Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Prof. Dr. Jan Jürjens

Institut für Softwaretechnik, Universität Koblenz

Publikationen
Ergebnisse pro Seite:  10

Jürjens, Jan

Understanding Security Goals Provided by Crypto- Protocol Implementations

Harry M. Sneed; Tibor Gyimothy; Vaclav Rajlich (Hrsg). Proceedings of the 21st IEEE International Conference on Software Maintenance ICSM 2005: 26-29 September, 2005; Budapest, Hungary. Los Alamitos, CA: IEEE Computer Society 2005 S. 643 - 646


Jürjens, Jan

UP and Security: Overview on UMLsec

Sobenet workshop: UP, XP and architecture. KU Leuven (Belgium). 2005


Jürjens, Jan

Verification of Low-level Crypto-Protocol Implementations Using Automated Theorem Proving

Manfred Broy; Jean-Pierre Talpin; Elizabeth Leonard (Hrsg). Proceedings of the Third ACM & IEEE International Conference on Formal Methods and Models for Co-Design MEMOCODE’05: July 11-14, 2005; Verona, Italy. Los Alamitos, CA: IEEE Computer Society 2005 S. 89 - 98


Jürjens, Jan; Shabalin, Pasha

XML-based Analysis of UML Models for Critical Systems Development

Hongji Yang (Hrsg). Advances in UML and XML-Based Software Evolution. Hershey, PA: IGI Global 2005 S. 257 - 274


Jürjens, Jan; Shabalin, Pasha

A Foundation for Tool-Supported Critical Systems Development with UML

Vaclav Dvorak; Miroslav Sveda (Hrsg). Proceedings of the 11th IEEE International Conference and Workshop on the Engineering of Computer-Based System ECBS 2004: 24-27 May 2004; Brno, Czech Republic. Los Alamitos, CA: IEEE Computer Society 2004 S. 398 - 405


Jürjens, Jan; Shabalin, Pasha

Automated Verification of UMLsec Models for Security Requirements

Thomas Baar; Alfred Strohmeier; Ana Moreira; Stephen J. Mellor (Hrsg). «UML» 2004 - The Unified Modeling Language. Modeling Languages and Applications: 7th International Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings. Berlin: Springer 2004 S. 365 - 379


Jürjens, Jan; Buda, Lidiya

Berechtigungsvergabe in SAP Systemen und ihre automatische Überprüfung

Datenschutz und Datensicherheit. Bd. 28. H. 8. Wiesbaden: Vieweg 2004 S. 476 - 479


Jürjens, Jan

Componentware for Critical Systems

Journal of Object Technology. Bd. 3. H. 4. Zürich: ETH Zürich 2004 S. 47 - 50



Jürjens, Jan

Developing High-Assurance Secure Systems with UML: An Smartcard-based Purchase Protocol

C. V. Ramamoorthy; Wei-Tek Tsai (Hrsg). Proceeding of the Eighth IEEE International Symposium on High Assurance Systems Engineering HASE 2004: 25-26 March 2004; Tampa, Florida. Los Alamitos, CA: IEEE Computer Society 2004 S. 231 - 240