![](/assets/person_male-b881d87fb61a931e9d3bb642f1c485add6672bc4ab7ebf117cf57f0ee0d38ad0.png)
Höhn, Sebastian; Lowis, Lutz; Jürjens, Jan et al.
Identification of Vulnerabilities in Web Services using Model-based SecurityCarlos A. Gutiérrez;Eduardo Fernández-Medina;Mario Piattini (Hrsg). Web Services Security Development and Architecture: Theoretical and Practical Issues. Hershey, PA: Information Science Reference 2010 S. 1 - 32
Jürjens, Jan
Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote)Paloma Díaz;Mary Beth Rosson;Christopher Hundhausen;Emmanuel Pietriga (Hrsg). IEEE Symposium on Visual Languages and Human-Centric Computing VL/HCC 2010: 21-25 September, 2010; Leganes, Madrid, Spain. Los Alamitos, CA: IEEE Computer Society 2010 S. 4 - 6
Jürjens, Jan
Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote).VL/HCC. 2010 S. 4
Jürjens, Jan
Modell-basierte Analyse von Geschäftsprozessen und Architekturen4. COMPARC Fokustag, Fraunhofer ISST, 20 Jan. 2010, Dortmund, Germany. Fraunhofer ISST, Dortmund 2010
Jürjens, Jan
Outsourcing, SaaS & Clouds: Aber sicher! (... und compliant)Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2010). Wuppertal (Germany). 2010
Lee, Seok-Won; Monga, Mattia; Jürjens, Jan
Proceeding of the 2010 ICSE Workshop on Software Engineering for Secure Systems SESS 2010: May 2, 2010; Cape Town, South Africa in conjunction with The 32nd ACM/IEEE International Conference on Software Engineering ICSE 2010; May 2–8, 2010New York, NY: ACM Association for Computing Machinery 2010
Bauer, Andreas; Jürjens, Jan
Runtime verification of cryptographic protocolsComputers & Security. Bd. 29. H. 3. Amsterdam: Elsevier 2010 S. 315 - 330
Bauer, Andreas; Jürjens, Jan
Runtime verification of cryptographic protocols.Computers & Security. Bd. 29. H. 3. 2010 S. 315 - 330
Beckers, K.; Jürjens, Jan
Security and Compliance in CloudsInformation Security Solutions Europe (ISSE 2010). Berlin (Germany). 2010
Beckers, Kristian; Jürjens, Jan
Security and Compliance in Clouds.ISSE. 2010 S. 91 - 100