Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Zöbel, Dieter; Polock, David; van Arkel, Andreas
Testing for the Conformance of Real-time Protocols Implemented by Operating SystemsElectronic Notes in Theoretical Computer Science. Bd. 133. Amsterdam: Elsevier 2005 S. 315 - 332
Jürjens, Jan
Tool-support for Model-Driven Development of Security- Critical Systems with UMLSami Beydeda;Matthias Book;Volker Gruhn (Hrsg). Model-Driven Software Development. Berlin: Springer 2005 S. 35 - 55
Jürjens, Jan; Shabalin, Pasha
Tools for Critical Systems Development with UML (Tool Demo)Nuno Jardim Nunes; Bran Selic; Alberto Rodrigues da Silva; Toval Ambrosio (Hrsg). UML Modeling Languages and Applications: 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers. Berlin: Springer 2005 S. 250 - 253
Jürjens, Jan; Shabalin, Pasha
Tools for Secure Systems Development with UML: Security Analysis with ATPsMaura Cerioli (Hrsg). Fundamental Approaches to Software Engineering: 8th International Conference, FASE 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005. Proceedings. Berlin: Springer 2005 S. 305 - 309
Kschischo, Maik; Lässig, Michael; Yu, Yi-Kuo
Toward an accurate statistics of gapped alignmentsBulletin of mathematical biology. Bd. 67. H. 1. New York, NY: Elsevier 2005 S. 169 - 192
Jürjens, Jan
Towards using game semantics for crypto protocol verification: Lorenzen gamesDan R. Ghica; Guy McCusker (Hrsg). 1st Workshop on Games for Logic and Programming Languages GaLoP 2005 part of ETAPS 2005, Edinburgh, UK, 2-3 April 2005. Edinburgh: University of Edinburgh 2005 S. 241 - 257
Jürjens, Jan
Understanding Security Goals Provided by Crypto- Protocol ImplementationsHarry M. Sneed; Tibor Gyimothy; Vaclav Rajlich (Hrsg). Proceedings of the 21st IEEE International Conference on Software Maintenance ICSM 2005: 26-29 September, 2005; Budapest, Hungary. Los Alamitos, CA: IEEE Computer Society 2005 S. 643 - 646
Jürjens, Jan
UP and Security: Overview on UMLsecSobenet workshop: UP, XP and architecture. KU Leuven (Belgium). 2005
Jürjens, Jan
Verification of Low-level Crypto-Protocol Implementations Using Automated Theorem ProvingManfred Broy; Jean-Pierre Talpin; Elizabeth Leonard (Hrsg). Proceedings of the Third ACM & IEEE International Conference on Formal Methods and Models for Co-Design MEMOCODE’05: July 11-14, 2005; Verona, Italy. Los Alamitos, CA: IEEE Computer Society 2005 S. 89 - 98
Jürjens, Jan; Shabalin, Pasha
XML-based Analysis of UML Models for Critical Systems DevelopmentHongji Yang (Hrsg). Advances in UML and XML-Based Software Evolution. Hershey, PA: IGI Global 2005 S. 257 - 274