Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Prof. Dr. Jan Jürjens

Institut für Softwaretechnik, Universität Koblenz

Publikationen
Ergebnisse pro Seite:  10

Beckers, K.; Jürjens, Jan

Security and Compliance in Clouds

Information Security Solutions Europe (ISSE 2010). Berlin (Germany). 2010


Jürjens, Jan

Security und Compliance in Clouds

5. COMPARC Fokustag, Fraunhofer ISST, 20 May 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010


Lee, Seok-Won; Monga, Mattia; Jürjens, Jan

The 6th International Workshop on Software Engineering for Secure Systems SESS 2010

Jeff Kramer; Judith Bishop; Prem Devanbu; Sebastian Uchitel (Hrsg). Proceeding of the 32nd International Conference on Software Engineering ICSE 2010: Volume 2; 1-8 May 2010 Cape Town, South Africa. New York, NY: ACM Association for Computing Machinery 2010 S. 433 - 434


Montrieux, Lionel; Jürjens, Jan; B. Haley, Charles et al.

Tool Support for Code Generation from a UMLsec Property

Charles Pecheur; Jamie Andrews; Elisabetta Di Nitto (Hrsg). Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering ASE 2010: September 20 - 24, 2010; Antwerp, Belgium. New York, NY: ACM Association for Computing Machinery 2010 S. 357 - 358


Blanco, Carlos; Fernández-Medina, Eduardo; Trujillo, Juan et al.

Towards the Secure Modelling of OLAP Users’ Behaviour

Willem Jonker; Milan Petković (Hrsg). Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings. Berlin: Springer 2010 S. 101 - 112


Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan

Verifying authentication properties of C security protocol code using general verifiers

Fourth International Workshop on Analysis of Security APIs,. 2010


Jürjens, Jan

A domain-specific language for cryptographic protocols based on streams

The Journal of Logic and Algebraic Programming. Bd. 78. H. 2. Amsterdam: Elsevier 2009 S. 54 - 73


Sadi, Muhammad Sheikh; Jürjens, Jan

A Novel Approach to Minimizing the Risks of Soft Errors in Mobile and Ubiquitous Systems

Lalit Goel;King-Jet Tseng;Sabu Emmanuel;Geok-See Ng (Hrsg). Proceeding of the IEEE Region 10 Conference TENCON 2009; 23 – 26 November 2009; Singapore. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2009 S. 1 - 6


Jürjens, Jan

Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project

Electronic Notes in Theoretical Computer Science. Bd. 250. H. 1. Amsterdam: Elsevier 2009 S. 123 - 136


Jürjens, Jan; Weber, Tjark

Finite Models in FOL-Based Crypto-Protocol Verification

Pierpaolo Degano; Luca Viganò (Hrsg). Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers. Berlin: Springer 2009 S. 155 - 172