Beckers, K.; Jürjens, Jan
Security and Compliance in CloudsInformation Security Solutions Europe (ISSE 2010). Berlin (Germany). 2010
Jürjens, Jan
Security und Compliance in Clouds5. COMPARC Fokustag, Fraunhofer ISST, 20 May 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010
Lee, Seok-Won; Monga, Mattia; Jürjens, Jan
The 6th International Workshop on Software Engineering for Secure Systems SESS 2010Jeff Kramer; Judith Bishop; Prem Devanbu; Sebastian Uchitel (Hrsg). Proceeding of the 32nd International Conference on Software Engineering ICSE 2010: Volume 2; 1-8 May 2010 Cape Town, South Africa. New York, NY: ACM Association for Computing Machinery 2010 S. 433 - 434
Montrieux, Lionel; Jürjens, Jan; B. Haley, Charles et al.
Tool Support for Code Generation from a UMLsec PropertyCharles Pecheur; Jamie Andrews; Elisabetta Di Nitto (Hrsg). Proceedings of the 25th IEEE/ACM International Conference on Automated Software Engineering ASE 2010: September 20 - 24, 2010; Antwerp, Belgium. New York, NY: ACM Association for Computing Machinery 2010 S. 357 - 358
Blanco, Carlos; Fernández-Medina, Eduardo; Trujillo, Juan et al.
Towards the Secure Modelling of OLAP Users’ BehaviourWillem Jonker; Milan Petković (Hrsg). Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings. Berlin: Springer 2010 S. 101 - 112
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan
Verifying authentication properties of C security protocol code using general verifiersFourth International Workshop on Analysis of Security APIs,. 2010
Jürjens, Jan
A domain-specific language for cryptographic protocols based on streamsThe Journal of Logic and Algebraic Programming. Bd. 78. H. 2. Amsterdam: Elsevier 2009 S. 54 - 73
Sadi, Muhammad Sheikh; Jürjens, Jan
A Novel Approach to Minimizing the Risks of Soft Errors in Mobile and Ubiquitous SystemsLalit Goel;King-Jet Tseng;Sabu Emmanuel;Geok-See Ng (Hrsg). Proceeding of the IEEE Region 10 Conference TENCON 2009; 23 – 26 November 2009; Singapore. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2009 S. 1 - 6
Jürjens, Jan
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie ProjectElectronic Notes in Theoretical Computer Science. Bd. 250. H. 1. Amsterdam: Elsevier 2009 S. 123 - 136
Jürjens, Jan; Weber, Tjark
Finite Models in FOL-Based Crypto-Protocol VerificationPierpaolo Degano; Luca Viganò (Hrsg). Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers. Berlin: Springer 2009 S. 155 - 172