Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
Ergebnisse pro Seite:  10

Lee, Seok-Won; Monga, Mattia; Jürjens, Jan

Seventh international workshop on software engineering for secure systems SESS 2011

Richard N. Taylor; Harald Gall; Nenad Medvidović (Hrsg). Proceedings of the 33rd International Conference on Software Engineering ICSE 2011: May 21–28, 2011; Waikiki, Honolulu, Hawaii. New York, NY: ACM Association for Computing Machinery 2011 S. 1200 - 1201


Jürjens, Jan; Nuseibeh, Bashar

Software Engineering for Secure Systems: Technical Briefing ACM 2011

33rd International Conference on Software Engineering (ICSE 2011). 2011 S. 1 - 28


Taubenberger, S.; Jürjens, Jan

Studie zu IT-Risikobewertungen in der Praxis

Peter Schartner;Jürgen Taeger (Hrsg). D-A-CH security 2011: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Klagenfurt: Syssec 2011 S. 235 - 247


Knauss, Eric; Hilde Houmb, Siv; Schneider, Kurt et al.

Supporting Requirements Engineers in Recognising Security Issues

Daniel Berry; Xavier Franch (Hrsg). Requirements Engineering: Foundation for Software Quality; 17th International Working Conference, REFSQ 2011, Essen, Germany, March 28-30, 2011. Proceedings. Berlin: Springer 2011 S. 4 - 18


Hatebur, Denis; Heisel, Maritta; Jürjens, Jan et al.

Systematic Development of UMLsec Design Models Based on Security Requirements

Dimitra Giannakopoulou; Fernando Orejas (Hrsg). Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Berlin: Springer 2011 S. 232 - 246


Fernandez, Eduardo B.; Yoshioka, Nobukazu; Washizaki, Hironori et al.

Using Security Patterns to Develop Secure Systems

Haralambos Mouratidis (Hrsg). Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: Information Science Reference 2011 S. 16 - 31


Aizatulin, Mihhail; Dupressoir, François; Gordon, Andrew D. et al.

Verifying Cryptographic Code in C: Some Experience and the Csec Challenge

Gilles Barthe; Anupam Datta; Sandro Etalle (Hrsg). Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Berlin: Springer 2011 S. 1 - 20


Peschke, Marc; Hirsch, Martin; Jürjens, Jan et al.

Werkzeuggestützte Identifikation von IT-Sicherheitsrisiken

Peter Schartner;Jürgen Taeger (Hrsg). D-A-CH security 2011: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Klagenfurt: Syssec 2011 S. 267 - 278


Beckers, Kristian; Hirsch, Martin; Jürjens, Jan

Compliance in Clouds: A cloud computing security perspective

GI SECMGT-Workshop. Frankfurt (Germany). 2010 S. 1 - 26


Sheikh Sadi, Muhammad; Myers, D. G.; Ortega-Sanchez, Cesar et al.

Component criticality analysis to minimize soft errors risk

International Journal of Computer Systems Science & Engineering. Bd. 25. H. 5. London: CRL 2010 S. 23 - 37