Jürjens, Jan
Security protocols, properties, and their monitoringBart De Win; Seok-Won Lee; Mattia Monga (Hrsg). Proceedings of the 4th International Workshop on Software Engineering for Secure Systems SESS 2008 held at the Thirteenth International Conference on Software Engineering ICSE 2008: May 10-18, 2008; Leipzig, Germany. New York, NY: ACM Association for Computing Machinery 2008 S. 33 - 40
Yu, Yijun; Jürjens, Jan; Schreck, Jörg
Tools for Traceability in Secure Software DevelopmentPaola Inverardi; Andrew Ireland; Willem Visser (Hrsg). Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering ASE 2008: 15-19 September, 2008; L’Aquila , Italy. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2008 S. 503 - 504
Jürjens, Jan; Yu, Yijun; Bauer, Andreas
Tools for Traceable Security VerificationSamson Abramsky; Erol Gelenbe; Vladimiro Sassone (Hrsg). Visions of Computer Science - BCS Research Conference: Proceedings of Visions of Computer Science BCS Research Conference; Imperial College, London, UK; 22–24 September 2008. Swindon: British Computer Society 2008 S. 367 - 378
Ratiu, Daniel; Feilkas, Martin; Deissenböck, Florian et al.
Towards a Repository of Common Programming Technologies KnowledgeInternational Workshop on Semantic Technologies in System Maintenance (STSM 2008). 2008 S. 1 - 24
Jürjens, Jan
Towards Verified Crypto-Protocol Implementations: The Java Secure Sockets ExtensionABZ 2008 VSRnet Workshop. 2008 S. 1 - 31
Yu, Yijun; Jürjens, Jan; Mylopoulos, John
Traceability for the Maintenance of Secure SoftwareFuqing Yang; Scott Tilley; Hong Mei; Kenny Wong (Hrsg). Proceedings of the 2008 IEEE International Conference on Software Maintenance ICSM 2008: September 28 - October 4, 2008 Beijing, China. Los Alamitos, CA: IEEE Computer Society 2008 S. 297 - 306
Jürjens, Jan
Using Interface Specifications for Verifying Crypto- protocol ImplementationsFoundations of Interface Technologies 2008 (FIT‘08 @ ETAPS 2008). 2008
Houmb, Siv Hilde; Georg, Geri; Jürjens, Jan et al.
An Integrated Security Verification and Security Solution Design Trade-off Analysis ApproachHaralambos Mouratidis;Paolo Giorgini (Hrsg). Integrating Security and Software Engineering: Advances and Future Visions. Hershey, PA: IGI Global 2007 S. 190 - 219
Jürjens, Jan
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie ProjectSeventh International Workshop on Automated Verification of Critical Systems (AVOCS 2007). Oxford. 2007
Jürjens, Jan
Compliance-driven Secure Software Quality ManagementSoftware & Systems Quality Conference (SQC-UK 2007). London, 2./3. Oct. 2007