Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Prof. Dr. Jan Jürjens

Institut für Softwaretechnik, Universität Koblenz

Publikationen
Ergebnisse pro Seite:  10

Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.

Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec

Requirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93


Pironti, Alfredo; Jürjens, Jan

Formally-Based Black-Box Monitoring of Security Protocols

Fabio Massacci; Dan Wallach; Nicola Zannone (Hrsg). Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Berlin: Springer 2010 S. 79 - 95


Mouratidis, Haralambos; Jürjens, Jan

From goal-driven security requirements engineering to secure design

International Journal of Intelligent Systems. Bd. 25. H. 8. New York, NY: Wiley 2010 S. 813 - 840


Höhn, Sebastian; Lowis, Lutz; Jürjens, Jan et al.

Identification of Vulnerabilities in Web Services using Model-based Security

Carlos A. Gutiérrez;Eduardo Fernández-Medina;Mario Piattini (Hrsg). Web Services Security Development and Architecture: Theoretical and Practical Issues. Hershey, PA: Information Science Reference 2010 S. 1 - 32


Jürjens, Jan

Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote)

Paloma Díaz; Mary Beth Rosson; Christopher Hundhausen; Emmanuel Pietriga (Hrsg). IEEE Symposium on Visual Languages and Human-Centric Computing VL/HCC 2010: 21-25 September, 2010; Leganes, Madrid, Spain. Los Alamitos, CA: IEEE Computer Society 2010 S. 4 - 6


Jürjens, Jan

Modell-basierte Analyse von Geschäftsprozessen und Architekturen

4. COMPARC Fokustag, Fraunhofer ISST, 20 Jan. 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010


Jürjens, Jan

Outsourcing, SaaS & Clouds: Aber sicher! (... und compliant)

Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2010). Wuppertal (Germany). 2010



Bauer, Andreas; Jürjens, Jan

Runtime verification of cryptographic protocols

Computers & Security. Bd. 29. H. 3. Amsterdam: Elsevier 2010 S. 315 - 330


Beckers, Kristian; Jürjens, Jan

Security and Compliance in Clouds

Norbert Pohlmann; Helmut Reimer; Wolfgang Schneider (Hrsg). ISSE 2010 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010. Wiesbaden: Vieweg + Teubner 2010 S. 91 - 100