Institut für Softwaretechnik
FB 4: Informatik / Universität Koblenz
- 0261/287-2722
- 0261/287-2721
Bauer, Andreas; Jürjens, Jan
Runtime verification of cryptographic protocols.Computers & Security. Bd. 29. H. 3. 2010 S. 315 - 330
Beckers, K.; Jürjens, Jan
Security and Compliance in CloudsInformation Security Solutions Europe (ISSE 2010). Berlin (Germany). 2010
Beckers, Kristian; Jürjens, Jan
Security and Compliance in Clouds.ISSE. 2010 S. 91 - 100
Jürjens, Jan
Security und Compliance in Clouds5. COMPARC Fokustag, Fraunhofer ISST, 20 May 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010
Lee, Seok-Won; Monga, Mattia; Jürjens, Jan
The 6 International Workshop on Software Engineering for Secure Systems (SESS'10).ICSE (2). 2010 S. 433 - 434
Lee, Seok-Won; Monga, Mattia; Jürjens, Jan
The 6th International Workshop on Software Engineering for Secure Systems SESS 2010Jeff Kramer;Judith Bishop;Prem Devanbu;Sebastian Uchitel (Hrsg). Proceeding of the 32nd International Conference on Software Engineering ICSE 2010: Volume 2; 1-8 May 2010 Cape Town, South Africa. New York, NY: ACM Association for Computing Machinery 2010 S. 433 - 434
Montrieux, Lionel; Jürjens, Jan; B. Haley, Charles et al.
Tool Support for Code Generation from a UMLsec PropertyCharles Pecheur;Jamie Andrews;Elisabetta Di Nitto (Hrsg). Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering ASE 2010: September 20 - 24, 2010; Antwerp, Belgium. New York, NY: ACM Association for Computing Machinery 2010 S. 357 - 358
Montrieux, Lionel; Jürjens, Jan; B. Haley, Charles et al.
Tool support for code generation from a UMLsec property.ASE. 2010 S. 357 - 358
Blanco, Carlos; Fernández-Medina, Eduardo; Trujillo, Juan et al.
Towards the Secure Modelling of OLAP Users' Behaviour.Secure Data Management. 2010 S. 101 - 112
Blanco, Carlos; Fernández-Medina, Eduardo; Trujillo, Juan et al.
Towards the Secure Modelling of OLAP Users’ BehaviourWillem Jonker;Milan Petković (Hrsg). Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings. Berlin: Springer 2010 S. 101 - 112 (Lecture Notes in Computer Science)