Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
Ergebnisse pro Seite:  10

Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Cryptographic Security Verification for C by Symbolic Execution: A 5-minute presentation

Computer Security Foundations Symposium (CSF). 2010


Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.

Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec

Requirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93


Pironti, Alfredo; Jürjens, Jan

Formally-Based Black-Box Monitoring of Security Protocols

Fabio Massacci; Dan Wallach; Nicola Zannone (Hrsg). Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Berlin: Springer 2010 S. 79 - 95


Mouratidis, Haralambos; Jürjens, Jan

From goal-driven security requirements engineering to secure design

International Journal of Intelligent Systems. Bd. 25. H. 8. New York, NY: Wiley 2010 S. 813 - 840


Höhn, Sebastian; Lowis, Lutz; Jürjens, Jan et al.

Identification of Vulnerabilities in Web Services using Model-based Security

Carlos A. Gutiérrez;Eduardo Fernández-Medina;Mario Piattini (Hrsg). Web Services Security Development and Architecture: Theoretical and Practical Issues. Hershey, PA: Information Science Reference 2010 S. 1 - 32


Jürjens, Jan

Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote)

Paloma Díaz; Mary Beth Rosson; Christopher Hundhausen; Emmanuel Pietriga (Hrsg). IEEE Symposium on Visual Languages and Human-Centric Computing VL/HCC 2010: 21-25 September, 2010; Leganes, Madrid, Spain. Los Alamitos, CA: IEEE Computer Society 2010 S. 4 - 6


Jürjens, Jan

Modell-basierte Analyse von Geschäftsprozessen und Architekturen

4. COMPARC Fokustag, Fraunhofer ISST, 20 Jan. 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010


Jürjens, Jan

Outsourcing, SaaS & Clouds: Aber sicher! (... und compliant)

Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2010). Wuppertal (Germany). 2010



Bauer, Andreas; Jürjens, Jan

Runtime verification of cryptographic protocols

Computers & Security. Bd. 29. H. 3. Amsterdam: Elsevier 2010 S. 315 - 330