![]() | 2010 | |
---|---|---|
91 | ![]() ![]() ![]() ![]() ![]() ![]() | Alfredo Pironti, Jan Jürjens: Formally-Based Black-Box Monitoring of Security Protocols. ESSoS 2010: 79-95 |
2009 | ||
90 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Tjark Weber: Finite Models in FOL-Based Crypto-Protocol Verification. ARSPA-WITS 2009: 155-172 |
89 | ![]() ![]() ![]() ![]() ![]() ![]() | Haralambos Mouratidis, Ali Sunyaev, Jan Jürjens: Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. CAiSE 2009: 231-245 |
88 | ![]() ![]() ![]() ![]() ![]() ![]() | John Lloyd, Jan Jürjens: Security Analysis of a Biometric Authentication System Using UMLsec and JML. MoDELS 2009: 77-91 |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Jan Jürjens: Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). OOPSLA Companion 2009: 713-714 |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel Ratiu, Radu Marinescu, Jan Jürjens: The Logical Modularity of Programs. WCRE 2009: 123-127 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Eduardo B. Fernández: Secure Database Development. Encyclopedia of Database Systems 2009: 2528-2534 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project. Electr. Notes Theor. Comput. Sci. 250(1): 123-136 (2009) |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Eduardo Fernández-Medina, Jan Jürjens, Juan Trujillo, Sushil Jajodia: Model-Driven Development for secure information systems. Information & Software Technology 51(5): 809-814 (2009) |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: A domain-specific language for cryptographic protocols based on streams. J. Log. Algebr. Program. 78(2): 54-73 (2009) |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens: Performance analysis of security aspects by weaving scenarios extracted from UML models. Journal of Systems and Software 82(1): 56-74 (2009) |
2008 | ||
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Yijun Yu, Jan Jürjens, Jörg Schreck: Tools for Traceability in Secure Software Development. ASE 2008: 503-504 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Yijun Yu, Andreas Bauer: Tools for Traceable Security Verification. BCS Int. Acad. Conf. 2008: 367-390 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel Ratiu, Martin Feilkas, Jan Jürjens: Extracting Domain Ontologies from Domain Specific APIs. CSMR 2008: 203-212 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Eduardo B. Fernández, Jan Jürjens, Nobukazu Yoshioka, Hironori Washizaki: Incorporating Database Systems into a Secure Software Development Methodology. DEXA Workshops 2008: 310-314 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Jörg Schreck, Yijun Yu: Automated Analysis of Permission-Based Security Using UMLsec. FASE 2008: 292-295 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel Ratiu, Jan Jürjens: Evaluating the Reference and Representation of Domain Concepts in APIs. ICPC 2008: 242-247 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Jörg Schreck, Peter Bartmann: Model-based security analysis for mobile communications. ICSE 2008: 683-692 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Sebastian Höhn, Jan Jürjens: Rubacon: automated support for model-based compliance engineering. ICSE 2008: 875-878 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Yijun Yu, Jan Jürjens, John Mylopoulos: Traceability for the maintenance of secure software. ICSM 2008: 297-306 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Daniel Reiß, David Trachtenherz: Model-Based Quality Assurance of Automotive Software. MoDELS 2008: 858-873 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Jon Whittle, Jan Jürjens, Bashar Nuseibeh, Glen Dobson: First International Modeling Security Workshop. MoDELS Workshops 2008: 181-184 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Model-Based Run-Time Checking of Security Permissions Using Guarded Objects. RV 2008: 36-50 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Andreas Bauer, Jan Jürjens: Security protocols, properties, and their monitoring. SESS 2008: 33-40 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Model-based Security Testing Using UMLsec: A Case Study. Electr. Notes Theor. Comput. Sci. 220(1): 93-104 (2008) |
2007 | ||
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Yijun Yu: Tools for model-based security engineering: models vs. code. ASE 2007: 545-546 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel Ratiu, Jan Jürjens: The Reality of Libraries. CSMR 2007: 307-318 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Bastian Best, Jan Jürjens, Bashar Nuseibeh: Model-Based Security Engineering of Distributed Information Systems Using UMLsec. ICSE 2007: 581-590 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Developing Secure Embedded Systems: Pitfalls and How to Avoid Them. ICSE Companion 2007: 182-183 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Dorina C. Petriu, C. Murray Woodside, Dorin Bogdan Petriu, Jing Xu, Toqeer Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens: Performance analysis of security aspects in UML models. WOSP 2007: 91-102 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Pasha Shabalin: Tools for secure systems development with UML. STTT 9(5-6): 527-544 (2007) |
2006 | ||
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Security Analysis of Crypto-based Java Programs using Automated Theorem Provers. ASE 2006: 167-176 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Haralambos Mouratidis, Jan Jürjens, Jorge Fox: Towards a Comprehensive Framework for Secure Systems Development. CAiSE 2006: 48-62 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Model-Based Security Engineering for Real. FM 2006: 600-606 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Jorge Fox: Tools for model-based security engineering. ICSE 2006: 819-822 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Jorge Fox, Jan Jürjens: A Framework for Analyzing Composition of Security Aspects. MMOSS 2006 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Geri Georg, Siv Hilde Houmb, Robert B. France, Steffen Zschaler, Dorina C. Petriu, Jan Jürjens: Critical Systems Development Using Modeling Languages - CSDUML 2006 Workshop Report. MoDELS Workshops 2006: 27-31 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Model-Based Security Engineering. SECRYPT 2006 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Foundations for Designing Secure Architectures. Electr. Notes Theor. Comput. Sci. 142: 31-46 (2006) |
2005 | ||
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. ACSAC 2005: 138-149 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Mark Yampolskiy: Code security analysis with assertions. ASE 2005: 392-395 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Jewgenij Botaschanjan, Jan Jürjens: MoDeII: Modeling and Analyzing Time-Constraints. ECBS 2005: 299-306 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Jorge Fox, Jan Jürjens: Introducing Security Aspects with Model Transformations. ECBS 2005: 543-549 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Wagner, Jan Jürjens: Model-Based Identification of Fault-Prone Components. EDCC 2005: 435-452 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Pasha Shabalin: Tools for Secure Systems Development with UML: Security Analysis with ATPs. FASE 2005: 305-309 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Model-Based Security Engineering with UML: Introducing Security Aspects. FMCO 2005: 64-87 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Towards using game semantics for crypto protocol verification: Lorenzen games. GALOP 2005: 241-257 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Siv Hilde Houmb, Geri Georg, Robert B. France, James M. Bieman, Jan Jürjens: Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development. ICECCS 2005: 195-204 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Markus Lehrhuber, Guido Wimmel: Model-Based Design and Analysis of Permission-Based Security. ICECCS 2005: 224-233 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Sound methods and effective tools for model-based security engineering with UML. ICSE 2005: 322-331 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Understanding Security Goals Provided by Crypto-Protocol Implementations. ICSM 2005: 643-646 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Verification of low-level crypto-protocol implementations using automated theorem proving. MEMOCODE 2005: 89-98 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Siv Hilde Houmb: Dynamic Secure Aspect Modeling with UML: From Models to Code. MoDELS 2005: 142-155 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Wagner, Jan Jürjens, Claudia Koller, Peter Trischberger: Comparing Bug Finding Tools with Reviews and Tests. TestCom 2005: 40-55 |
2004 | ||
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Pasha Shabalin: A Foundation for Tool-Supported Critical Systems Development with UML. ECBS 2004: 398-405 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Model-Based Security Engineering with UML. FOSAD 2004: 42-77 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol. HASE 2004: 231-240 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Martin Deubler, Johannes Grünbauer, Jan Jürjens, Guido Wimmel: Sound development of secure service-based systems. ICSOC 2004: 115-124 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Siv Hilde Houmb: Risk-Driven Development Of Security-Critical Systems Using UMLsec. IFIP Congress Tutorials 2004: 21-54 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Johannes Grünbauer, Jan Jürjens, Guido Wimmel: Modelling Secure IT Systems - A Survey. Modellierung 2004: 307-308 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Robert Schmidt, Jan Jürjens: Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem. Modellierung 2004: 309-310 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Pasha Shabalin: Automated Verification of UMLsec Models for Security Requirements. UML 2004: 365-379 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Pasha Shabalin: Tools for Critical Systems Development with UML (Tool Demo). UML Satellite Activities 2004: 250-253 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer: Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). UML Satellite Activities 2004: 76-84 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Componentware for Critical Systems. Journal of Object Technology 3(4): 47-50 (2004) |
2003 | ||
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Romberg, Jan Jürjens, Guido Wimmel, Oscar Slotosch, Gabor Hahn: AutoFOCUS and the MoDe Tool. ACSD 2003: 249-250 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Gerhard Popp, Jan Jürjens, Guido Wimmel, Ruth Breu: Security-Critical System Development with Extended Use Cases. APSEC 2003: 478-487 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Siv Hilde Houmb, Jan Jürjens: Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec. APSEC 2003: 488- |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Algebraic State Machines: Concepts and Applications to Security. Ershov Memorial Conference 2003: 338-343 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Siv Hilde Houmb: Development of Safety-Critical Systems and Model-Based Risk Analysis with UML. LADC 2003: 364-365 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Johannes Grünbauer, H. Hollmann, Jan Jürjens, Guido Wimmel: Modelling and Verification of Layered Security Protocols: A Bank Application. SAFECOMP 2003: 116-129 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Johannes Grünbauer: Critical Systems Development with UML: Overview with Automatic Case Study. SNPD 2003: 512-517 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Developing Safety-Critical Systems with UML. UML 2003: 360-372 |
2002 | ||
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Formal Semantics for Interacting UML subsystems. FMOODS 2002: 29-43 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Guido Wimmel, Jan Jürjens: Specification-Based Test Generation for Security-Critical Systems Using Mutations. ICFEM 2002: 471-482 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: A UML statecharts semantics with message-passing. SAC 2002: 1009-1013 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Using UMLsec and goal trees for secure systems development. SAC 2002: 1026-1030 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: UMLsec: Extending UML for Secure Systems Development. UML 2002: 412-425 |
2001 | ||
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Abstracting from Failure Probabilities. ACSD 2001: 53- |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Guido Wimmel: Formally Testing Fail-Safety of Electronic Purse Protocols. ASE 2001: 408-411 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Guido Wimmel: Specification-Based Testing of Firewalls. Ershov Memorial Conference 2001: 308-316 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Towards Development of Secure Systems Using UMLsec. FASE 2001: 187-200 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Secrecy-Preserving Refinement. FME 2001: 135-152 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens, Guido Wimmel: Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. I3E 2001: 489-506 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Composability of Secrecy. MMM-ACNS 2001: 28-38 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Secure Java Development with UML. Network Security 2001: 107-124 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC. SEC 2001: 93-108 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion). Security Protocols Workshop 2001: 102-106 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Encapsulating Rules of Prudent Security Engineering. Security Protocols Workshop 2001: 95-101 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Jan Jürjens: Formal Eavesdropping and Its Computational Interpretation. TACS 2001: 82-94 |
2000 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Jürjens: Secure Information Flow for Concurrent Processes. CONCUR 2000: 395-409 |