics in Automotive

TDWI 2018, München, 26.6.2018. 2018


Ahmadian, Amir Shayan; Strüber, Daniel; Riediger, Volker et al.

Supporting privacy impact assessment by model-based privacy analysis

Hisham M. Haddad;Roger L. Wainwright;Richard Chbeir (Hrsg). Proceeding of the 33rd ACM Symposium on Applied Computing SAC 2018: Pau, France; April 9-13, 2018. New York, NY: ACM Association for Computing Machinery 2018 S. 1467 - 1474


Jürjens, Jan

Technical Competencies (Invited Lecture)

Digital @ Scale, Berlin, 4 May & 6 Dec. 2018, McKinsey & WHU Vallenda. McKinsey & WHU Vallenda 2018


Jürjens, Jan

Versicherungswirtschaft digital: Quo vadis?

TDWI 2018, München, 26.6.2018. 2018


Jürjens, Jan; Ruf, Stefan; Herda, Nils

Wie transformieren Versicherungsunternehmen ihre IT- Infrastrukturen ins digitale Zeitalter?

Wirtschaftsinformatik & Management. Bd. 10. H. 3. Wiesbaden: Springer 2018 S. 74 - 79


Jürjens, Jan

Barriers and opportunities of use of data across sectors and borders: An Invited Panel Contribution

High Level Conference on Building the European Data Economy, 17 Oct 2016, Brussel. 2017


Jürjens, Jan

Datensouveränität in der Industrieautomatisierung

Hannover Messe 2017, Hannover, 24.-28.4.2017. 2017


Ramadan, Qusai; Salnitriy, Mattia; Strüber, Daniel et al.

From Secure Business Process Modeling to Design-Level Security Verification

Lisa O’Conner;Don Batory;Jeff Gray;Vinay Kulkarni;Taylor Riché (Hrsg). Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems MODELS 2017: 17-22 September 2017; Austin. Texas. Los Alamitos, CA: IEEE Computer Society 2017 S. 123 - 133


Jürjens, Jan

Industrial Data Space: Predictive Maintenance to Enhance Safety of NRMM

NRMM Functional Safety Conference, Mainz, 25.10.2017. 2017


Stewart, Harrison; Jürjens, Jan

Information security management and the human aspect in organizations

Information and Computer Security. Bd. 25. H. 5. Bingley: Emerald 2017 S. 494 - 534


Jürjens, Jan

IT-Sicherheit in der Industrie 4.0: Datenanalyse, aber sicher !

Nacht der Technik 2017, Koblenz, 4.11.2017. 2017


Ahmadian, Amir Shayan; Peldszus, Sven; Ramadan, Qusai et al.

Model-based Privacy and Security Analysis with CARiSMA

Eric Bodden;Wilhelm Schäfer;Arie van Deursen;Andrea Zisman (Hrsg). Proceeding of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering: ESEC/FSE'17; September 4. - 8., 2017; Paderborn, Germany. New York, NY: ACM Association for Computing Machinery 2017 S. 989 - 993


Jürjens, Jan

Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain

Schweighofer, Erich; , ; , ; Rannenberg, Kai (Hrsg). Privacy Technologies and Policy - 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers. Springer 2017 S. 192 - 209 (Lecture Notes in Computer Science)


Jürjens, Jan

Security by Design für Cloud-basierte Datenaustauschplattformen: Der Industrial Data Space

Internet Security Days 2017, Brühl, 29.09.2017. 2017


Jürjens, Jan

Security Certification in the Industrial Data Space - Vortrag

14. Jahrestreffen der GI-FG "Formale Methoden und Software Engineering für Sichere Systeme (FoMSESS), Darmstadt, 7.-8.9.2017. 2017


Ahammed, Sakib; Sadi, Muhammad Sheikh; Rahman, Md. Shamimur et al.

Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method)

International Journal of Computer Systems Science & Engineering. Bd. 32. H. 1. London: CRL 2017 S. 35 - 47



Jürjens, Jan

The Industrial Data Space initiative (Invited Talk)

Digital Challenges in Europe, Brussels 29 June 2017. EC, Brussels 29 June 2017 2017


Jürjens, Jan

15 Years of Model-based Security Engineering with UML: Supporting Secure Evolution

Boris Shishkov (Hrsg). Proceedings of the Sixth International Symposium on Business Modeling and Software Design BMSD 2016: June 20-22, 2016 in Rhodes, Greece. Setúbal: SciTePress 2016 S. 5 - 6


Jürjens, Jan

Big Data: Aber sicher ! (... und compliant) (Eingeladener Vortrag)

Fraunhofer-Alumni-Summit. 2016


Jürjens, Jan

Compliance in Clouds

San Murugesan;Irena Bojanova (Hrsg). Encyclopedia of Cloud Computing. Hoboken, NJ: Wiley 2016 S. 275 - 290




Jürjens, Jan

European Data Space: Enabling Collaborative Data Analysis Services compliant to the GDPR (Invited Talk)

ISC GDPR Seminar on The Impact of the General Data Protection Regulation on collaborative science in Europe and the European Cloud Initiative, 18 Oct 2016, Brussels. 2016



Jürjens, Jan

IT Security Risks

Summer School of the Trinational Graduate Academy Security-Risk-Orientation. 2016


Zaitsev, Dmitry; Jürjens, Jan

Programming in Sleptsov Net Language for Systems Control

Advances in Mechanical Engineering. Bd. 8. H. 4. London: SAGE Publications 2016 S. 1 - 11


Jürjens, Jan

Security Certification in the Industrial Data Space - Vortrag

Summer School of the Joint Master in Software Engineering. 2016



Jürjens, Jan

Sicherheitszertifizierung für den Industrial Data Space

3. Forschungstag IT-Sicherheit NRW. 2016


Pape, Sebastian; Flake, Julian; Beckmann, Andreas et al.

STAGE - Software Tool for Automatic Grading of Testing Exercises: Case Study Paper

Laura Dillon;Willem Visser;Laurie Williams (Hrsg). Proceedings of the 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering ICSE 2016; 14-22 May, 2016; Austin, Texas, USA. New York, NY: ACM Association for Computing Machinery 2016 S. 491 - 500


Pape, Sebastian; Flake, Julian; Beckmann, Andreas et al.

STAGE: a software tool for automatic grading of testing exercises: case study paper.

ICSE (Companion Volume). 2016 S. 491 - 500


Ahmadian, Amir Shayan; Jürjens, Jan

Supporting Model-based Privacy Analysis by Exploiting Privacy Level Agreements

Sébastien Varrette;Pascal Bouvry;Albert Y. Zomaya (Hrsg). Proceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science CloudCom 2016: 12–15 December 2016; Luxembourg City, Luxembourg. Los Alamitos, CA: IEEE Computer Society 2016 S. 360 - 365


Shayan Ahmadian, Amir; Jürjens, Jan

Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements.

CloudCom. 2016 S. 360 - 365


Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan

Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds

Boris Shishkov (Hrsg). Business Modeling and Software Design: 5th International Symposium, BMSD 2015, Milan, Italy, July 6–8, 2015, Revised Selected Papers. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2016 S. 80 - 95



Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.

UMLchange - Specifying Model Changes to Support Security Verification of Potential Evolution

Jens Knoop;Uwe Zdun (Hrsg). Software Engineering 2016: Fachtagung des GI-Fachbereichs Softwaretechnik; 23.-26. Februar 2016 Wien, Proceedings. Bonn: Gesellschaft für Informatik 2016 S. 91 - 92


Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.

Umlchange - specifying model changes to support security verification of potential evolution.

Software Engineering. 2016 S. 91 - 92


Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.

A Platform for Empirical Research on Information System Evolution

Marek Reformat;Haiping Xu;Kehan Gao;Shihong Huang (Hrsg). Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering SEKE 2015: Technical Program; July 6 – 8, 2015; Wyndham Pittsburgh University Center, Pittsburgh, USA. Pittsburgh: Knowledge Systems Institute 2015 S. 415 - 420


Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.

A Platform for Empirical Research on Information System Evolution.

SEKE. 2015 S. 415 - 420


Jürjens, Jan

Beyond One-Shot Security: Keeping Software Secure during Evolution

12. Jahrestreffen der GI-FG FFormale Methoden und Software Engineering für Sichere Systeme (FoMSESS). Bremen. 2015







Stocker, Joachim; Wenzel, Sven; Jürjens, Jan

IT-Risiko-Check: Das Wissen um geschäftskritische IT- Risiken

Peter Schartner;Kerstin Lemke-Rust;Markus Ullmann (Hrsg). D-A-CH security 2015: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Frechen: Syssec 2015 S. 279 - 290


Jürjens, Jan; Shayan Ahmadian, Amir

Model-based Security Analysis and Applications to Security Economics: Invited Talk

International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015). 2015


Jürjens, Jan; Shayan Ahmadian, Amir

Model-based Security Analysis and Applications to Security Economics.

MODELSWARD. 2015 S. 674 - 677


Jürjens, Jan

Modellbasiertes Sicherheits-Testen für Cloud-basierte Prozesse

Software-QS-Tag 2015. 2015


Jürjens, Jan

Ökonomische Analyse von Sicherheitsmaßnahmen (Eingeladener Vortrag)

Arbeitstreffen der Allianz für Sicherheit in der Wirtschaft e.V. 2015


Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.

Preserving Validity of Batch-Job Nets under Change at Run-Time

Sheikh Iqbal Ahamed;Carl K. Chang;William Chu;Ivica Crnkovic;Pao-Ann Hsiung;Gang Huang;Jingwei Yang (Hrsg). Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference Workshops COMPSAC 2015: Volume 2; 1–5 July 2015; Taichung, Taiwan. Los Alamitos, CA: IEEE Computer Society 2015 S. 169 - 178


Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.

Preserving Validity of Batch-Job Nets under Change at Run-Time.

COMPSAC. 2015 S. 169 - 178


Bürger, Jens; Jürjens, Jan; Wenzel, Sven

Restoring security of evolving software models using graph transformation

International Journal on Software Tools for Technology Transfer. Bd. 17. H. 3. Berlin: Springer 2015 S. 267 - 289


Bürger, Jens; Jürjens, Jan; Wenzel, Sven

Restoring security of evolving software models using graph transformation.

STTT. Bd. 17. H. 3. 2015 S. 267 - 289


Bürger, Jens; Gärtner, Stefan; Ruhroth, Thomas et al.

Restoring Security of Long-Living Systems by Co-evolution.

COMPSAC. 2015 S. 153 - 158


Jürjens, Jan

Secure Database Development

Encyclopedia of Database Systems. Springer 2015 S. TBD


Jürjens, Jan

Security Certification in the Presence of Evolution: Models vs. Code (Invited talk)

Software Engineering and Formal Methods - SEFM 2014 Collocated Workshops, Revised Selected Papers. 2015 S. XIX - XX (LNCS)


Rahman, Md. Shamimur; Sadi, Muhammad Sheikh; Ahammed, Sakib et al.

Soft Error Tolerance using Horizontal-Vertical- Double-Bit Diagonal parity method

Felix Pasila;Yusak Tanoto;Resmana Lim;Murtiyanto Santoso;Nemuel Daniel Pah (Hrsg). Proceeding of the 2nd International Conference on Electrical Engineering and Infomation Communication Technology iCEEiC 2015: 21 - 23 May 2015; Jahangirnagar University, Savar, Dhaka, Bangladesh. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2015 S. 1 - 6


Rosado, David G.; Lammari, Nadira; Jürjens, Jan

Special Issue on Secure Information Systems Engineering

The Computer Journal. Bd. 58. H. 10. Oxford: Oxford University Press 2015 S. 2193 - 2194


G. Rosado, David; Lammari, Nadira; Jürjens, Jan

Special Issue on Secure Information Systems Engineering.

Comput. J. Bd. 58. H. 10. 2015 S. 2193 - 2194


Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan

Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds.

BMSD. 2015 S. 80 - 95


Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan

Supporting the Security Certification of Cloud-Computing- Infrastructures: Invited Paper

Fifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 10


Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.

The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution.

International Journal of Software Engineering and Knowledge Engineering. Bd. 25. H. 9-10. 2015 S. 1715 - 1720


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge

Uwe Aßmann;Birgit Demuth;Thorsten Spitta;Georg Püschel;Ronny Kaiser (Hrsg). Software Engineering & Management 2015 - Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März - 20. März 2015 in Dresden. Bonn: Gesellschaft für Informatik 2015 S. 83 - 84 (Lecture Notes in Informatics)


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge.

Software Engineering & Management. 2015 S. 83 - 84


Jürjens, Jan

Towards Security of Adaptable Information Systems - Current Views and Future Perspectives: Invited Panel Participation

Fifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 3


Jürjens, Jan

Transparenz und Sicherheit in der Lieferkette

Arbeitstreffen des Bundesverband Deutscher Postdienstleister. 2015


Jürjens, Jan; Wenzel, Sven

Werkzeug für Wirtschaftlichkeit und Effektivität zum Erstellen von Sicherheitskonzepten

WIK : Zeitschrift für die Sicherheit der Wirtschaft. Bd. 5. Ingelheim: SecuMedia 2015 S. keine Angaben




Jürjens, Jan; Piessens, Frank; Bielova, Nataliia

Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings

Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 (LNCS)


Felderer, Michael; Katt, Basel; Kalb, Philipp et al.

Evolution of Security Engineering Artifacts: A State of the Art Survey

International Journal of Secure Software Engineering. Bd. 5. H. 4. Hershey, PA: IGI Global 2014 S. 48 - 98


Felderer, Michael; Katt, Basel; Kalb, Philipp et al.

Evolution of Security Engineering Artifacts: A State of the Art Survey.

IJSSE. Bd. 5. H. 4. 2014 S. 48 - 98


Jürjens, Jan

Geschäftsprozesse in der Cloud -- aber sicher! (... und compliant)

Software Engineering + Architecture (SEACON 2014). 2014 S. 1 - 83


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.

Guiding a general-purpose C verifier to prove cryptographic protocols

Journal of Computer Security. Bd. 22. H. 5. Amsterdam: IOS Press 2014 S. 823 - 866


Dupressoir, François; D. Gordon, Andrew; Jürjens, Jan et al.

Guiding a general-purpose C verifier to prove cryptographic protocols.

Journal of Computer Security. Bd. 22. H. 5. 2014 S. 823 - 866


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge

Tony Gorschek;Robyn Lutz (Hrsg). Proceeding of the 2014 IEEE 22nd International Requirements Engineering Conference RE: August 25-29, 2014; Karlskrona, Sweden. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2014 S. 103 - 112