Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Prof. Dr. Jan Jürjens

Institut für Softwaretechnik, Universität Koblenz

Publikationen
Ergebnisse pro Seite:  10

Ruhroth, Thomas; Jürjens, Jan

Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec

Victor Winter; Robin Gandhi; Abhishek Parakh (Hrsg). Proceeding of the 14th IEEE International Symposium on High Assurance Systems Engineering HASE 2012: 25. - 27. October, 2012; Omaha, Nebraska. Los Alamitos, CA: IEEE Computer Society 2012 S. 177 - 184


Fourneret, Elizabeta; Bouquet, Fabrice; Ochoa, Martin et al.

Vérification et Test pour des systémes évolutifs

AFADL 2012. Grenoble. 2012


Islam, Shareeful; Mouratidis, Haralambos; Jürjens, Jan

A framework to support alignment of secure software engineeringwith legal regulations

Software and Systems Modeling. Bd. 10. H. 3. Berlin: Springer 2011 S. 369 - 394


Jürjens, Jan

Automated Security Hardening for Evolving UML Models

Richard N. Taylor; Harald Gall; Nenad Medvidović (Hrsg). Proceedings of the 33rd International Conference on Software Engineering ICSE 2011: May 21–28, 2011; Waikiki, Honolulu, Hawaii. New York, NY: ACM Association for Computing Machinery 2011 S. 986 - 988


Schmidt, Holger; Jürjens, Jan

Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec

Haralambos Mouratidis; Colette Rolland (Hrsg). Advanced Information Systems Engineering: 23rd International Conference, CAiSE 2011: London, UK, June 20-24, 2011; Proceedings. Berlin: Springer 2011 S. 367 - 382


Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Extracting and verifying cryptographic models from C protocol code by symbolic execution

Yan Chen; George Danezis; Vitaly Shmatikov (Hrsg). Proceedings of the 18th ACM Conference on Computer and Communications Security CCS '11: October 17. - 21., 2011; Chicago, Illinois, USA. New York, NY: ACM Association for Computing Machinery 2011 S. 331 - 340


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.

Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols

Steve Kremer; Michael Backes; Steve Zdancewic; Jonathan Herzog (Hrsg). 24th IEEE Computer Security Foundations Symposium CSF 2011: 27-29 June, 2011; Cernay-la-Ville, France. Los Alamitos, CA: IEEE Computer Society 2011 S. 3 - 17


Jürjens, Jan; Marchal, Loïc; Ochoa, Martín et al.

Incremental Security Verification for Evolving UMLsec models

Robert B. France; Jochen M. Kuester; Behzad Bordbar; Richard F. Paige (Hrsg). Modelling Foundations and Applications: 7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings. Berlin: Springer 2011 S. 52 - 68


Shaikh Sadi, Muhammad; Uddin, Md. Nazim; Khan, Md. Mizanur Rahman et al.

Mitigating Soft Error Risks through Protecting Critical Variables and Blocks

Salah S. Al-Majeed;Chih-Lin Hu;Dhinaharan Nagamalai (Hrsg). Advances in Wireless, Mobile Networks and Applications: International Conferences, WiMoA 2011 and ICCSEA 2011, Dubai, United Arab Emirates, May 25-27, 2011. Proceedings. Berlin: Springer 2011 S. 137 - 145 (Communications in Computer and Information Science)


Fourneret, Elizabeta; Ochoa, Martin; Bouquet, Fabrice et al.

Model-Based Security Verification and Testing for Smart- cards

Günther Pernul; Juan-Carlos Trujillo Mondéjar; Edgar Weippl (Hrsg). Proceedings of the Sixth International Conference on Availability, Reliability and Security, ARES 2011: 22-26 August 2011; Vienna, Austria. Los Alamitos, CA: IEEE Computer Society 2011 S. 272 - 279