Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
Ergebnisse pro Seite:  10

Jürjens, Jan; Wenzel, Sven

Werkzeug für Wirtschaftlichkeit und Effektivität zum Erstellen von Sicherheitskonzepten

WIK : Zeitschrift für die Sicherheit der Wirtschaft. Bd. 5. Ingelheim: SecuMedia 2015 S. keine Angaben


Jürjens, Jan; Piessens, Frank; Bielova, Nataliia

Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings

Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014


Felderer, Michael; Katt, Basel; Kalb, Philipp et al.

Evolution of Security Engineering Artifacts: A State of the Art Survey

International Journal of Secure Software Engineering. Bd. 5. H. 4. Hershey, PA: IGI Global 2014 S. 48 - 98


Jürjens, Jan

Geschäftsprozesse in der Cloud -- aber sicher! (... und compliant)

Software Engineering + Architecture (SEACON 2014). 2014 S. 1 - 83


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.

Guiding a general-purpose C verifier to prove cryptographic protocols

Journal of Computer Security. Bd. 22. H. 5. Amsterdam: IOS Press 2014 S. 823 - 866


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge

Tony Gorschek; Robyn Lutz (Hrsg). Proceeding of the 2014 IEEE 22nd International Requirements Engineering Conference RE: August 25-29, 2014; Karlskrona, Sweden. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2014 S. 103 - 112


Bürger, Jens; Jürjens, Jan; Ruhroth, Thomas et al.

Model-based Security Engineering: Managed Co-Evolution of Security Knowledge and Software Models

Alessandro Aldini; Javier Lopez; Fabio Martinelli (Hrsg). Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial Lectures. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 34 - 53


Lochau, Malte; Peldszus, Sven; Kowal, Matthias et al.

Model-Based Testing

Marco Bernardo; Ferruccio Damiani; Reiner Hähnle; Einar Broch Johnsen; Ina Schaefer (Hrsg). Formal Methods for Executable Software Models: 14th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2014, Bertinoro, Italy, June 16-20, 2014, Advanced Lectures. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 310 - 342


Jürjens, Jan

Security Certification in the Presence of Evolution: Models vs. Code (Keynote)

International Workshop on Safety and Formal Methods (SaFoMe@SEFM 2014). 2014


Blanco, Carlos; Rosado, David G.; Sanchez, Luís Enrique et al.

Security in information systems: Advances and new challenges

Computer Standards & Interfaces. Bd. 36. H. 4. Amsterdam: Elsevier 2014 S. 687 - 688