Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Prof. Dr. Jan Jürjens

Institut für Softwaretechnik, Universität Koblenz

Publikationen
Ergebnisse pro Seite:  10

Taubenberger, Stefan; Jürjens, Jan; Yu, Yijun et al.

Resolving vulnerability identification errors using security requirements on business process models.

Inf. Manag. Comput. Security. Bd. 21. H. 3. 2013 S. 202 - 223


Jürjens, Jan

Security for Changing Software and Systems (Invited Talk)

tubs.CITY Symposium 2013. Braunschweig. 2013 S. 1 - 19


Jürjens, Jan

Sicherheit und Compliance in der Cloud

microfin Jahresempfang 2013. Frankfurt. 2013 S. 1 - 23


Humberg, Thorsten; Wessel, Christian; Poggenpohl, Daniel et al.

Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes.

CLOSER (Selected Papers). 2013 S. 36 - 51


Jürjens, Jan

Zertifizierung für sichere Cyber-Physikalische Systeme

Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2013). Paderborn (Germany). 2013


Ochoa, Martín; Jürjens, Jan; Warzecha, Daniel

A Sound Decision Procedure for the Compositionality of Secrecy

Gilles Barthe;Benjamin Livshits;Riccardo Scandariato (Hrsg). Engineering Secure Software and Systems: 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings. Berlin: Springer 2012 S. 97 - 105 (Lecture Notes in Computer Science)


Ochoa, Martín; Jürjens, Jan; Warzecha, Daniel

A Sound Decision Procedure for the Compositionality of Secrecy.

ESSoS. 2012 S. 97 - 105


Jürjens, Jan; Schneider, Kurt

Beyond One-Shot Security

Norbert Seyff;Anne Koziolek (Hrsg). Modelling and Quality in requirements Engineering: Essays Dedicated to Martin Glinz on the Occasion of His 60th Birthday. Münster: Monsenstein und Vannerdat 2012 S. 121 - 132


Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Computational Verification of C Protocol Implementations by Symbolic Execution

Ting Yu;George Danezis;Virgil Gligor (Hrsg). Proceedings of the 19th ACM Conference on Computer and Communications Security CCS 2012: October 16–18, 2012; Raleigh, North Carolina, USA. New York, NY: ACM Association for Computing Machinery 2012 S. 712 - 723


Aizatulin, Mihhail; D. Gordon, Andrew; Jürjens, Jan

Computational verification of C protocol implementations by symbolic execution.

ACM Conference on Computer and Communications Security. 2012 S. 712 - 723