Bürger, Jens; Strüber, Daniel; Gärtner, Stefan et al.
A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary)Jörg Becker;Dmitriy Novikov;Raisa Uskenbaeva;Dmitry M. Nazarov;Olga A. Tsukanova;Judith Barrios Albornoz;Elena Kornyshova;Oscar Pastor;A V. Shchepkin;V. O. Korepanov;D. Fedyanin;V.N. Burkov (Hrsg). Proceedings of the 21st IEEE Conference on Business Informatics CBI 2019: 15 - 17 July 2019; Moscow, Russia. Los Alamitos, CA: IEEE Computer Society 2019 S. 179 - 180 (LNI)
Jürjens, Jan
Aktuelle Innovationen in Software Engineering, Data Analytics und IT-SicherheitDebeka Innovationswoche, Debeka Innovation Center (DICE), 22.5.2019. Debeka Innovation Center (DICE) 2019
Jürjens, Jan
Erfahrungen mit Design Thinking: Design eines MVP für 3-D-Druck mittels BlockchainDebeka Innovation Center (DICE), 17.5.2019. Debeka Innovation Center (DICE) 2019
Ramadan, Qusai; Ahmadian, Amir Shayan; Jürjens, Jan et al.
Explaining Algorithmic Decisions with respect to FairnessJörg Becker;Dmitriy Novikov;Raisa Uskenbaeva;Dmitry M. Nazarov;Olga A. Tsukanova;Judith Barrios Albornoz;Elena Kornyshova;Oscar Pastor;A V. Shchepkin;V. O. Korepanov;D. Fedyanin;V.N. Burkov (Hrsg). Proceedings of the 21st IEEE Conference on Business Informatics CBI 2019: 15 - 17 July 2019; Moscow, Russia. Los Alamitos, CA: IEEE Computer Society 2019 S. 161 - 162 (LNI)
Jürjens, Jan; Schneider, Kurt; Bürger, Jens et al.
Maintaining Security in Software EvolutionReussner, Ralf; Hasselbring, Wilhelm; Vogel-Heuser, Birgit; Keim, Jan; Märtin, Lukas; Goedicke, Michael (Hrsg). Managed Software Evolution. Springer 2019 S. 207 - 253
Ahmadian, Amir Shayan; Strüber, Daniel; Jürjens, Jan
Privacy-enhanced system design modeling based on privacy featuresChih-Cheng Hung;George A. Papadopoulos (Hrsg). Proceedings of the 34th ACM Symposium on Applied Computing SAC 2019; Limassol, Cyprus; April 8-12, 2019. New York, NY: ACM Association for Computing Machinery 2019 S. 1492 - 1499
Jürjens, Jan
Smart Data Analytics im Gesundheitswesen: Aber sicher ! (... und compliant)Zukunftskongress Gesundheit DiGital, Koblenz, 3.-4.9.2019. 2019
Jürjens, Jan
Zukunftssichere Software: Evolutionsbasiertes Sicherheitstesten für Datenanalyse-Software - VortragOOP 2019, München, 21.-25.1.2019. 2019
Bürger, Jens; Strüber, Daniel; Gärtner, Stefan et al.
A framework for semi-automated co-evolution of security knowledge and system modelsJournal of Systems and Software. Bd. 139. H. 5. Amsterdam: Elsevier 2018 S. 142 - 160
Jürjens, Jan
Advanced Smart Data AnalyticsMCT Summit 2018, Brühl, 21.-26.10.2018. 2018
Jürjens, Jan
AMable - IDS and Blockchain for Additive Manufacturing1st Industrial Data Space Association Summit, Frankfurt, 22.-23.3.2018. 2018
Jürjens, Jan
Big Data und Datenanalyse für Versicherungsunternehmen: Technologischer Ausblick (Eingeladene Vorlesung)Big Data Werkstattreihe, Leipzig, 12 July 2018. Versicherungsforen Leipzig 2018
Jürjens, Jan
Blockchains für die Industrie 4.0 mit dem Industrial Data SpaceBlockchain Summit 2018, Nürnberg, 19.6.2018. 2018
Stewart, Harrison; Jürjens, Jan
Data security and consumer trust in FinTech innovation in GermanyInformation and Computer Security. Bd. 26. H. 1. Bingley: Emerald 2018 S. 109 - 128
Ramadan, Qusai; Strüber, Daniel; Salnitri, Mattia et al.
Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process ModelsAlfonso Pierantonio;Salvador Trujillo (Hrsg). Modelling Foundations and Applications: 14th European Conference, ECMFA 2018, Held as Part of STAF 2018, Toulouse, France, June 26-28, 2018, Proceedings. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2018 S. 179 - 198 (Lecture Notes in Computer Science)
Ahmadian, Amir Shayan; Jürjens, Jan; Strüber, Daniel
Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreementsHisham M. Haddad;Roger L. Wainwright;Richard Chbeir (Hrsg). Proceeding of the 33rd ACM Symposium on Applied Computing SAC 2018: Pau, France; April 9-13, 2018. New York, NY: ACM Association for Computing Machinery 2018 S. 1142 - 1149
Jürjens, Jan
I4.0-Datenanalyse, aber sicherDeutscher Schneidkongress 2018, Essen, 18.4.2018. 2018
Ramadan, Qusai; Salnitri, Mattia; Strüber, Daniel et al.
Integrating BPMN- and UML-based Security Engineering via Model TransformationMatthias Tichy;Eric Bodden;Marco Kuhrmann;Stefan Wagner;Jan-Philipp Steghöfer (Hrsg). Software Engineering und Software Management 2018: 5.-9. März, 2018; Ulm, Deutschland; Proceedings. Bonn: Gesellschaft für Informatik 2018 S. 63 - 64 (LNI)
Ramadan, Qusai; Ahmadian, Amir Shayan; Strüber, Daniel et al.
Model-based discrimination analysis: a position paper, ; , ; , (Hrsg). Proceedings of the International Workshop on Software Fairness, FairWare@ICSE 2018, Gothenburg, Sweden, May 29, 2018. ACM 2018 S. 22 - 28
Peldszus, Sven; Strüber, Daniel; Jürjens, Jan
Model-Based Security Analysis of Feature-Oriented Software Product LinesErik Van Wyk;Tiark Rompf (Hrsg). Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences GPCE 2018: November 5–6, 2018; Boston, MA, USA. New York, NY: ACM Association for Computing Machinery 2018 S. 93 - 106
Jürjens, Jan
Security by Design for Web ApplicationsMCT Summit 2018, Brühl, 21.-26.10.2018. 2018
Jürjens, Jan
Security TestingSymfonyLive Berlin, 25.-26.10.2018. 2018
Jürjens, Jan
Smart Data Analytics in AutomotiveTDWI 2018, München, 26.6.2018. 2018
Ahmadian, Amir Shayan; Strüber, Daniel; Riediger, Volker et al.
Supporting privacy impact assessment by model-based privacy analysisHisham M. Haddad;Roger L. Wainwright;Richard Chbeir (Hrsg). Proceeding of the 33rd ACM Symposium on Applied Computing SAC 2018: Pau, France; April 9-13, 2018. New York, NY: ACM Association for Computing Machinery 2018 S. 1467 - 1474
Jürjens, Jan
Technical Competencies (Invited Lecture)Digital @ Scale, Berlin, 4 May & 6 Dec. 2018, McKinsey & WHU Vallenda. McKinsey & WHU Vallenda 2018
Jürjens, Jan
Versicherungswirtschaft digital: Quo vadis?TDWI 2018, München, 26.6.2018. 2018
Jürjens, Jan; Ruf, Stefan; Herda, Nils
Wie transformieren Versicherungsunternehmen ihre IT- Infrastrukturen ins digitale Zeitalter?Wirtschaftsinformatik & Management. Bd. 10. H. 3. Wiesbaden: Springer 2018 S. 74 - 79
Jürjens, Jan
Barriers and opportunities of use of data across sectors and borders: An Invited Panel ContributionHigh Level Conference on Building the European Data Economy, 17 Oct 2016, Brussel. 2017
Jürjens, Jan
Datensouveränität in der IndustrieautomatisierungHannover Messe 2017, Hannover, 24.-28.4.2017. 2017
Ramadan, Qusai; Salnitriy, Mattia; Strüber, Daniel et al.
From Secure Business Process Modeling to Design-Level Security VerificationLisa O’Conner;Don Batory;Jeff Gray;Vinay Kulkarni;Taylor Riché (Hrsg). Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems MODELS 2017: 17-22 September 2017; Austin. Texas. Los Alamitos, CA: IEEE Computer Society 2017 S. 123 - 133
Jürjens, Jan
Industrial Data Space: Predictive Maintenance to Enhance Safety of NRMMNRMM Functional Safety Conference, Mainz, 25.10.2017. 2017
Stewart, Harrison; Jürjens, Jan
Information security management and the human aspect in organizationsInformation and Computer Security. Bd. 25. H. 5. Bingley: Emerald 2017 S. 494 - 534
Jürjens, Jan
IT-Sicherheit in der Industrie 4.0: Datenanalyse, aber sicher !Nacht der Technik 2017, Koblenz, 4.11.2017. 2017
Ahmadian, Amir Shayan; Peldszus, Sven; Ramadan, Qusai et al.
Model-based Privacy and Security Analysis with CARiSMAEric Bodden;Wilhelm Schäfer;Arie van Deursen;Andrea Zisman (Hrsg). Proceeding of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering: ESEC/FSE'17; September 4. - 8., 2017; Paderborn, Germany. New York, NY: ACM Association for Computing Machinery 2017 S. 989 - 993
Jürjens, Jan
Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare DomainSchweighofer, Erich; , ; , ; Rannenberg, Kai (Hrsg). Privacy Technologies and Policy - 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers. Springer 2017 S. 192 - 209 (Lecture Notes in Computer Science)
Jürjens, Jan
Security by Design für Cloud-basierte Datenaustauschplattformen: Der Industrial Data SpaceInternet Security Days 2017, Brühl, 29.09.2017. 2017
Jürjens, Jan
Security Certification in the Industrial Data Space - Vortrag14. Jahrestreffen der GI-FG "Formale Methoden und Software Engineering für Sichere Systeme (FoMSESS), Darmstadt, 7.-8.9.2017. 2017
Ahammed, Sakib; Sadi, Muhammad Sheikh; Rahman, Md. Shamimur et al.
Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method)International Journal of Computer Systems Science & Engineering. Bd. 32. H. 1. London: CRL 2017 S. 35 - 47
Software Engineering 2017, Fachtagung des GI-Fachbereichs Softwaretechnik, 21.-24. Februar 2017, Hannover, Deutschland
Software Engineering. Bd. P-267. 2017
Jürjens, Jan
The Industrial Data Space initiative (Invited Talk)Digital Challenges in Europe, Brussels 29 June 2017. EC, Brussels 29 June 2017 2017
Jürjens, Jan
15 Years of Model-based Security Engineering with UML: Supporting Secure EvolutionBoris Shishkov (Hrsg). Proceedings of the Sixth International Symposium on Business Modeling and Software Design BMSD 2016: June 20-22, 2016 in Rhodes, Greece. Setúbal: SciTePress 2016 S. 5 - 6
Jürjens, Jan
Big Data: Aber sicher ! (... und compliant) (Eingeladener Vortrag)Fraunhofer-Alumni-Summit. 2016
Jürjens, Jan
Compliance in CloudsSan Murugesan;Irena Bojanova (Hrsg). Encyclopedia of Cloud Computing. Hoboken, NJ: Wiley 2016 S. 275 - 290
Jürjens, Jan
Der Industrial Data Space: Datenanalyse für die mittelständige Wirtschaft und Industrie des 4.0 ZeitaltersIT & Wirtschaftsmesse IT2KO. 2016
Jürjens, Jan
Developing a Business Application Scenario in the context of the Industrial Data SpaceWeb Science 2016 Summer School. 2016
Jürjens, Jan
European Data Space: Enabling Collaborative Data Analysis Services compliant to the GDPR (Invited Talk)ISC GDPR Seminar on The Impact of the General Data Protection Regulation on collaborative science in Europe and the European Cloud Initiative, 18 Oct 2016, Brussels. 2016
Jürjens, Jan
Industrial Data Space: Plattform für Datenanalysen in der Industrie 4.0Nacht der Technik 2016. 2016
Jürjens, Jan
IT Security RisksSummer School of the Trinational Graduate Academy Security-Risk-Orientation. 2016
Zaitsev, Dmitry; Jürjens, Jan
Programming in Sleptsov Net Language for Systems ControlAdvances in Mechanical Engineering. Bd. 8. H. 4. London: SAGE Publications 2016 S. 1 - 11
Jürjens, Jan
Security Certification in the Industrial Data Space - VortragSummer School of the Joint Master in Software Engineering. 2016
Jürjens, Jan
Sicherheitszertifizierung für Daten- und Software-Services in Industrie 4.0: Aspekte der Zertifizierung im Industrial Data SpaceAutomation 2016. 2016
Jürjens, Jan
Sicherheitszertifizierung für den Industrial Data Space3. Forschungstag IT-Sicherheit NRW. 2016
Pape, Sebastian; Flake, Julian; Beckmann, Andreas et al.
STAGE - Software Tool for Automatic Grading of Testing Exercises: Case Study PaperLaura Dillon;Willem Visser;Laurie Williams (Hrsg). Proceedings of the 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering ICSE 2016; 14-22 May, 2016; Austin, Texas, USA. New York, NY: ACM Association for Computing Machinery 2016 S. 491 - 500
Pape, Sebastian; Flake, Julian; Beckmann, Andreas et al.
STAGE: a software tool for automatic grading of testing exercises: case study paper.ICSE (Companion Volume). 2016 S. 491 - 500
Ahmadian, Amir Shayan; Jürjens, Jan
Supporting Model-based Privacy Analysis by Exploiting Privacy Level AgreementsSébastien Varrette;Pascal Bouvry;Albert Y. Zomaya (Hrsg). Proceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science CloudCom 2016: 12–15 December 2016; Luxembourg City, Luxembourg. Los Alamitos, CA: IEEE Computer Society 2016 S. 360 - 365
Shayan Ahmadian, Amir; Jürjens, Jan
Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements.CloudCom. 2016 S. 360 - 365
Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan
Supporting the Security Certification and Privacy Level Agreements in the Context of CloudsBoris Shishkov (Hrsg). Business Modeling and Software Design: 5th International Symposium, BMSD 2015, Milan, Italy, July 6–8, 2015, Revised Selected Papers. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2016 S. 80 - 95
Jürjens, Jan
The Industrial Data Space: Platform for Digitization in the Manufacturing and Process Industry (Invited Talk)Industrial Technologies 2016. 2016
Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.
UMLchange - Specifying Model Changes to Support Security Verification of Potential EvolutionJens Knoop;Uwe Zdun (Hrsg). Software Engineering 2016: Fachtagung des GI-Fachbereichs Softwaretechnik; 23.-26. Februar 2016 Wien, Proceedings. Bonn: Gesellschaft für Informatik 2016 S. 91 - 92
Wenzel, Sven; Poggenpohl, Daniel; Jürjens, Jan et al.
Umlchange - specifying model changes to support security verification of potential evolution.Software Engineering. 2016 S. 91 - 92
Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.
A Platform for Empirical Research on Information System EvolutionMarek Reformat;Haiping Xu;Kehan Gao;Shihong Huang (Hrsg). Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering SEKE 2015: Technical Program; July 6 – 8, 2015; Wyndham Pittsburgh University Center, Pittsburgh, USA. Pittsburgh: Knowledge Systems Institute 2015 S. 415 - 420
Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.
A Platform for Empirical Research on Information System Evolution.SEKE. 2015 S. 415 - 420
Jürjens, Jan
Beyond One-Shot Security: Keeping Software Secure during Evolution12. Jahrestreffen der GI-FG FFormale Methoden und Software Engineering für Sichere Systeme (FoMSESS). Bremen. 2015
Jürjens, Jan
Big Data mit Compliance: Konzepte für den Umgang mit Compliance beim Einsatz von Big Data in der FinanzbrancheTDWI 2015. 2015
Jürjens, Jan
Der Industrial Data Space: Eine unternehmensübergreifende Plattform für Big-Data-Analysen (eingeladener Vortrag)Zukunftsworkshop Big Data. 2015
Jürjens, Jan
Digitalisierung - Chancen für den Mittelstand (Podiumsdiskussion)2015
Jürjens, Jan
Industrial Data Space: Eine Plattform für Smart Services und Industrial Analytics: Eingeladener Vortrag auf der Mitgliederversammlung des SOA Innovation LabMitgliederversammlung des SOA Innovation Lab. 2015
Stocker, Joachim; Wenzel, Sven; Jürjens, Jan
IT-Risiko-Check: Das Wissen um geschäftskritische IT- RisikenPeter Schartner;Kerstin Lemke-Rust;Markus Ullmann (Hrsg). D-A-CH security 2015: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Frechen: Syssec 2015 S. 279 - 290
Jürjens, Jan; Shayan Ahmadian, Amir
Model-based Security Analysis and Applications to Security Economics: Invited TalkInternational Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015). 2015
Jürjens, Jan; Shayan Ahmadian, Amir
Model-based Security Analysis and Applications to Security Economics.MODELSWARD. 2015 S. 674 - 677
Jürjens, Jan
Modellbasiertes Sicherheits-Testen für Cloud-basierte ProzesseSoftware-QS-Tag 2015. 2015
Jürjens, Jan
Ökonomische Analyse von Sicherheitsmaßnahmen (Eingeladener Vortrag)Arbeitstreffen der Allianz für Sicherheit in der Wirtschaft e.V. 2015
Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.
Preserving Validity of Batch-Job Nets under Change at Run-TimeSheikh Iqbal Ahamed;Carl K. Chang;William Chu;Ivica Crnkovic;Pao-Ann Hsiung;Gang Huang;Jingwei Yang (Hrsg). Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference Workshops COMPSAC 2015: Volume 2; 1–5 July 2015; Taichung, Taiwan. Los Alamitos, CA: IEEE Computer Society 2015 S. 169 - 178
Apfelbeck, Chris; Fritz, Martin; Jürjens, Jan et al.
Preserving Validity of Batch-Job Nets under Change at Run-Time.COMPSAC. 2015 S. 169 - 178
Bürger, Jens; Jürjens, Jan; Wenzel, Sven
Restoring security of evolving software models using graph transformationInternational Journal on Software Tools for Technology Transfer. Bd. 17. H. 3. Berlin: Springer 2015 S. 267 - 289
Bürger, Jens; Jürjens, Jan; Wenzel, Sven
Restoring security of evolving software models using graph transformation.STTT. Bd. 17. H. 3. 2015 S. 267 - 289
Bürger, Jens; Gärtner, Stefan; Ruhroth, Thomas et al.
Restoring Security of Long-Living Systems by Co-evolution.COMPSAC. 2015 S. 153 - 158
Jürjens, Jan
Secure Database DevelopmentEncyclopedia of Database Systems. Springer 2015 S. TBD
Jürjens, Jan
Security Certification in the Presence of Evolution: Models vs. Code (Invited talk)Software Engineering and Formal Methods - SEFM 2014 Collocated Workshops, Revised Selected Papers. 2015 S. XIX - XX (LNCS)
Rahman, Md. Shamimur; Sadi, Muhammad Sheikh; Ahammed, Sakib et al.
Soft Error Tolerance using Horizontal-Vertical- Double-Bit Diagonal parity methodFelix Pasila;Yusak Tanoto;Resmana Lim;Murtiyanto Santoso;Nemuel Daniel Pah (Hrsg). Proceeding of the 2nd International Conference on Electrical Engineering and Infomation Communication Technology iCEEiC 2015: 21 - 23 May 2015; Jahangirnagar University, Savar, Dhaka, Bangladesh. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2015 S. 1 - 6
Rosado, David G.; Lammari, Nadira; Jürjens, Jan
Special Issue on Secure Information Systems EngineeringThe Computer Journal. Bd. 58. H. 10. Oxford: Oxford University Press 2015 S. 2193 - 2194
G. Rosado, David; Lammari, Nadira; Jürjens, Jan
Special Issue on Secure Information Systems Engineering.Comput. J. Bd. 58. H. 10. 2015 S. 2193 - 2194
Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan
Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds.BMSD. 2015 S. 80 - 95
Shayan Ahmadian, Amir; Coerschulte, Fabian; Jürjens, Jan
Supporting the Security Certification of Cloud-Computing- Infrastructures: Invited PaperFifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 10
Heinrich, Robert; Gärtner, Stefan; Hesse, Tom-Michael et al.
The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution.International Journal of Software Engineering and Knowledge Engineering. Bd. 25. H. 9-10. 2015 S. 1715 - 1720
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Towards Maintaining Long-Living Information Systems by Incorporating Security KnowledgeUwe Aßmann;Birgit Demuth;Thorsten Spitta;Georg Püschel;Ronny Kaiser (Hrsg). Software Engineering & Management 2015 - Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März - 20. März 2015 in Dresden. Bonn: Gesellschaft für Informatik 2015 S. 83 - 84 (Lecture Notes in Informatics)
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge.Software Engineering & Management. 2015 S. 83 - 84
Jürjens, Jan
Towards Security of Adaptable Information Systems - Current Views and Future Perspectives: Invited Panel ParticipationFifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 3
Jürjens, Jan
Transparenz und Sicherheit in der LieferketteArbeitstreffen des Bundesverband Deutscher Postdienstleister. 2015
Jürjens, Jan; Wenzel, Sven
Werkzeug für Wirtschaftlichkeit und Effektivität zum Erstellen von SicherheitskonzeptenWIK : Zeitschrift für die Sicherheit der Wirtschaft. Bd. 5. Ingelheim: SecuMedia 2015 S. keine Angaben
Jürjens, Jan; B. Fernández, Eduardo; B. France, Robert et al.
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop).CoRR. Bd. abs/1409.6608. 2014
Jürjens, Jan; Piessens, Frank; Bielova, Nataliia
Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, ProceedingsGorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 (LNCS)
Felderer, Michael; Katt, Basel; Kalb, Philipp et al.
Evolution of Security Engineering Artifacts: A State of the Art SurveyInternational Journal of Secure Software Engineering. Bd. 5. H. 4. Hershey, PA: IGI Global 2014 S. 48 - 98
Felderer, Michael; Katt, Basel; Kalb, Philipp et al.
Evolution of Security Engineering Artifacts: A State of the Art Survey.IJSSE. Bd. 5. H. 4. 2014 S. 48 - 98
Jürjens, Jan
Geschäftsprozesse in der Cloud -- aber sicher! (... und compliant)Software Engineering + Architecture (SEACON 2014). 2014 S. 1 - 83
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.
Guiding a general-purpose C verifier to prove cryptographic protocolsJournal of Computer Security. Bd. 22. H. 5. Amsterdam: IOS Press 2014 S. 823 - 866
Dupressoir, François; D. Gordon, Andrew; Jürjens, Jan et al.
Guiding a general-purpose C verifier to prove cryptographic protocols.Journal of Computer Security. Bd. 22. H. 5. 2014 S. 823 - 866
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Maintaining Requirements for Long-Living Software Systems by Incorporating Security KnowledgeTony Gorschek;Robyn Lutz (Hrsg). Proceeding of the 2014 IEEE 22nd International Requirements Engineering Conference RE: August 25-29, 2014; Karlskrona, Sweden. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2014 S. 103 - 112