Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsecRequirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93
Pironti, Alfredo; Jürjens, Jan
Formally-Based Black-Box Monitoring of Security ProtocolsFabio Massacci; Dan Wallach; Nicola Zannone (Hrsg). Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Berlin: Springer 2010 S. 79 - 95
Mouratidis, Haralambos; Jürjens, Jan
From goal-driven security requirements engineering to secure designInternational Journal of Intelligent Systems. Bd. 25. H. 8. New York, NY: Wiley 2010 S. 813 - 840
Höhn, Sebastian; Lowis, Lutz; Jürjens, Jan et al.
Identification of Vulnerabilities in Web Services using Model-based SecurityCarlos A. Gutiérrez;Eduardo Fernández-Medina;Mario Piattini (Hrsg). Web Services Security Development and Architecture: Theoretical and Practical Issues. Hershey, PA: Information Science Reference 2010 S. 1 - 32
Jürjens, Jan
Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote)Paloma Díaz; Mary Beth Rosson; Christopher Hundhausen; Emmanuel Pietriga (Hrsg). IEEE Symposium on Visual Languages and Human-Centric Computing VL/HCC 2010: 21-25 September, 2010; Leganes, Madrid, Spain. Los Alamitos, CA: IEEE Computer Society 2010 S. 4 - 6
Jürjens, Jan
Modell-basierte Analyse von Geschäftsprozessen und Architekturen4. COMPARC Fokustag, Fraunhofer ISST, 20 Jan. 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010
Jürjens, Jan
Outsourcing, SaaS & Clouds: Aber sicher! (... und compliant)Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2010). Wuppertal (Germany). 2010
Lee, Seok-Won; Monga, Mattia; Jürjens, Jan
Proceeding of the 2010 ICSE Workshop on Software Engineering for Secure Systems SESS 2010: May 2, 2010; Cape Town, South Africa in conjunction with The 32nd ACM/IEEE International Conference on Software Engineering ICSE 2010; May 2–8, 2010New York, NY: ACM Association for Computing Machinery 2010
Bauer, Andreas; Jürjens, Jan
Runtime verification of cryptographic protocolsComputers & Security. Bd. 29. H. 3. Amsterdam: Elsevier 2010 S. 315 - 330
Beckers, Kristian; Jürjens, Jan
Security and Compliance in CloudsNorbert Pohlmann; Helmut Reimer; Wolfgang Schneider (Hrsg). ISSE 2010 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010. Wiesbaden: Vieweg + Teubner 2010 S. 91 - 100