Institut für Softwaretechnik
FB 4: Informatik / Universität Koblenz
- 0261/287-2722
- 0261/287-2721
Jürjens, Jan; Lehrhuber, Markus; Wimmel, Guido
Model-Based Design and Analysis of Permission-Based SecurityCarlo Ghezzi;Yuxi Fu;Shaoying Liu;Jim Woodcock (Hrsg). Proceeding of the 10th IEEE International Conference on Engineering of Complex Computer Systems ICECCS 2005: 16-20 June 2005; Shanghai, China. Los Alamitos, CA: IEEE Computer Society 2005 S. 224 - 233
Jürjens, Jan; Lehrhuber, Markus; Wimmel, Guido
Model-Based Design and Analysis of Permission-Based Security.ICECCS. 2005 S. 224 - 233
Wagner, Stefan; Jürjens, Jan
Model-Based Identification of Fault-Prone ComponentsMario Dal Cin;Mohamed Kaâniche;András Pataricza (Hrsg). Dependable Computing - EDCC 5: 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005. Proceedings. Berlin: Springer 2005 S. 435 - 452 (Lecture Notes in Computer Science)
Wagner, Stefan; Jürjens, Jan
Model-Based Identification of Fault-Prone Components.EDCC. 2005 S. 435 - 452
Jürjens, Jan
Model-based Security Engineering with UMLAldini, A.; , ; Martinelli, F. (Hrsg). Foundations of Security Analysis and Desing III: FOSAD 2004/2005 Tutorial Lectures. 2005 S. 42 - 77 (Lecture Notes in Computer Science)
Jürjens, Jan
Model-Based Security Engineering with UML: Introducing Security Aspects.FMCO. 2005 S. 64 - 87
Botaschanjan, Jewgenij; Jürjens, Jan
MoDll: Modeling and Analyzing Time-ConstraintsJerzy Rozenblit;Tim O’Neill;Jianfeng Peng (Hrsg). Proceedings of the 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems ECBS 2005: 4-7 April 2005; Greenbelt, Maryland. Los Alamitos, CA: IEEE Computer Society 2005 S. 299 - 306
Jürjens, Jan
Return on Security Investment - TutorialInfotage. Starnberger See. 2005
Jürjens, Jan
Secure Systems Development with UMLBerlin: Springer 2005
Jürjens, Jan
Secure systems development with UML.2005