


Остановите войну!
for scientists:
Jan Jürjens
Person information

- affiliation: University of Koblenz-Landau, Germany
- affiliation (former): Dortmund University of Technology, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j37]Zeyd Boukhers
, Timo Hartmann, Jan Jürjens
:
COIN: Counterfactual Image Generation for Visual Question Answering Interpretation. Sensors 22(6): 2245 (2022) - [c145]Hussein Hasso, Katharina Großer
, Iliass Aymaz, Hanna Geppert, Jan Jürjens
:
Abbreviation-Expansion Pair Detection for Glossary Term Extraction. REFSQ 2022: 63-78 - [p7]Santiago Cáceres, Francisco Valverde, Carlos Enrique Palau, Andreu Belsa Pellicer, Christos A. Gizelis, Dimosthenes Krassas, Hanane Becha, Réda Khouani, Andreas Metzger, Nikos Tzagkarakis, Anthousa Karkoglou, Anastasios Nikolakopoulos, Achilleas Marinakis, Vrettos Moulos, Antonios Litke, Amir Shayan Ahmadian, Jan Jürjens:
Towards Cognitive Ports of the Future. Technologies and Applications for Big Data Value 2022: 453-474 - [i11]Zeyd Boukhers, Timo Hartmann, Jan Jürjens:
COIN: Counterfactual Image Generation for VQA Interpretation. CoRR abs/2201.03342 (2022) - [i10]Zeyd Boukhers, Azeddine Bouabdallah, Matthias Lohr, Jan Jürjens:
Ensemble and Multimodal Approach for Forecasting Cryptocurrency Price. CoRR abs/2202.08967 (2022) - [i9]Matthias Lohr, Kenneth Skiba, Marco Konersmann, Jan Jürjens, Steffen Staab:
Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain (Extended Version). CoRR abs/2203.05925 (2022) - 2021
- [j36]Sven Peldszus, Jens Bürger, Timo Kehrer, Jan Jürjens:
Ontology-driven evolution of software security. Data Knowl. Eng. 134: 101907 (2021) - [j35]Muhammad Sheikh Sadi
, Waseem Ahmed, Jan Jürjens:
Towards Tolerating Soft Errors for Embedded Systems. SN Comput. Sci. 2(2): 101 (2021) - [c144]Malla Reddy Sama, Riccardo Guerzoni, Wolfgang Kiess, Srisakul Thakolsri, Jan Jürjens:
Why is Application Reliability an Issue for an Ultra-Reliable 6G Network? EuCNC/6G Summit 2021: 568-573 - [i8]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking Security Compliance between Models and Code. CoRR abs/2108.08579 (2021) - [i7]Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab:
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols. IACR Cryptol. ePrint Arch. 2021: 166 (2021) - 2020
- [j34]Sebastian Pape
, Federica Paci
, Jan Jürjens
, Fabio Massacci
:
Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach. Inf. 11(5): 261 (2020) - [j33]Qusai Ramadan
, Daniel Strüber
, Mattia Salnitri, Jan Jürjens, Volker Riediger, Steffen Staab
:
A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements. Softw. Syst. Model. 19(5): 1191-1227 (2020) - [c143]Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab:
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols. Blockchain 2020: 428-435 - [c142]Jens Bürger
, Timo Kehrer
, Jan Jürjens
:
Ontology Evolution in the Context of Model-Based Secure Software Engineering. RCIS 2020: 437-454 - [c141]Sven Peldszus, Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings. SE 2020: 51-52 - [p6]Amir Shayan Ahmadian, Sven Peldszus, Jan Jürjens, Mattia Salnitri, Paolo Giorgini
, Haralambos Mouratidis, José Fran. Ruiz:
The Architecture of VisiOn Privacy Platform. Visual Privacy Management 2020: 54-76 - [p5]Sven Peldszus, Amir Shayan Ahmadian, Mattia Salnitri, Jan Jürjens, Michalis Pavlidis
, Haralambos Mouratidis:
Visual Privacy Management. Visual Privacy Management 2020: 77-108 - [e9]Mattia Salnitri
, Jan Jürjens
, Haralambos Mouratidis
, Loredana Mancini
, Paolo Giorgini
:
Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform. Lecture Notes in Computer Science 12030, Springer 2020, ISBN 978-3-030-59943-0 [contents]
2010 – 2019
- 2019
- [c140]Matthias Lohr, Jonathan Hund, Jan Jürjens, Steffen Staab:
Ensuring Genuineness for Selectively Disclosed Confidential Data Using Distributed Ledgers: Applications to Rail Wayside Monitoring. Blockchain 2019: 477-482 - [c139]Sven Peldszus
, Katja Tuma
, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings. MoDELS 2019: 23-33 - [c138]Amir Shayan Ahmadian, Daniel Strüber, Jan Jürjens:
Privacy-enhanced system design modeling based on privacy features. SAC 2019: 1492-1499 - [c137]Qusai Ramadan
, Amir Shayan Ahmadian, Jan Jürjens, Steffen Staab, Daniel Strüber:
Explaining Algorithmic Decisions with respect to Fairness. SE/SWM 2019: 161-162 - [c136]Jens Bürger, Daniel Strüber, Stefan Gärtner, Thomas Ruhroth, Jan Jürjens, Kurt Schneider
:
A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary). SE/SWM 2019: 179-180 - [p4]Jan Jürjens, Kurt Schneider, Jens Bürger, Fabien Patrick Viertel, Daniel Strüber, Michael Goedicke, Ralf H. Reussner, Robert Heinrich, Emre Taspolatoglu, Marco Konersmann, Alexander Fay, Winfried Lamersdorf, Jan Ladiges, Christopher Haubeck:
Maintaining Security in Software Evolution. Managed Software Evolution 2019: 207-253 - 2018
- [j32]Harrison Stewart
, Jan Jürjens:
Data security and consumer trust in FinTech innovation in Germany. Inf. Comput. Secur. 26(1): 109-128 (2018) - [j31]Jens Bürger, Daniel Strüber, Stefan Gärtner, Thomas Ruhroth, Jan Jürjens, Kurt Schneider
:
A framework for semi-automated co-evolution of security knowledge and system models. J. Syst. Softw. 139: 142-160 (2018) - [j30]Jan Jürjens, Stefan Ruf, Nils Herda:
Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen ins digitale Zeitalter? Wirtschaftsinformatik Manag. 10(3): 74-79 (2018) - [c135]Qusai Ramadan
, Daniel Strüber, Mattia Salnitri, Volker Riediger, Jan Jürjens:
Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models. ECMFA 2018: 179-198 - [c134]Daniel Strüber
, Sven Peldszus
, Jan Jürjens
:
Taming Multi-Variability of Software Product Line Transformations. FASE 2018: 337-355 - [c133]Sven Peldszus
, Daniel Strüber, Jan Jürjens:
Model-based security analysis of feature-oriented software product lines. GPCE 2018: 93-106 - [c132]Qusai Ramadan
, Amir Shayan Ahmadian, Daniel Strüber, Jan Jürjens, Steffen Staab
:
Model-based discrimination analysis: a position paper. FairWare@ICSE 2018: 22-28 - [c131]Amir Shayan Ahmadian, Jan Jürjens, Daniel Strüber:
Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements. SAC 2018: 1142-1149 - [c130]Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, Jan Jürjens:
Supporting privacy impact assessment by model-based privacy analysis. SAC 2018: 1467-1474 - [c129]Qusai Ramadan, Mattia Salnitri, Daniel Strüber, Jan Jürjens, Paolo Giorgini:
Integrating BPMN- and UML-based Security Engineering via Model Transformation. Software Engineering 2018: 63-64 - [r2]Jan Jürjens, Eduardo B. Fernández:
Secure Database Development. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [j29]Sakib Ahammed, Muhammad Sheikh Sadi, Md Shamimur Rahman, Jan Jürjens:
Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method). Comput. Syst. Sci. Eng. 32(1) (2017) - [j28]Harrison Stewart
, Jan Jürjens:
Information security management and the human aspect in organizations. Inf. Comput. Secur. 25(5): 494-534 (2017) - [c128]Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Julian Flake, Andrea Praitano, José Fran. Ruiz, Jan Jürjens, Michalis Pavlidis
, Dimitri Bonutto, Andrès Castillo Sanz, Haralambos Mouratidis, Javier Garcia-Robles, Alberto Eugenio Tozzi
:
Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain. APF 2017: 192-209 - [c127]Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, Jan Jürjens:
Model-Based Privacy Analysis in Industrial Ecosystems. ECMFA 2017: 215-231 - [c126]Qusai Ramadan
, Mattia Salnitri, Daniel Strüber, Jan Jürjens, Paolo Giorgini
:
From Secure Business Process Modeling to Design-Level Security Verification. MoDELS 2017: 123-133 - [c125]Amir Shayan Ahmadian, Sven Peldszus
, Qusai Ramadan
, Jan Jürjens:
Model-based privacy and security analysis with CARiSMA. ESEC/SIGSOFT FSE 2017: 989-993 - [e8]Jan Jürjens, Kurt Schneider:
Software Engineering 2017, Fachtagung des GI-Fachbereichs Softwaretechnik, 21.-24. Februar 2017, Hannover, Deutschland. LNI P-267, GI 2017, ISBN 978-3-88579-661-9 [contents] - [i6]Stefan Wagner, Jan Jürjens, Claudia Koller, Peter Trischberger:
Comparing Bug Finding Tools with Reviews and Tests. CoRR abs/1711.05019 (2017) - 2016
- [c124]Amir Shayan Ahmadian, Jan Jürjens:
Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements. CloudCom 2016: 360-365 - [c123]Sebastian Pape
, Julian Flake, Andreas Beckmann, Jan Jürjens:
STAGE: a software tool for automatic grading of testing exercises: case study paper. ICSE (Companion Volume) 2016: 491-500 - [c122]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa:
Umlchange - specifying model changes to support security verification of potential evolution. Software Engineering 2016: 91-92 - 2015
- [j27]David G. Rosado
, Nadira Lammari, Jan Jürjens:
Special Issue on Secure Information Systems Engineering. Comput. J. 58(10): 2193-2194 (2015) - [j26]Robert Heinrich, Stefan Gärtner, Tom-Michael Hesse, Thomas Ruhroth, Ralf H. Reussner
, Kurt Schneider
, Barbara Paech, Jan Jürjens:
The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution. Int. J. Softw. Eng. Knowl. Eng. 25(9-10): 1715-1720 (2015) - [j25]Jens Bürger, Jan Jürjens, Sven Wenzel:
Restoring security of evolving software models using graph transformation. Int. J. Softw. Tools Technol. Transf. 17(3): 267-289 (2015) - [c121]Amir Shayan Ahmadian, Fabian Coerschulte, Jan Jürjens:
Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds. BMSD 2015: 80-95 - [c120]Jens Bürger, Stefan Gärtner, Thomas Ruhroth, Johannes Zweihoff, Jan Jürjens, Kurt Schneider
:
Restoring Security of Long-Living Systems by Co-evolution. COMPSAC 2015: 153-158 - [c119]Chris Apfelbeck, Martin Fritz, Jan Jürjens, Johannes Zweihoff:
Preserving Validity of Batch-Job Nets under Change at Run-Time. COMPSAC 2015: 169-178 - [c118]Jan Jürjens, Amir Shayan Ahmadian:
Model-based Security Analysis and Applications to Security Economics. MODELSWARD 2015: 674-677 - [c117]Stefan Gärtner, Thomas Ruhroth, Jens Bürger, Kurt Schneider, Jan Jürjens:
Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge. Software Engineering & Management 2015: 83-84 - [c116]Robert Heinrich, Stefan Gärtner, Tom-Michael Hesse, Thomas Ruhroth, Ralf H. Reussner, Kurt Schneider
, Barbara Paech, Jan Jürjens:
A Platform for Empirical Research on Information System Evolution. SEKE 2015: 415-420 - 2014
- [j24]Carlos Blanco
, David G. Rosado
, Luís Enrique Sanchez, Jan Jürjens:
Security in information systems: Advances and new challenges. Comput. Stand. Interfaces 36(4): 687-688 (2014) - [j23]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa
:
Specifying model changes with UMLchange to support security verification of potential evolution. Comput. Stand. Interfaces 36(4): 776-791 (2014) - [j22]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout
, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [j21]François Dupressoir
, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a general-purpose C verifier to prove cryptographic protocols. J. Comput. Secur. 22(5): 823-866 (2014) - [j20]Thomas Ruhroth, Stefan Gärtner, Jens Bürger, Jan Jürjens, Kurt Schneider:
Versioning and Evolution Requirements for Model-Based System Development. Softwaretechnik-Trends 34(2) (2014) - [c115]Thomas Ruhroth, Stefan Gärtner, Jens Bürger, Jan Jürjens, Kurt Schneider:
Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems. PROFES 2014: 239-253 - [c114]Stefan Gärtner, Thomas Ruhroth, Jens Bürger, Kurt Schneider
, Jan Jürjens:
Maintaining requirements for long-living software systems by incorporating security knowledge. RE 2014: 103-112 - [c113]Stefan Gärtner, Jens Bürger, Kurt Schneider
, Jan Jürjens:
Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen. Software Engineering (Workshops) 2014: 6-7 - [c112]Jan Jürjens, Kurt Schneider
:
The SecReq approach: From Security Requirements to Secure Design while Managing Software Evolution. Software Engineering 2014: 89-90 - [e7]Jan Jürjens, Frank Piessens, Nataliia Bielova:
Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Lecture Notes in Computer Science 8364, Springer 2014, ISBN 978-3-319-04896-3 [contents] - [e6]David G. Rosado, Carlos Blanco, Daniel Mellado, Jan Jürjens, Luís Enrique Sanchez:
WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014. SciTePress 2014, ISBN 978-989-758-031-4 [contents] - [i5]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). CoRR abs/1409.6608 (2014) - 2013
- [j19]Stefan Taubenberger, Jan Jürjens, Yijun Yu
, Bashar Nuseibeh
:
Resolving vulnerability identification errors using security requirements on business process models. Inf. Manag. Comput. Secur. 21(3): 202-223 (2013) - [c111]Thorsten Humberg, Christian Wessel, Daniel Poggenpohl, Sven Wenzel, Thomas Ruhroth, Jan Jürjens:
Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes. CLOSER (Selected Papers) 2013: 36-51 - [c110]Thorsten Humberg, Christian Wessel, Daniel Poggenpohl, Sven Wenzel, Thomas Ruhroth, Jan Jürjens:
Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes. CLOSER 2013: 553-561 - [c109]Jens Bürger, Jan Jürjens, Thomas Ruhroth, Stefan Gärtner, Kurt Schneider:
Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models. FOSAD 2013: 34-53 - [e5]Jan Jürjens, Benjamin Livshits, Riccardo Scandariato:
Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings. Lecture Notes in Computer Science 7781, Springer 2013, ISBN 978-3-642-36562-1 [contents] - [i4]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. CoRR abs/1312.6532 (2013) - 2012
- [j18]David G. Rosado, Luís Enrique Sanchez, Eduardo Fernández-Medina, Jan Jürjens:
Security in Information Systems: New Challenges and Opportunities. J. Univers. Comput. Sci. 18(6): 728-731 (2012) - [j17]Kurt Schneider
, Eric Knauss
, Siv Hilde Houmb, Shareeful Islam, Jan Jürjens:
Enhancing security requirements engineering by organizational learning. Requir. Eng. 17(1): 35-56 (2012) - [c108]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Computational verification of C protocol implementations by symbolic execution. CCS 2012: 712-723 - [c107]Sven Wenzel, Christian Wessel, Thorsten Humberg, Jan Jürjens:
Securing Processes for Outsourcing into the Cloud. CLOSER 2012: 675-680 - [c106]Martín Ochoa
, Jan Jürjens, Daniel Warzecha:
A Sound Decision Procedure for the Compositionality of Secrecy. ESSoS 2012: 97-105 - [c105]Thomas Ruhroth, Jan Jürjens:
Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec. HASE 2012: 177-184 - [c104]Christian Wessel, Thorsten Humberg, Sven Wenzel, Jan Jürjens:
Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen. Software Engineering (Workshops) 2012: 175-181 - [c103]Martín Ochoa
, Jan Jürjens, Jorge Cuéllar:
Non-interference on UML State-Charts. TOOLS (50) 2012: 219-235 - 2011
- [j16]Andreas Bauer, Jan Jürjens, Yijun Yu
:
Run-Time Security Traceability for Evolving Systems. Comput. J. 54(1): 58-87 (2011) - [j15]Shareeful Islam, Haralambos Mouratidis
, Jan Jürjens:
A framework to support alignment of secure software engineering with legal regulations. Softw. Syst. Model. 10(3): 369-394 (2011) - [c102]Elizabeta Fourneret, Martín Ochoa, Fabrice Bouquet
, Julien Botella, Jan Jürjens, Parvaneh Yousefi:
Model-Based Security Verification and Testing for Smart-cards. ARES 2011: 272-279 - [c101]Holger Schmidt, Jan Jürjens:
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec. CAiSE 2011: 367-382 - [c100]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Extracting and verifying cryptographic models from C protocol code by symbolic execution. CCS 2011: 331-340 - [c99]François Dupressoir
, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. CSF 2011: 3-17 - [c98]Jan Jürjens, Loïc Marchal, Martín Ochoa
, Holger Schmidt:
Incremental Security Verification for Evolving UMLsec models. ECMFA 2011: 52-68 - [c97]Denis Hatebur, Maritta Heisel, Jan Jürjens, Holger Schmidt:
Systematic Development of UMLsec Design Models Based on Security Requirements. FASE 2011: 232-246 - [c96]Jan Jürjens:
Automated security hardening for evolving UML models. ICSE 2011: 986-988 - [c95]Seok-Won Lee, Mattia Monga
, Jan Jürjens:
Seventh international workshop on software engineering for secure systems: (SESS 2011). ICSE 2011: 1200-1201 - [c94]Mihhail Aizatulin, François Dupressoir
, Andrew D. Gordon, Jan Jürjens:
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge. Formal Aspects in Security and Trust 2011: 1-20 - [c93]Eric Knauss
, Siv Hilde Houmb, Kurt Schneider, Shareeful Islam, Jan Jürjens:
Supporting Requirements Engineers in Recognising Security Issues. REFSQ 2011: 4-18 - [c92]Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain. SEC 2011: 259-270 - [c91]Fabio Massacci
, Fabrice Bouquet
, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, Jan Tobias Mühlberg
, Federica Paci
, Stéphane Paul
, Frank Piessens, Bjørnar Solhaug, Sven Wenzel:
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143 - [c90]Jan Jürjens, Martín Ochoa
, Holger Schmidt, Loïc Marchal, Siv Hilde Houmb, Shareeful Islam:
Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications. SFM 2011: 504-526 - [e4]Jan Jürjens, Seok-Won Lee, Mattia Monga:
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011. ACM 2011, ISBN 978-1-4503-0581-5 [contents] - [e3]David G. Rosado, Luís Enrique Sanchez, Jan Jürjens:
WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011. SciTePress 2011, ISBN 978-989-8425-61-4 [contents] - [i3]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution. CoRR abs/1107.1017 (2011) - [i2]Muhammad Sheikh Sadi, Md. Mizanur Rahman Khan, Md. Nazim Uddin, Jan Jürjens:
An Efficient Approach towards Mitigating Soft Errors Risks. CoRR abs/1110.3969 (2011) - 2010
- [j14]Andreas Bauer, Jan Jürjens:
Runtime verification of cryptographic protocols. Comput. Secur. 29(3): 315-330 (2010) - [j13]Muhammad Sheikh Sadi, D. G. Myers, Cesar Ortega-Sanchez, Jan Jürjens:
Component criticality analysis to minimize soft errors risk. Comput. Syst. Sci. Eng. 25(5) (2010) - [j12]Haralambos Mouratidis
, Jan Jürjens:
From goal-driven security requirements engineering to secure design. Int. J. Intell. Syst. 25(8): 813-840 (2010) - [j11]Siv Hilde Houmb, Shareeful Islam, Eric Knauss
, Jan Jürjens, Kurt Schneider
:
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec. Requir. Eng. 15(1): 63-93 (2010) - [c89]Alfredo Pironti, Jan Jürjens:
Formally-Based Black-Box Monitoring of Security Protocols. ESSoS 2010: 79-95 - [c88]Seok-Won Lee, Mattia Monga
, Jan Jürjens:
The 6th International Workshop on Software Engineering for Secure Systems (SESS'10). ICSE (2) 2010: 433-434 - [c87]Kristian Beckers, Jan Jürjens:
Security and Compliance in Clouds. ISSE 2010: 91-100 - [c86]Lionel Montrieux, Jan Jürjens, Charles B. Haley, Yijun Yu, Pierre-Yves Schobbens
, Hubert Toussaint:
Tool support for code generation from a UMLsec property. ASE 2010: 357-358 - [c85]Carlos Blanco, Eduardo Fernández-Medina
, Juan Trujillo
, Jan Jürjens:
Towards the Secure Modelling of OLAP Users' Behaviour. Secure Data Management 2010: 101-112 - [c84]Jan Jürjens:
Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote). VL/HCC 2010: 4 - [e2]Seok-Won Lee, Mattia Monga, Jan Jürjens:
ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa. ACM 2010, ISBN 978-1-60558-965-7 [contents]
2000 – 2009
- 2009
- [j10]Jan Jürjens:
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project. Electron. Notes Theor. Comput. Sci. 250(1): 123-136 (2009) - [j9]Eduardo Fernández-Medina
, Jan Jürjens, Juan Trujillo
, Sushil Jajodia:
Model-Driven Development for secure information systems. Inf. Softw. Technol. 51(5): 809-814 (2009) - [j8]Jan Jürjens:
A domain-specific language for cryptographic protocols based on streams. J. Log. Algebraic Methods Program. 78(2): 54-73 (2009) - [j7]C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens:
Performance analysis of security aspects by weaving scenarios extracted from UML models. J. Syst. Softw. 82(1): 56-74 (2009) - [c83]