Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
Ergebnisse pro Seite:  10

Beckers, K.; Jürjens, Jan

Security and Compliance in Clouds

Information Security Solutions Europe (ISSE 2010). Berlin (Germany). 2010


Beckers, Kristian; Jürjens, Jan

Security and Compliance in Clouds

Norbert Pohlmann; Helmut Reimer; Wolfgang Schneider (Hrsg). ISSE 2010 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010. Wiesbaden: Vieweg + Teubner 2010 S. 91 - 100


Jürjens, Jan

Security und Compliance in Clouds

5. COMPARC Fokustag, Fraunhofer ISST, 20 May 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010


Lee, Seok-Won; Monga, Mattia; Jürjens, Jan

The 6th International Workshop on Software Engineering for Secure Systems SESS 2010

Jeff Kramer; Judith Bishop; Prem Devanbu; Sebastian Uchitel (Hrsg). Proceeding of the 32nd International Conference on Software Engineering ICSE 2010: Volume 2; 1-8 May 2010 Cape Town, South Africa. New York, NY: ACM Association for Computing Machinery 2010 S. 433 - 434


Montrieux, Lionel; Jürjens, Jan; B. Haley, Charles et al.

Tool Support for Code Generation from a UMLsec Property

Charles Pecheur; Jamie Andrews; Elisabetta Di Nitto (Hrsg). Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering ASE 2010: September 20 - 24, 2010; Antwerp, Belgium. New York, NY: ACM Association for Computing Machinery 2010 S. 357 - 358


Blanco, Carlos; Fernández-Medina, Eduardo; Trujillo, Juan et al.

Towards the Secure Modelling of OLAP Users’ Behaviour

Willem Jonker; Milan Petković (Hrsg). Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings. Berlin: Springer 2010 S. 101 - 112


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan

Verifying authentication properties of C security protocol code using general verifiers

Fourth International Workshop on Analysis of Security APIs,. 2010


Jürjens, Jan

A domain-specific language for cryptographic protocols based on streams

The Journal of Logic and Algebraic Programming. Bd. 78. H. 2. Amsterdam: Elsevier 2009 S. 54 - 73


Sadi, Muhammad Sheikh; Jürjens, Jan

A Novel Approach to Minimizing the Risks of Soft Errors in Mobile and Ubiquitous Systems

Lalit Goel;King-Jet Tseng;Sabu Emmanuel;Geok-See Ng (Hrsg). Proceeding of the IEEE Region 10 Conference TENCON 2009; 23 – 26 November 2009; Singapore. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2009 S. 1 - 6


Jürjens, Jan

Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project

Electronic Notes in Theoretical Computer Science. Bd. 250. H. 1. Amsterdam: Elsevier 2009 S. 123 - 136