Institut für Softwaretechnik
FB 4: Informatik / Universität Koblenz
- 0261/287-2722
- 0261/287-2721
Beckers, K.; Jürjens, Jan
Security and Compliance in CloudsInformation Security Solutions Europe (ISSE 2010). Berlin (Germany). 2010
Beckers, Kristian; Jürjens, Jan
Security and Compliance in CloudsNorbert Pohlmann; Helmut Reimer; Wolfgang Schneider (Hrsg). ISSE 2010 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010. Wiesbaden: Vieweg + Teubner 2010 S. 91 - 100
Jürjens, Jan
Security und Compliance in Clouds5. COMPARC Fokustag, Fraunhofer ISST, 20 May 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010
Lee, Seok-Won; Monga, Mattia; Jürjens, Jan
The 6th International Workshop on Software Engineering for Secure Systems SESS 2010Jeff Kramer; Judith Bishop; Prem Devanbu; Sebastian Uchitel (Hrsg). Proceeding of the 32nd International Conference on Software Engineering ICSE 2010: Volume 2; 1-8 May 2010 Cape Town, South Africa. New York, NY: ACM Association for Computing Machinery 2010 S. 433 - 434
Montrieux, Lionel; Jürjens, Jan; B. Haley, Charles et al.
Tool Support for Code Generation from a UMLsec PropertyCharles Pecheur; Jamie Andrews; Elisabetta Di Nitto (Hrsg). Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering ASE 2010: September 20 - 24, 2010; Antwerp, Belgium. New York, NY: ACM Association for Computing Machinery 2010 S. 357 - 358
Blanco, Carlos; Fernández-Medina, Eduardo; Trujillo, Juan et al.
Towards the Secure Modelling of OLAP Users’ BehaviourWillem Jonker; Milan Petković (Hrsg). Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings. Berlin: Springer 2010 S. 101 - 112
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan
Verifying authentication properties of C security protocol code using general verifiersFourth International Workshop on Analysis of Security APIs,. 2010
Jürjens, Jan
A domain-specific language for cryptographic protocols based on streamsThe Journal of Logic and Algebraic Programming. Bd. 78. H. 2. Amsterdam: Elsevier 2009 S. 54 - 73
Sadi, Muhammad Sheikh; Jürjens, Jan
A Novel Approach to Minimizing the Risks of Soft Errors in Mobile and Ubiquitous SystemsLalit Goel;King-Jet Tseng;Sabu Emmanuel;Geok-See Ng (Hrsg). Proceeding of the IEEE Region 10 Conference TENCON 2009; 23 – 26 November 2009; Singapore. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2009 S. 1 - 6
Jürjens, Jan
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie ProjectElectronic Notes in Theoretical Computer Science. Bd. 250. H. 1. Amsterdam: Elsevier 2009 S. 123 - 136