Jan Jürjens

Orcid: 0000-0002-8938-0470

Affiliations:
  • University of Koblenz-Landau, Germany
  • Dortmund University of Technology, Germany (former)


According to our database1, Jan Jürjens authored at least 216 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering.
IEEE Trans. Software Eng., January, 2024

Data Trading and Monetization: Challenges and Open Research Directions.
CoRR, 2024

Reconstruction as a service: a data space for off-site image reconstruction in magnetic particle imaging.
CoRR, 2024

A Comparative Evaluation of Requirement Template Systems (Summary).
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024

2023
Knowledge guided multi-filter residual convolutional neural network for ICD coding from clinical text.
Neural Comput. Appl., August, 2023

Enhanced abbreviation-expansion pair detection for glossary term extraction.
Inf. Softw. Technol., July, 2023

Checking security compliance between models and code.
Softw. Syst. Model., February, 2023


Requirements document relations: A reuse perspective on traceability through standards.
Proceedings of the Software Engineering 2023, 2023

ILLOD Replication Package: An Open-Source Framework for Abbreviation-Expansion Pair Detection and Term Consolidation in Requirements.
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023

A Comparative Evaluation of Requirement Template Systems.
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023

Beyond Trading Data: The Hidden Influence of Public Awareness and Interest on Cryptocurrency Volatility.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Requirements document relations.
Softw. Syst. Model., 2022

COIN: Counterfactual Image Generation for Visual Question Answering Interpretation.
Sensors, 2022

Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain (Extended Version).
CoRR, 2022

Ensemble and Multimodal Approach for Forecasting Cryptocurrency Price.
CoRR, 2022

COIN: Counterfactual Image Generation for VQA Interpretation.
CoRR, 2022

Life cycle and metrics to measure the resilience of business processes by considering resources.
Bus. Process. Manag. J., 2022

Abbreviation-Expansion Pair Detection for Glossary Term Extraction.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2022

Redefining the Trust Model for the Internet of Everything in the 6G era.
Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, 2022

Ontology-based Synchronization of Automated Production Systems and Their Simulation Models.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2022

Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects".
Proceedings of the IEEE 19th International Conference on Software Architecture Companion, 2022

Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Tokenomics: Decentralized Incentivization in the Context of Data Spaces.
Proceedings of the Designing Data Spaces: The Ecosystem Approach to Competitive Advantage, 2022


2021
Towards Tolerating Soft Errors for Embedded Systems.
SN Comput. Sci., 2021

Cost Fairness for Blockchain-Based Two-Party Exchange Protocols.
IACR Cryptol. ePrint Arch., 2021

Ontology-driven evolution of software security.
Data Knowl. Eng., 2021

Why is Application Reliability an Issue for an Ultra-Reliable 6G Network?
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021

2020
Visual Privacy Management.
Proceedings of the Visual Privacy Management, 2020

The Architecture of VisiOn Privacy Platform.
Proceedings of the Visual Privacy Management, 2020

A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements.
Softw. Syst. Model., 2020

Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach.
Inf., 2020

Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings.
Proceedings of the Software Engineering 2020, 2020

Ontology Evolution in the Context of Model-Based Secure Software Engineering.
Proceedings of the Research Challenges in Information Science, 2020

2019
Explaining Algorithmic Decisions with respect to Fairness.
Proceedings of the Software Engineering and Software Management, 2019

A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary).
Proceedings of the Software Engineering and Software Management, 2019

Privacy-enhanced system design modeling based on privacy features.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Ensuring Genuineness for Selectively Disclosed Confidential Data Using Distributed Ledgers: Applications to Rail Wayside Monitoring.
Proceedings of the IEEE International Conference on Blockchain, 2019


2018
Secure Database Development.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen ins digitale Zeitalter?
Wirtschaftsinformatik Manag., 2018

A framework for semi-automated co-evolution of security knowledge and system models.
J. Syst. Softw., 2018

Data security and consumer trust in FinTech innovation in Germany.
Inf. Comput. Secur., 2018

Integrating BPMN- and UML-based Security Engineering via Model Transformation.
Proceedings of the Software Engineering und Software Management 2018, 2018

Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Supporting privacy impact assessment by model-based privacy analysis.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Model-based discrimination analysis: a position paper.
Proceedings of the International Workshop on Software Fairness, 2018

Model-based security analysis of feature-oriented software product lines.
Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 2018

Taming Multi-Variability of Software Product Line Transformations.
Proceedings of the Fundamental Approaches to Software Engineering, 2018

Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models.
Proceedings of the Modelling Foundations and Applications - 14th European Conference, 2018

2017
Information security management and the human aspect in organizations.
Inf. Comput. Secur., 2017

Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method).
Comput. Syst. Sci. Eng., 2017

Model-based privacy and security analysis with CARiSMA.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

From Secure Business Process Modeling to Design-Level Security Verification.
Proceedings of the 20th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2017

Model-Based Privacy Analysis in Industrial Ecosystems.
Proceedings of the Modelling Foundations and Applications - 13th European Conference, 2017

Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
Umlchange - specifying model changes to support security verification of potential evolution.
Proceedings of the Software Engineering 2016, 2016

STAGE: a software tool for automatic grading of testing exercises: case study paper.
Proceedings of the 38th International Conference on Software Engineering, 2016

Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
Restoring security of evolving software models using graph transformation.
Int. J. Softw. Tools Technol. Transf., 2015

The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution.
Int. J. Softw. Eng. Knowl. Eng., 2015

Special Issue on Secure Information Systems Engineering.
Comput. J., 2015

A Platform for Empirical Research on Information System Evolution.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge.
Proceedings of the Software Engineering & Management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März, 2015

Model-based Security Analysis and Applications to Security Economics.
Proceedings of the MODELSWARD 2015, 2015

Restoring Security of Long-Living Systems by Co-evolution.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Preserving Validity of Batch-Job Nets under Change at Run-Time.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds.
Proceedings of the Business Modeling and Software Design - 5th International Symposium, 2015

2014
Versioning and Evolution Requirements for Model-Based System Development.
Softwaretechnik-Trends, 2014

Guiding a general-purpose C verifier to prove cryptographic protocols.
J. Comput. Secur., 2014

Evolution of Security Engineering Artifacts: A State of the Art Survey.
Int. J. Secur. Softw. Eng., 2014

Specifying model changes with UMLchange to support security verification of potential evolution.
Comput. Stand. Interfaces, 2014

Security in information systems: Advances and new challenges.
Comput. Stand. Interfaces, 2014

The SecReq approach: From Security Requirements to Secure Design while Managing Software Evolution.
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014

Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen.
Proceedings of the Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2014, 2014

Maintaining requirements for long-living software systems by incorporating security knowledge.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems.
Proceedings of the Product-Focused Software Process Improvement, 2014

2013
Resolving vulnerability identification errors using security requirements on business process models.
Inf. Manag. Comput. Secur., 2013

Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes.
Proceedings of the Cloud Computing and Services Science - Third International Conference, 2013

Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes.
Proceedings of the CLOSER 2013, 2013

2012
Enhancing security requirements engineering by organizational learning.
Requir. Eng., 2012

Security in Information Systems: New Challenges and Opportunities.
J. Univers. Comput. Sci., 2012

Non-interference on UML State-Charts.
Proceedings of the Objects, Models, Components, Patterns - 50th International Conference, 2012

Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen.
Proceedings of the Software Engineering 2012 - Workshopband, Fachtagung des GI-Fachbereichs Softwaretechnik, 27. Februar, 2012

Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

A Sound Decision Procedure for the Compositionality of Secrecy.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Securing Processes for Outsourcing into the Cloud.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Computational verification of C protocol implementations by symbolic execution.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
A framework to support alignment of secure software engineering with legal regulations.
Softw. Syst. Model., 2011

An Efficient Approach towards Mitigating Soft Errors Risks
CoRR, 2011

Run-Time Security Traceability for Evolving Systems.
Comput. J., 2011

Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Supporting Requirements Engineers in Recognising Security Issues.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2011

Verifying Cryptographic Code in C: Some Experience and the Csec Challenge.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

Seventh international workshop on software engineering for secure systems: (SESS 2011).
Proceedings of the 33rd International Conference on Software Engineering, 2011

Automated security hardening for evolving UML models.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Systematic Development of UMLsec Design Models Based on Security Requirements.
Proceedings of the Fundamental Approaches to Software Engineering, 2011

Incremental Security Verification for Evolving UMLsec models.
Proceedings of the Modelling Foundations and Applications - 7th European Conference, 2011

Extracting and verifying cryptographic models from C protocol code by symbolic execution.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec.
Proceedings of the Advanced Information Systems Engineering, 2011

Model-Based Security Verification and Testing for Smart-cards.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec.
Requir. Eng., 2010

From goal-driven security requirements engineering to secure design.
Int. J. Intell. Syst., 2010

Component criticality analysis to minimize soft errors risk.
Comput. Syst. Sci. Eng., 2010

Runtime verification of cryptographic protocols.
Comput. Secur., 2010

Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote).
Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing, 2010

Towards the Secure Modelling of OLAP Users' Behaviour.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

Tool support for code generation from a UMLsec property.
Proceedings of the ASE 2010, 2010

Security and Compliance in Clouds.
Proceedings of the ISSE 2010, 2010

The 6<sup>th</sup> International Workshop on Software Engineering for Secure Systems (SESS'10).
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

Formally-Based Black-Box Monitoring of Security Protocols.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

2009
Security and Dependability Engineering.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Secure Database Development.
Proceedings of the Encyclopedia of Database Systems, 2009

Performance analysis of security aspects by weaving scenarios extracted from UML models.
J. Syst. Softw., 2009

A domain-specific language for cryptographic protocols based on streams.
J. Log. Algebraic Methods Program., 2009

Model-Driven Development for secure information systems.
Inf. Softw. Technol., 2009

The Logical Modularity of Programs.
Proceedings of the 16th Working Conference on Reverse Engineering, 2009

Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09).
Proceedings of the Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2009

Security Analysis of a Biometric Authentication System Using UMLsec and JML.
Proceedings of the Model Driven Engineering Languages and Systems, 2009

Finite Models in FOL-Based Crypto-Protocol Verification.
Proceedings of the Foundations and Applications of Security Analysis, 2009

Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects.
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009

2008
Model-based Security Testing Using UMLsec: A Case Study.
Proceedings of the Fourth Workshop on Model Based Testing, 2008

Model-Based Run-Time Checking of Security Permissions Using Guarded Objects.
Proceedings of the Runtime Verification, 8th International Workshop, 2008

First International Modeling Security Workshop.
Proceedings of the Models in Software Engineering, Workshops and Symposia at MODELS 2008, Toulouse, France, September 28, 2008

IT Security Risk Analysis based on Business Process Models enhanced with Security Requirements.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Model-Based Quality Assurance of Automotive Software.
Proceedings of the Model Driven Engineering Languages and Systems, 2008

Incorporating Security Requirements from Legal Regulations into UMLsec model.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Tools for Traceability in Secure Software Development.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

Evaluating the Reference and Representation of Domain Concepts in APIs.
Proceedings of the 16th IEEE International Conference on Program Comprehension, 2008

Traceability for the maintenance of secure software.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008

Model-based security analysis for mobile communications.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Rubacon: automated support for model-based compliance engineering.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Security protocols, properties, and their monitoring.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

Automated Analysis of Permission-Based Security Using UMLsec.
Proceedings of the Fundamental Approaches to Software Engineering, 2008

Incorporating Database Systems into a Secure Software Development Methodology.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

Extracting Domain Ontologies from Domain Specific APIs.
Proceedings of the 12th European Conference on Software Maintenance and Reengineering, 2008

Tools for Traceable Security Verification.
Proceedings of the Visions of Computer Science, 2008

2007
Tools for secure systems development with UML.
Int. J. Softw. Tools Technol. Transf., 2007

Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project.
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, 2007

Performance analysis of security aspects in UML models.
Proceedings of the 6th International Workshop on Software and Performance, 2007

Tools for model-based security engineering: models vs. code.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

Developing Secure Embedded Systems: Pitfalls and How to Avoid Them.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Model-Based Security Engineering of Distributed Information Systems Using UMLsec.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

The Reality of Libraries.
Proceedings of the 11th European Conference on Software Maintenance and Reengineering, 2007

2006
Model-Based Security Engineering.
Proceedings of the SECRYPT 2006, 2006

Critical Systems Development Using Modeling Languages - CSDUML 2006 Workshop Report.
Proceedings of the Models in Software Engineering, 2006

Security Analysis of Crypto-based Java Programs using Automated Theorem Provers.
Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), 2006

Tools for model-based security engineering.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Model-Based Security Engineering for Real.
Proceedings of the FM 2006: Formal Methods, 2006

A Framework for Analyzing Composition of Security Aspects.
Proceedings of the Methods for Modelling Software Systems (MMOSS), 27.08. - 01.09.2006, 2006

Towards a Comprehensive Framework for Secure Systems Development.
Proceedings of the Advanced Information Systems Engineering, 18th International Conference, 2006

2005
Component-Based Development of Dependable Systems with UML.
Proceedings of the Component-Based Software Development for Embedded Systems, 2005

Dynamic Secure Aspect Modeling with UML: From Models to Code.
Proceedings of the Model Driven Engineering Languages and Systems, 2005

Comparing Bug Finding Tools with Reviews and Tests.
Proceedings of the Testing of Communicating Systems, 2005

Verification of low-level crypto-protocol implementations using automated theorem proving.
Proceedings of the 3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005), 2005

Code security analysis with assertions.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

Understanding Security Goals Provided by Crypto-Protocol Implementations.
Proceedings of the 21st IEEE International Conference on Software Maintenance (ICSM 2005), 2005

Sound methods and effective tools for model-based security engineering with UML.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

Model-Based Design and Analysis of Permission-Based Security.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Towards using game semantics for crypto protocol verification: Lorenzen games.
Proceedings of the 1st Workshop on Games for Logic and Programming Languages, 2005

Model-Based Security Engineering with UML: Introducing Security Aspects.
Proceedings of the Formal Methods for Components and Objects, 4th International Symposium, 2005

Tools for Secure Systems Development with UML: Security Analysis with ATPs.
Proceedings of the Fundamental Approaches to Software Engineering, 2005

Model-Based Identification of Fault-Prone Components.
Proceedings of the Dependable Computing, 2005

Introducing Security Aspects with Model Transformations.
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005

MoDeII: Modeling and Analyzing Time-Constraints.
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005

Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

Tool Support for Model-Driven Development of Security-Critical Systems with UML.
Proceedings of the Model-Driven Software Development, 2005

Secure systems development with UML.
Springer, ISBN: 978-3-540-00701-2, 2005

2004
Componentware for Critical Systems.
J. Object Technol., 2004

Foundations for Designing Secure Architectures.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

Tools for Critical Systems Development with UML (Tool Demo).
Proceedings of the UML Modeling Languages and Applications, 2004

Automated Verification of UMLsec Models for Security Requirements.
Proceedings of the «UML» 2004, 2004

Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop).
Proceedings of the UML Modeling Languages and Applications, 2004

Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem.
Proceedings of the Modellierung 2004, Proceedings zur Tagung, 23.-26. März 2004, 2004

Modelling Secure IT Systems - A Survey.
Proceedings of the Modellierung 2004, Proceedings zur Tagung, 23.-26. März 2004, 2004

Risk-Driven Development Of Security-Critical Systems Using UMLsec.
Proceedings of the Information Technology, Selected Tutorials, 2004

Sound development of secure service-based systems.
Proceedings of the Service-Oriented Computing, 2004

Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol.
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004

Model-Based Security Engineering with UML.
Proceedings of the Foundations of Security Analysis and Design III, 2004

A Foundation for Tool-Supported Critical Systems Development with UML.
Proceedings of the 11th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2004), 2004

2003
Bericht über die erste Jahrestagung der GI-Fachgruppe FoMSESS vom 12. bis 13. Mai 2003 in Karlsruhe.
Softwaretechnik-Trends, 2003

Developing Safety-Critical Systems with UML.
Proceedings of the «UML» 2003, 2003

Automated Checking of SAP Security Permisisons.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

Critical Systems Development with UML: Overview with Automatic Case Study.
Proceedings of the ACIS Fourth International Conference on Software Engineering, 2003

Modelling and Verification of Layered Security Protocols: A Bank Application.
Proceedings of the Computer Safety, 2003

Development of Safety-Critical Systems and Model-Based Risk Analysis with UML.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

Algebraic State Machines: Concepts and Applications to Security.
Proceedings of the Perspectives of Systems Informatics, 2003

Security-Critical System Development with Extended Use Cases.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

AutoFOCUS and the MoDe Tool.
Proceedings of the 3rd International Conference on Application of Concurrency to System Design (ACSD 2003), 2003

2002
Principles for secure system design.
PhD thesis, 2002

Games In The Semantics Of Programming Languages - An Elementary Introduction.
Synth., 2002

UMLsec: Extending UML for Secure Systems Development.
Proceedings of the UML 2002 - The Unified Modeling Language, 5th International Conference, Dresden, Germany, September 30, 2002

Using UMLsec and goal trees for secure systems development.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

A UML statecharts semantics with message-passing.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Specification-Based Test Generation for Security-Critical Systems Using Mutations.
Proceedings of the Formal Methods and Software Engineering, 2002

Formal Semantics for Interacting UML subsystems.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems V, 2002

2001
Developing Secure Systems with UMLsec - From Business Processes to Implementation.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

Formal Eavesdropping and Its Computational Interpretation.
Proceedings of the Theoretical Aspects of Computer Software, 4th International Symposium, 2001

Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion).
Proceedings of the Security Protocols, 2001

Encapsulating Rules of Prudent Security Engineering.
Proceedings of the Security Protocols, 2001

Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Secure Java Development with UML.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

Composability of Secrecy.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

Formally Testing Fail-Safety of Electronic Purse Protocols.
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001

Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications.
Proceedings of the Towards The E-Society: E-Commerce, 2001

Secrecy-Preserving Refinement.
Proceedings of the FME 2001: Formal Methods for Increasing Software Productivity, 2001

Towards Development of Secure Systems Using UMLsec.
Proceedings of the Fundamental Approaches to Software Engineering, 2001

Specification-Based Testing of Firewalls.
Proceedings of the Perspectives of System Informatics, 2001

Abstracting from Failure Probabilities.
Proceedings of the 2nd International Conference on Application of Concurrency to System Design (ACSD 2001), 2001

2000
Secure Information Flow for Concurrent Processes.
Proceedings of the CONCUR 2000, 2000


  Loading...