Jan Jürjens
Jan Jürjens
Universität Koblenz-Landau
Bestätigte E-Mail-Adresse bei jurjens.de - Startseite
TitelZitiert vonJahr
Secure systems development with UML
J Jürjens
Springer Science & Business Media, 2005
UMLsec: Extending UML for secure systems development
J Jürjens
International Conference on The Unified Modeling Language, 412-425, 2002
Towards development of secure systems using UMLsec
J Jürjens
International Conference on Fundamental Approaches to Software Engineering …, 2001
Formal eavesdropping and its computational interpretation
M Abadi, J Jürjens
International Symposium on Theoretical Aspects of Computer Software, 82-94, 2001
Comparing bug finding tools with reviews and tests
S Wagner, J Jürjens, C Koller, P Trischberger
IFIP International Conference on Testing of Communicating Systems, 40-55, 2005
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec
SH Houmb, S Islam, E Knauss, J Jürjens, K Schneider
Requirements Engineering 15 (1), 63-93, 2010
Sound methods and effective tools for model-based security engineering with UML
J Jurjens
Proceedings. 27th International Conference on Software Engineering, 2005 …, 2005
Integrating Security and Software Engineering
H Mouratidis, P Giorgini
Idea Group Inc, Hershey, PA, USA, 2007
Using UMLsec and goal trees for secure systems development
J Jќrjens
Model-based security engineering of distributed information systems using UMLsec
B Best, J Jurjens, B Nuseibeh
29th International Conference on Software Engineering (ICSE'07), 581-590, 2007
Specification-based testing of firewalls
J Jürjens, G Wimmel
International Andrei Ershov Memorial Conference on Perspectives of System …, 2001
Specification-based test generation for security-critical systems using mutations
G Wimmel, J Jürjens
International Conference on Formal Engineering Methods, 471-482, 2002
Secrecy-preserving refinement
J Jürjens
International Symposium of Formal Methods Europe, 135-152, 2001
From goal‐driven security requirements engineering to secure design
H Mouratidis, J Jurjens
International Journal of Intelligent Systems 25 (8), 813-840, 2010
Model-based security testing using umlsec: A case study
J Jürjens
Electronic Notes in Theoretical Computer Science 220 (1), 93-104, 2008
Extracting and verifying cryptographic models from C protocol code by symbolic execution
M Aizatulin, AD Gordon, J Jürjens
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Tools for secure systems development with UML
J Jürjens, P Shabalin
International Journal on Software Tools for Technology Transfer 9 (5-6), 527-544, 2007
Performance analysis of security aspects by weaving scenarios extracted from UML models
M Woodside, DC Petriu, DB Petriu, J Xu, T Israr, G Georg, R France, ...
Journal of Systems and Software 82 (1), 56-74, 2009
Model-based security analysis for mobile communications
J Jürjens, J Schreck, P Bartmann
Proceedings of the 30th international conference on Software engineering …, 2008
Security-critical system development with extended use cases
G Popp, J Jurjens, G Wimmel, R Breu
Tenth Asia-Pacific Software Engineering Conference, 2003., 478-487, 2003
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20