Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
Ergebnisse pro Seite:  10

Rosado, David G.; Sanchez, Luís Enrique; Fernández-Medina, Eduardo et al.

Security in Information Systems: New Challenges and Opportunities

Journal of Universal Computer Science. Bd. 18. H. 6. Graz: Verlag der Technischen Universität Graz 2012 S. 728 - 731


Ruhroth, Thomas; Jürjens, Jan

Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec

Victor Winter; Robin Gandhi; Abhishek Parakh (Hrsg). Proceeding of the 14th IEEE International Symposium on High Assurance Systems Engineering HASE 2012: 25. - 27. October, 2012; Omaha, Nebraska. Los Alamitos, CA: IEEE Computer Society 2012 S. 177 - 184


Fourneret, Elizabeta; Bouquet, Fabrice; Ochoa, Martin et al.

Vérification et Test pour des systémes évolutifs

AFADL 2012. Grenoble. 2012


Islam, Shareeful; Mouratidis, Haralambos; Jürjens, Jan

A framework to support alignment of secure software engineeringwith legal regulations

Software and Systems Modeling. Bd. 10. H. 3. Berlin: Springer 2011 S. 369 - 394


Jürjens, Jan

Automated Security Hardening for Evolving UML Models

Richard N. Taylor; Harald Gall; Nenad Medvidović (Hrsg). Proceedings of the 33rd International Conference on Software Engineering ICSE 2011: May 21–28, 2011; Waikiki, Honolulu, Hawaii. New York, NY: ACM Association for Computing Machinery 2011 S. 986 - 988


Schmidt, Holger; Jürjens, Jan

Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec

Haralambos Mouratidis; Colette Rolland (Hrsg). Advanced Information Systems Engineering: 23rd International Conference, CAiSE 2011: London, UK, June 20-24, 2011; Proceedings. Berlin: Springer 2011 S. 367 - 382


Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Extracting and verifying cryptographic models from C protocol code by symbolic execution

Yan Chen; George Danezis; Vitaly Shmatikov (Hrsg). Proceedings of the 18th ACM Conference on Computer and Communications Security CCS '11: October 17. - 21., 2011; Chicago, Illinois, USA. New York, NY: ACM Association for Computing Machinery 2011 S. 331 - 340


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.

Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols

Steve Kremer; Michael Backes; Steve Zdancewic; Jonathan Herzog (Hrsg). 24th IEEE Computer Security Foundations Symposium CSF 2011: 27-29 June, 2011; Cernay-la-Ville, France. Los Alamitos, CA: IEEE Computer Society 2011 S. 3 - 17


Jürjens, Jan; Marchal, Loïc; Ochoa, Martín et al.

Incremental Security Verification for Evolving UMLsec models

Robert B. France; Jochen M. Kuester; Behzad Bordbar; Richard F. Paige (Hrsg). Modelling Foundations and Applications: 7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings. Berlin: Springer 2011 S. 52 - 68


Shaikh Sadi, Muhammad; Uddin, Md. Nazim; Khan, Md. Mizanur Rahman et al.

Mitigating Soft Error Risks through Protecting Critical Variables and Blocks

Salah S. Al-Majeed;Chih-Lin Hu;Dhinaharan Nagamalai (Hrsg). Advances in Wireless, Mobile Networks and Applications: International Conferences, WiMoA 2011 and ICCSEA 2011, Dubai, United Arab Emirates, May 25-27, 2011. Proceedings. Berlin: Springer 2011 S. 137 - 145 (Communications in Computer and Information Science)