Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Informatik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287 - 2720
  • 0261/287 - 2721
Publikationen
Ergebnisse pro Seite:  10

Zöbel, Dieter; Polock, David; van Arkel, Andreas

Testing for the Conformance of Real-time Protocols Implemented by Operating Systems

Electronic Notes in Theoretical Computer Science. Bd. 133. Amsterdam: Elsevier 2005 S. 315 - 332


Jürjens, Jan

Tool-support for Model-Driven Development of Security- Critical Systems with UML

Sami Beydeda;Matthias Book;Volker Gruhn (Hrsg). Model-Driven Software Development. Berlin: Springer 2005 S. 35 - 55


Jürjens, Jan; Shabalin, Pasha

Tools for Critical Systems Development with UML (Tool Demo)

Nuno Jardim Nunes; Bran Selic; Alberto Rodrigues da Silva; Toval Ambrosio (Hrsg). UML Modeling Languages and Applications: 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers. Berlin: Springer 2005 S. 250 - 253


Jürjens, Jan; Shabalin, Pasha

Tools for Secure Systems Development with UML: Security Analysis with ATPs

Maura Cerioli (Hrsg). Fundamental Approaches to Software Engineering: 8th International Conference, FASE 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005. Proceedings. Berlin: Springer 2005 S. 305 - 309


Kschischo, Maik; Lässig, Michael; Yu, Yi-Kuo

Toward an accurate statistics of gapped alignments

Bulletin of mathematical biology. Bd. 67. H. 1. New York, NY: Elsevier 2005 S. 169 - 192


Jürjens, Jan

Towards using game semantics for crypto protocol verification: Lorenzen games

Dan R. Ghica; Guy McCusker (Hrsg). 1st Workshop on Games for Logic and Programming Languages GaLoP 2005 part of ETAPS 2005, Edinburgh, UK, 2-3 April 2005. Edinburgh: University of Edinburgh 2005 S. 241 - 257


Jürjens, Jan

Understanding Security Goals Provided by Crypto- Protocol Implementations

Harry M. Sneed; Tibor Gyimothy; Vaclav Rajlich (Hrsg). Proceedings of the 21st IEEE International Conference on Software Maintenance ICSM 2005: 26-29 September, 2005; Budapest, Hungary. Los Alamitos, CA: IEEE Computer Society 2005 S. 643 - 646


Jürjens, Jan

UP and Security: Overview on UMLsec

Sobenet workshop: UP, XP and architecture. KU Leuven (Belgium). 2005


Jürjens, Jan

Verification of Low-level Crypto-Protocol Implementations Using Automated Theorem Proving

Manfred Broy; Jean-Pierre Talpin; Elizabeth Leonard (Hrsg). Proceedings of the Third ACM & IEEE International Conference on Formal Methods and Models for Co-Design MEMOCODE’05: July 11-14, 2005; Verona, Italy. Los Alamitos, CA: IEEE Computer Society 2005 S. 89 - 98


Jürjens, Jan; Shabalin, Pasha

XML-based Analysis of UML Models for Critical Systems Development

Hongji Yang (Hrsg). Advances in UML and XML-Based Software Evolution. Hershey, PA: IGI Global 2005 S. 257 - 274