Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
Ergebnisse pro Seite:  10

Höhn, Sebastian; Jürjens, Jan

Rubacon: Automated Support for Model-based Compliance Engineering

Wilhelm Schäfer; Matthew B. Dwyer; Volker Gruhn (Hrsg). Proceeding of the 30th International Conference on Software Engineering ICSE 2008: May 10-18, 2008; Leipzig, Germany. New York, NY: ACM Association for Computing Machinery 2008 S. 875 - 878


Jürjens, Jan

Security protocols, properties, and their monitoring

Bart De Win; Seok-Won Lee; Mattia Monga (Hrsg). Proceedings of the 4th International Workshop on Software Engineering for Secure Systems SESS 2008 held at the Thirteenth International Conference on Software Engineering ICSE 2008: May 10-18, 2008; Leipzig, Germany. New York, NY: ACM Association for Computing Machinery 2008 S. 33 - 40


Yu, Yijun; Jürjens, Jan; Schreck, Jörg

Tools for Traceability in Secure Software Development

Paola Inverardi; Andrew Ireland; Willem Visser (Hrsg). Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering ASE 2008: 15-19 September, 2008; L’Aquila , Italy. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2008 S. 503 - 504


Jürjens, Jan; Yu, Yijun; Bauer, Andreas

Tools for Traceable Security Verification

Samson Abramsky; Erol Gelenbe; Vladimiro Sassone (Hrsg). Visions of Computer Science - BCS Research Conference: Proceedings of Visions of Computer Science BCS Research Conference; Imperial College, London, UK; 22–24 September 2008. Swindon: British Computer Society 2008 S. 367 - 378


Ratiu, Daniel; Feilkas, Martin; Deissenböck, Florian et al.

Towards a Repository of Common Programming Technologies Knowledge

International Workshop on Semantic Technologies in System Maintenance (STSM 2008). 2008 S. 1 - 24


Jürjens, Jan

Towards Verified Crypto-Protocol Implementations: The Java Secure Sockets Extension

ABZ 2008 VSRnet Workshop. 2008 S. 1 - 31


Yu, Yijun; Jürjens, Jan; Mylopoulos, John

Traceability for the Maintenance of Secure Software

Fuqing Yang; Scott Tilley; Hong Mei; Kenny Wong (Hrsg). Proceedings of the 2008 IEEE International Conference on Software Maintenance ICSM 2008: September 28 - October 4, 2008 Beijing, China. Los Alamitos, CA: IEEE Computer Society 2008 S. 297 - 306


Jürjens, Jan

Using Interface Specifications for Verifying Crypto- protocol Implementations

Foundations of Interface Technologies 2008 (FIT‘08 @ ETAPS 2008). 2008


Houmb, Siv Hilde; Georg, Geri; Jürjens, Jan et al.

An Integrated Security Verification and Security Solution Design Trade-off Analysis Approach

Haralambos Mouratidis;Paolo Giorgini (Hrsg). Integrating Security and Software Engineering: Advances and Future Visions. Hershey, PA: IGI Global 2007 S. 190 - 219


Jürjens, Jan

Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project

Seventh International Workshop on Automated Verification of Critical Systems (AVOCS 2007). Oxford. 2007