Institut für Softwaretechnik
FB 4: Informatik / Universität Koblenz
- 0261/287-2722
- 0261/287-2721
Rosado, David G.; Sanchez, Luís Enrique; Fernández-Medina, Eduardo et al.
Security in Information Systems: New Challenges and OpportunitiesJournal of Universal Computer Science. Bd. 18. H. 6. Graz: Verlag der Technischen Universität Graz 2012 S. 728 - 731
Ruhroth, Thomas; Jürjens, Jan
Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsecVictor Winter; Robin Gandhi; Abhishek Parakh (Hrsg). Proceeding of the 14th IEEE International Symposium on High Assurance Systems Engineering HASE 2012: 25. - 27. October, 2012; Omaha, Nebraska. Los Alamitos, CA: IEEE Computer Society 2012 S. 177 - 184
Fourneret, Elizabeta; Bouquet, Fabrice; Ochoa, Martin et al.
Vérification et Test pour des systémes évolutifsAFADL 2012. Grenoble. 2012
Islam, Shareeful; Mouratidis, Haralambos; Jürjens, Jan
A framework to support alignment of secure software engineeringwith legal regulationsSoftware and Systems Modeling. Bd. 10. H. 3. Berlin: Springer 2011 S. 369 - 394
Jürjens, Jan
Automated Security Hardening for Evolving UML ModelsRichard N. Taylor; Harald Gall; Nenad Medvidović (Hrsg). Proceedings of the 33rd International Conference on Software Engineering ICSE 2011: May 21–28, 2011; Waikiki, Honolulu, Hawaii. New York, NY: ACM Association for Computing Machinery 2011 S. 986 - 988
Schmidt, Holger; Jürjens, Jan
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsecHaralambos Mouratidis; Colette Rolland (Hrsg). Advanced Information Systems Engineering: 23rd International Conference, CAiSE 2011: London, UK, June 20-24, 2011; Proceedings. Berlin: Springer 2011 S. 367 - 382
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Extracting and verifying cryptographic models from C protocol code by symbolic executionYan Chen; George Danezis; Vitaly Shmatikov (Hrsg). Proceedings of the 18th ACM Conference on Computer and Communications Security CCS '11: October 17. - 21., 2011; Chicago, Illinois, USA. New York, NY: ACM Association for Computing Machinery 2011 S. 331 - 340
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.
Guiding a General-Purpose C Verifier to Prove Cryptographic ProtocolsSteve Kremer; Michael Backes; Steve Zdancewic; Jonathan Herzog (Hrsg). 24th IEEE Computer Security Foundations Symposium CSF 2011: 27-29 June, 2011; Cernay-la-Ville, France. Los Alamitos, CA: IEEE Computer Society 2011 S. 3 - 17
Jürjens, Jan; Marchal, Loïc; Ochoa, Martín et al.
Incremental Security Verification for Evolving UMLsec modelsRobert B. France; Jochen M. Kuester; Behzad Bordbar; Richard F. Paige (Hrsg). Modelling Foundations and Applications: 7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings. Berlin: Springer 2011 S. 52 - 68
Shaikh Sadi, Muhammad; Uddin, Md. Nazim; Khan, Md. Mizanur Rahman et al.
Mitigating Soft Error Risks through Protecting Critical Variables and BlocksSalah S. Al-Majeed;Chih-Lin Hu;Dhinaharan Nagamalai (Hrsg). Advances in Wireless, Mobile Networks and Applications: International Conferences, WiMoA 2011 and ICCSEA 2011, Dubai, United Arab Emirates, May 25-27, 2011. Proceedings. Berlin: Springer 2011 S. 137 - 145 (Communications in Computer and Information Science)