Taubenberger, Stefan; Jürjens, Jan; Yu, Yijun et al.
Resolving vulnerability identification errors using security requirements on business process models.Inf. Manag. Comput. Security. Bd. 21. H. 3. 2013 S. 202 - 223
Jürjens, Jan
Security for Changing Software and Systems (Invited Talk)tubs.CITY Symposium 2013. Braunschweig. 2013 S. 1 - 19
Jürjens, Jan
Sicherheit und Compliance in der Cloudmicrofin Jahresempfang 2013. Frankfurt. 2013 S. 1 - 23
Humberg, Thorsten; Wessel, Christian; Poggenpohl, Daniel et al.
Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes.CLOSER (Selected Papers). 2013 S. 36 - 51
Jürjens, Jan
Zertifizierung für sichere Cyber-Physikalische SystemeTag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2013). Paderborn (Germany). 2013
Ochoa, Martín; Jürjens, Jan; Warzecha, Daniel
A Sound Decision Procedure for the Compositionality of SecrecyGilles Barthe;Benjamin Livshits;Riccardo Scandariato (Hrsg). Engineering Secure Software and Systems: 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings. Berlin: Springer 2012 S. 97 - 105 (Lecture Notes in Computer Science)
Ochoa, Martín; Jürjens, Jan; Warzecha, Daniel
A Sound Decision Procedure for the Compositionality of Secrecy.ESSoS. 2012 S. 97 - 105
Jürjens, Jan; Schneider, Kurt
Beyond One-Shot SecurityNorbert Seyff;Anne Koziolek (Hrsg). Modelling and Quality in requirements Engineering: Essays Dedicated to Martin Glinz on the Occasion of His 60th Birthday. Münster: Monsenstein und Vannerdat 2012 S. 121 - 132
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Computational Verification of C Protocol Implementations by Symbolic ExecutionTing Yu;George Danezis;Virgil Gligor (Hrsg). Proceedings of the 19th ACM Conference on Computer and Communications Security CCS 2012: October 16–18, 2012; Raleigh, North Carolina, USA. New York, NY: ACM Association for Computing Machinery 2012 S. 712 - 723
Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan
Computational verification of C protocol implementations by symbolic execution.ACM Conference on Computer and Communications Security. 2012 S. 712 - 723