2010 | ||
---|---|---|
91 | Alfredo Pironti, Jan Jürjens: Formally-Based Black-Box Monitoring of Security Protocols. ESSoS 2010: 79-95 | |
2009 | ||
90 | Jan Jürjens, Tjark Weber: Finite Models in FOL-Based Crypto-Protocol Verification. ARSPA-WITS 2009: 155-172 | |
89 | Haralambos Mouratidis, Ali Sunyaev, Jan Jürjens: Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. CAiSE 2009: 231-245 | |
88 | John Lloyd, Jan Jürjens: Security Analysis of a Biometric Authentication System Using UMLsec and JML. MoDELS 2009: 77-91 | |
87 | Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Jan Jürjens: Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). OOPSLA Companion 2009: 713-714 | |
86 | Daniel Ratiu, Radu Marinescu, Jan Jürjens: The Logical Modularity of Programs. WCRE 2009: 123-127 | |
85 | Jan Jürjens, Eduardo B. Fernández: Secure Database Development. Encyclopedia of Database Systems 2009: 2528-2534 | |
84 | Jan Jürjens: Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project. Electr. Notes Theor. Comput. Sci. 250(1): 123-136 (2009) | |
83 | Eduardo Fernández-Medina, Jan Jürjens, Juan Trujillo, Sushil Jajodia: Model-Driven Development for secure information systems. Information & Software Technology 51(5): 809-814 (2009) | |
82 | Jan Jürjens: A domain-specific language for cryptographic protocols based on streams. J. Log. Algebr. Program. 78(2): 54-73 (2009) | |
81 | C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens: Performance analysis of security aspects by weaving scenarios extracted from UML models. Journal of Systems and Software 82(1): 56-74 (2009) | |
2008 | ||
80 | Yijun Yu, Jan Jürjens, Jörg Schreck: Tools for Traceability in Secure Software Development. ASE 2008: 503-504 | |
79 | Jan Jürjens, Yijun Yu, Andreas Bauer: Tools for Traceable Security Verification. BCS Int. Acad. Conf. 2008: 367-390 | |
78 | Daniel Ratiu, Martin Feilkas, Jan Jürjens: Extracting Domain Ontologies from Domain Specific APIs. CSMR 2008: 203-212 | |
77 | Eduardo B. Fernández, Jan Jürjens, Nobukazu Yoshioka, Hironori Washizaki: Incorporating Database Systems into a Secure Software Development Methodology. DEXA Workshops 2008: 310-314 | |
76 | Jan Jürjens, Jörg Schreck, Yijun Yu: Automated Analysis of Permission-Based Security Using UMLsec. FASE 2008: 292-295 | |
75 | Daniel Ratiu, Jan Jürjens: Evaluating the Reference and Representation of Domain Concepts in APIs. ICPC 2008: 242-247 | |
74 | Jan Jürjens, Jörg Schreck, Peter Bartmann: Model-based security analysis for mobile communications. ICSE 2008: 683-692 | |
73 | Sebastian Höhn, Jan Jürjens: Rubacon: automated support for model-based compliance engineering. ICSE 2008: 875-878 | |
72 | Yijun Yu, Jan Jürjens, John Mylopoulos: Traceability for the maintenance of secure software. ICSM 2008: 297-306 | |
71 | Jan Jürjens, Daniel Reiß, David Trachtenherz: Model-Based Quality Assurance of Automotive Software. MoDELS 2008: 858-873 | |
70 | Jon Whittle, Jan Jürjens, Bashar Nuseibeh, Glen Dobson: First International Modeling Security Workshop. MoDELS Workshops 2008: 181-184 | |
69 | Jan Jürjens: Model-Based Run-Time Checking of Security Permissions Using Guarded Objects. RV 2008: 36-50 | |
68 | Andreas Bauer, Jan Jürjens: Security protocols, properties, and their monitoring. SESS 2008: 33-40 | |
67 | Jan Jürjens: Model-based Security Testing Using UMLsec: A Case Study. Electr. Notes Theor. Comput. Sci. 220(1): 93-104 (2008) | |
2007 | ||
66 | Jan Jürjens, Yijun Yu: Tools for model-based security engineering: models vs. code. ASE 2007: 545-546 | |
65 | Daniel Ratiu, Jan Jürjens: The Reality of Libraries. CSMR 2007: 307-318 | |
64 | Bastian Best, Jan Jürjens, Bashar Nuseibeh: Model-Based Security Engineering of Distributed Information Systems Using UMLsec. ICSE 2007: 581-590 | |
63 | Jan Jürjens: Developing Secure Embedded Systems: Pitfalls and How to Avoid Them. ICSE Companion 2007: 182-183 | |
62 | Dorina C. Petriu, C. Murray Woodside, Dorin Bogdan Petriu, Jing Xu, Toqeer Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens: Performance analysis of security aspects in UML models. WOSP 2007: 91-102 | |
61 | Jan Jürjens, Pasha Shabalin: Tools for secure systems development with UML. STTT 9(5-6): 527-544 (2007) | |
2006 | ||
60 | Jan Jürjens: Security Analysis of Crypto-based Java Programs using Automated Theorem Provers. ASE 2006: 167-176 | |
59 | Haralambos Mouratidis, Jan Jürjens, Jorge Fox: Towards a Comprehensive Framework for Secure Systems Development. CAiSE 2006: 48-62 | |
58 | Jan Jürjens: Model-Based Security Engineering for Real. FM 2006: 600-606 | |
57 | Jan Jürjens, Jorge Fox: Tools for model-based security engineering. ICSE 2006: 819-822 | |
56 | Jorge Fox, Jan Jürjens: A Framework for Analyzing Composition of Security Aspects. MMOSS 2006 | |
55 | Geri Georg, Siv Hilde Houmb, Robert B. France, Steffen Zschaler, Dorina C. Petriu, Jan Jürjens: Critical Systems Development Using Modeling Languages - CSDUML 2006 Workshop Report. MoDELS Workshops 2006: 27-31 | |
54 | Jan Jürjens: Model-Based Security Engineering. SECRYPT 2006 | |
53 | Jan Jürjens: Foundations for Designing Secure Architectures. Electr. Notes Theor. Comput. Sci. 142: 31-46 (2006) | |
2005 | ||
52 | Jan Jürjens: Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. ACSAC 2005: 138-149 | |
51 | Jan Jürjens, Mark Yampolskiy: Code security analysis with assertions. ASE 2005: 392-395 | |
50 | Jewgenij Botaschanjan, Jan Jürjens: MoDeII: Modeling and Analyzing Time-Constraints. ECBS 2005: 299-306 | |
49 | Jorge Fox, Jan Jürjens: Introducing Security Aspects with Model Transformations. ECBS 2005: 543-549 | |
48 | Stefan Wagner, Jan Jürjens: Model-Based Identification of Fault-Prone Components. EDCC 2005: 435-452 | |
47 | Jan Jürjens, Pasha Shabalin: Tools for Secure Systems Development with UML: Security Analysis with ATPs. FASE 2005: 305-309 | |
46 | Jan Jürjens: Model-Based Security Engineering with UML: Introducing Security Aspects. FMCO 2005: 64-87 | |
45 | Jan Jürjens: Towards using game semantics for crypto protocol verification: Lorenzen games. GALOP 2005: 241-257 | |
44 | Siv Hilde Houmb, Geri Georg, Robert B. France, James M. Bieman, Jan Jürjens: Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development. ICECCS 2005: 195-204 | |
43 | Jan Jürjens, Markus Lehrhuber, Guido Wimmel: Model-Based Design and Analysis of Permission-Based Security. ICECCS 2005: 224-233 | |
42 | Jan Jürjens: Sound methods and effective tools for model-based security engineering with UML. ICSE 2005: 322-331 | |
41 | Jan Jürjens: Understanding Security Goals Provided by Crypto-Protocol Implementations. ICSM 2005: 643-646 | |
40 | Jan Jürjens: Verification of low-level crypto-protocol implementations using automated theorem proving. MEMOCODE 2005: 89-98 | |
39 | Jan Jürjens, Siv Hilde Houmb: Dynamic Secure Aspect Modeling with UML: From Models to Code. MoDELS 2005: 142-155 | |
38 | Stefan Wagner, Jan Jürjens, Claudia Koller, Peter Trischberger: Comparing Bug Finding Tools with Reviews and Tests. TestCom 2005: 40-55 | |
2004 | ||
37 | Jan Jürjens, Pasha Shabalin: A Foundation for Tool-Supported Critical Systems Development with UML. ECBS 2004: 398-405 | |
36 | Jan Jürjens: Model-Based Security Engineering with UML. FOSAD 2004: 42-77 | |
35 | Jan Jürjens: Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol. HASE 2004: 231-240 | |
34 | Martin Deubler, Johannes Grünbauer, Jan Jürjens, Guido Wimmel: Sound development of secure service-based systems. ICSOC 2004: 115-124 | |
33 | Jan Jürjens, Siv Hilde Houmb: Risk-Driven Development Of Security-Critical Systems Using UMLsec. IFIP Congress Tutorials 2004: 21-54 | |
32 | Johannes Grünbauer, Jan Jürjens, Guido Wimmel: Modelling Secure IT Systems - A Survey. Modellierung 2004: 307-308 | |
31 | Robert Schmidt, Jan Jürjens: Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem. Modellierung 2004: 309-310 | |
30 | Jan Jürjens, Pasha Shabalin: Automated Verification of UMLsec Models for Security Requirements. UML 2004: 365-379 | |
29 | Jan Jürjens, Pasha Shabalin: Tools for Critical Systems Development with UML (Tool Demo). UML Satellite Activities 2004: 250-253 | |
28 | Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer: Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). UML Satellite Activities 2004: 76-84 | |
27 | Jan Jürjens: Componentware for Critical Systems. Journal of Object Technology 3(4): 47-50 (2004) | |
2003 | ||
26 | Jan Romberg, Jan Jürjens, Guido Wimmel, Oscar Slotosch, Gabor Hahn: AutoFOCUS and the MoDe Tool. ACSD 2003: 249-250 | |
25 | Gerhard Popp, Jan Jürjens, Guido Wimmel, Ruth Breu: Security-Critical System Development with Extended Use Cases. APSEC 2003: 478-487 | |
24 | Siv Hilde Houmb, Jan Jürjens: Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec. APSEC 2003: 488- | |
23 | Jan Jürjens: Algebraic State Machines: Concepts and Applications to Security. Ershov Memorial Conference 2003: 338-343 | |
22 | Jan Jürjens, Siv Hilde Houmb: Development of Safety-Critical Systems and Model-Based Risk Analysis with UML. LADC 2003: 364-365 | |
21 | Johannes Grünbauer, H. Hollmann, Jan Jürjens, Guido Wimmel: Modelling and Verification of Layered Security Protocols: A Bank Application. SAFECOMP 2003: 116-129 | |
20 | Jan Jürjens, Johannes Grünbauer: Critical Systems Development with UML: Overview with Automatic Case Study. SNPD 2003: 512-517 | |
19 | Jan Jürjens: Developing Safety-Critical Systems with UML. UML 2003: 360-372 | |
2002 | ||
18 | Jan Jürjens: Formal Semantics for Interacting UML subsystems. FMOODS 2002: 29-43 | |
17 | Guido Wimmel, Jan Jürjens: Specification-Based Test Generation for Security-Critical Systems Using Mutations. ICFEM 2002: 471-482 | |
16 | Jan Jürjens: A UML statecharts semantics with message-passing. SAC 2002: 1009-1013 | |
15 | Jan Jürjens: Using UMLsec and goal trees for secure systems development. SAC 2002: 1026-1030 | |
14 | Jan Jürjens: UMLsec: Extending UML for Secure Systems Development. UML 2002: 412-425 | |
2001 | ||
13 | Jan Jürjens: Abstracting from Failure Probabilities. ACSD 2001: 53- | |
12 | Jan Jürjens, Guido Wimmel: Formally Testing Fail-Safety of Electronic Purse Protocols. ASE 2001: 408-411 | |
11 | Jan Jürjens, Guido Wimmel: Specification-Based Testing of Firewalls. Ershov Memorial Conference 2001: 308-316 | |
10 | Jan Jürjens: Towards Development of Secure Systems Using UMLsec. FASE 2001: 187-200 | |
9 | Jan Jürjens: Secrecy-Preserving Refinement. FME 2001: 135-152 | |
8 | Jan Jürjens, Guido Wimmel: Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. I3E 2001: 489-506 | |
7 | Jan Jürjens: Composability of Secrecy. MMM-ACNS 2001: 28-38 | |
6 | Jan Jürjens: Secure Java Development with UML. Network Security 2001: 107-124 | |
5 | Jan Jürjens: Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC. SEC 2001: 93-108 | |
4 | Jan Jürjens: Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion). Security Protocols Workshop 2001: 102-106 | |
3 | Jan Jürjens: Encapsulating Rules of Prudent Security Engineering. Security Protocols Workshop 2001: 95-101 | |
2 | Martín Abadi, Jan Jürjens: Formal Eavesdropping and Its Computational Interpretation. TACS 2001: 82-94 | |
2000 | ||
1 | Jan Jürjens: Secure Information Flow for Concurrent Processes. CONCUR 2000: 395-409 |