Secondary Content

Bürger

Info menu

Contact

University of Koblenz
Department of Software Technology
Universitaetsstrasse 1
D-56070 Koblenz
Office: B 110
Phone: +49 261 287-2705
E-Mail: buerger at uni-koblenz.de

Jens Bürger - Publications

  • Cyntia Vargas, Jens Bürger, Fabien Viertel, Birgit Vogel-Heuser, Jan Jürjens: System evolution through semi-automatic elicitation of security requirements: A Position Paper. In: IFAC-PapersOnLine, vol. 51, no. 10, pp. 64 - 69, 2018. 3rd IFAC Conference on Embedded Systems, Computational Intelligence and Telematics in Control CESCIT 2018.
    @Article{MBVVJ18, title = "System evolution through semi-automatic elicitation of security requirements: {A} {P}osition {P}aper", journal = "IFAC-PapersOnLine", volume = "51", number = "10", pages = "64 - 69", year = "2018", note = "3rd IFAC Conference on Embedded Systems, Computational Intelligence and Telematics in Control CESCIT 2018", issn = "2405-8963", doi = "https://doi.org/10.1016/j.ifacol.2018.06.238", url = "http://www.sciencedirect.com/science/article/pii/S240589631830555X", author = "Cyntia Vargas and Jens B{\"u}rger and Fabien Viertel and Birgit Vogel-Heuser and Jan J{\"u}rjens", keywords = "Industrial Security, Industry Automation, Model-driven Engineering, Requirements Analysis, Security Engineering, System Models" }
     BibTeX   DOI   URL 
  • Jens Bürger, Daniel Strüber, Stefan Gärtner, Thomas Ruhroth, Jan Jürjens, Kurt Schneider: A framework for semi-automated co-evolution of security knowledge and system models. In: Journal of Systems and Software, vol. 139, pp. 142 - 160, 2018.
    @article{BSGRJS2018, title = "A framework for semi-automated co-evolution of security knowledge and system models", journal = "Journal of Systems and Software", volume = "139", pages = "142 - 160", year = "2018", issn = "0164-1212", doi = "https://doi.org/10.1016/j.jss.2018.02.003", url = "http://www.sciencedirect.com/science/article/pii/S016412121830027X", author = "Jens Bürger and Daniel Strüber and Stefan Gärtner and Thomas Ruhroth and Jan Jürjens and Kurt Schneider", keywords = "Security requirements, Software evolution, Co-evolution, Software design, Security impact analysis" }
     BibTeX   DOI   URL 
  • Sven Peldszus, Jens Bürger, Daniel Strüber: Detecting and Preventing Power Outages in a Smart Grid using eMoflon. In: Antonio Garcia-Dominguez, Georg Hinkel, Filip K\vrikava (editors): Proceedings of the 10th Transformation Tool Contest (TTC), CEUR Workshop Proceedings, pp. 19-23, July 2017.
    @InProceedings{PBS2017, author = {Peldszus, Sven and B{\"u}rger, Jens and Str{\"u}ber, Daniel}, title = {{Detecting and Preventing Power Outages in a Smart Grid using eMoflon}}, booktitle = {Proceedings of the 10th Transformation Tool Contest (TTC)}, year = {2017}, editor = {Antonio Garcia-Dominguez and Georg Hinkel and Filip K{\v{r}}ikava}, series = {CEUR Workshop Proceedings}, pages = {19--23}, month = jul, file = {paper:http://ceur-ws.org/Vol-2026/paper17.pdf:URL}, }
     BibTeX   paper 
  • J. Bürger, S. Gärtner, T. Ruhroth, J. Zweihoff, J. Jürjens, K. Schneider: Restoring Security of Long-Living Systems by Co-Evolution. In: 39th Annual IEEE Computer Software and Applications Conference (COMPSAC 2015), IEEE, 2015.
    @InProceedings{compsac15B, author = {J.~B\"urger and S.~G\"artner and T.~Ruhroth and J.~Zweihoff and J.~{J}{\"u}{r}jens and K.~Schneider}, title = {Restoring Security of Long-Living Systems by Co-Evolution}, booktitle = {39th Annual IEEE Computer Software and Applications Conference (COMPSAC 2015)}, OPTpages = {}, year = {2015}, organization = {IEEE}, keywords = {internationalConferences, softwareEvolution}, File = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/compsac15B.pdf:URL}, }
     BibTeX   preprint 
  • Stefan Gärtner, Thomas Ruhroth, Jens Bürger, Kurt Schneider, Jan Jürjens: Towards Maintaining Long-Living Information Systems by Incorporating Evolving Security Knowledge. In: Software Engineering (SE 2015), Lecture Notes in Informatics, GI, 2015.
    Modern information systems are increasingly complex and need to operate in evolving environments. As a consequence, systems must co-evolve to keep up-to-date with their environments. This is especially important for security properties, since changes and patches tend to compromise them. We propose a security assessment approach for natural language requirements for systematic co-evolution. Our evaluation and tool implementation show security benefits for maintaining long-living systems.
     Abstract 
    @InProceedings{se15GRBSJ, author = {Stefan G\"artner and Thomas Ruhroth and Jens B\"urger and Kurt Schneider and Jan J\"urjens}, title = {Towards Maintaining Long-Living Information Systems by Incorporating Evolving Security Knowledge}, booktitle = {Software Engineering (SE 2015)}, OPTpages = {}, year = {2015}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, series = {Lecture Notes in Informatics}, organization = {GI}, File = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/se15.pdf:URL}, keywords = {hotOffThePress,workshop, industrialConferences}, abstract = {Modern information systems are increasingly complex and need to operate in evolving environments. As a consequence, systems must co-evolve to keep up-to-date with their environments. This is especially important for security properties, since changes and patches tend to compromise them. We propose a security assessment approach for natural language requirements for systematic co-evolution. Our evaluation and tool implementation show security benefits for maintaining long-living systems.} }
     BibTeX   preprint 
  • Jens Bürger, Jan Jürjens, Sven Wenzel: Restoring security of evolving software models using graph transformation. In: International Journal on Software Tools for Technology Transfer, vol. 17, no. 3, pp. 267-289, 2015.
    @Article{BJW15, year={2015}, issn={1433-2779}, journal={International Journal on Software Tools for Technology Transfer}, volume={17}, number={3}, doi={10.1007/s10009-014-0364-8}, title={Restoring security of evolving software models using graph transformation}, url={http://dx.doi.org/10.1007/s10009-014-0364-8}, publisher={Springer Berlin Heidelberg}, keywords={Evolution; Graph transformation; Model transformation; Model-based software engineering security}, author={Bürger, Jens and Jürjens, Jan and Wenzel, Sven}, pages={267-289}, language={English}, File = {SpringerLink:http\://link.springer.com/article/10.1007/s10009-014-0364-8:URL} }
     BibTeX   DOI   SpringerLink 
  • Thomas Ruhroth, Stefan Gärtner, Jens Bürger, Jan Jürjens, Kurt Schneider: Towards Adaptation and Evolution of Domain-specific Knowledge for Maintaining Secure Systems. In: 15th International Conference of Product Focused Software Development and Process Improvement (Profes'14), Springer-Verlag, Lecture Notes in Computer Science, vol. 8892, pp. 239-253, 2014.
    Creating and maintaining secure software require a good understanding of the system and its environment. Knowledge management is therefore one of the key factors to maintain secure software successfully. However, acquiring and modeling knowledge is a labor-intensive and time-consuming task. Thus, knowledge ought to be shared among different projects and must be adapted to their specific needs. In this paper, we present an approach allowing the stepwise adaptation from domain- to project-specific knowledge based on OWL ontologies. For this purpose, we define a basic set of adaptation operators which allows effective and frugal changes. Moreover, we discuss how our approach can be integrated into common software process models in order to adapt knowledge required for maintenance. Since domain- and project-specific knowledge changes over time, we show how our approach copes with changes efficiently, so that the affected knowledge remains consistent. The shared use of knowledge significantly reduce the complexity and effort to model required knowledge in various projects. Our case study and tool implementation shows the benefits for maintaining secure systems.
     Abstract 
    @InProceedings{profes14, author = {Thomas Ruhroth and Stefan G\"artner and Jens B\"urger and Jan J\"urjens and Kurt Schneider}, title = {Towards Adaptation and Evolution of Domain-specific Knowledge for Maintaining Secure Systems}, booktitle = {15th International Conference of Product Focused Software Development and Process Improvement (Profes'14)}, pages = {239--253}, editors = {Andreas Jedlitschka and Pasi Kuvaja and Marco Kuhrmann and Tomi Mannist\"o and J\"urgen M\"unch}, year = {2014}, volume = {8892}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, doi = {10.1007/978-3-319-13835-0_17}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/profes14.pdf:URL;dblp:http://www.informatik.uni-trier.de/~ley/pers/hd/j/J=uuml=rjens:Jan.html#c113:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-319-13835-0_17:URL}, abstract = {Creating and maintaining secure software require a good understanding of the system and its environment. Knowledge management is therefore one of the key factors to maintain secure software successfully. However, acquiring and modeling knowledge is a labor-intensive and time-consuming task. Thus, knowledge ought to be shared among different projects and must be adapted to their specific needs. In this paper, we present an approach allowing the stepwise adaptation from domain- to project-specific knowledge based on OWL ontologies. For this purpose, we define a basic set of adaptation operators which allows effective and frugal changes. Moreover, we discuss how our approach can be integrated into common software process models in order to adapt knowledge required for maintenance. Since domain- and project-specific knowledge changes over time, we show how our approach copes with changes efficiently, so that the affected knowledge remains consistent. The shared use of knowledge significantly reduce the complexity and effort to model required knowledge in various projects. Our case study and tool implementation shows the benefits for maintaining secure systems. } }
     BibTeX   DOI   preprint   dblp   SpringerLink 
  • J. Bürger, J. Jürjens, T. Ruhroth, S. Gärtner, K. Schneider: Model-based Security Engineering with UML: Managed Co-Evolution of Security Knowledge and Software Models. In: A. Aldini, J. Lopez, F. Martinelli (editors): Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial Lectures, Lecture Notes in Computer Science, vol. 8604, pp. 282, 2014.
    @InProceedings{fosad14, Title = {Model-based Security Engineering with {UML}: Managed Co-Evolution of Security Knowledge and Software Models}, Author = {J.~B\"urger and J.~{J}{\"u}{r}jens and T.~Ruhroth and S.~G\"artner and K.~Schneider}, Booktitle = {Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial Lectures}, Year = {2014}, Editor = {A.~Aldini and J.~Lopez and F.~Martinelli}, Pages = {282}, Series = {Lecture Notes in Computer Science}, Volume = {8604}, Keywords = {hotOffThePress, invitedBookChapters}, Owner = {buerger}, Timestamp = {2014.08.05} }
     BibTeX 
  • S. Gärtner, T. Ruhroth, J. Bürger, K. Schneider, J. Jürjens: Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge. In: 22nd IEEE International Requirements Engineering Conference, IEEE, 2014.
    @InProceedings{re14GRBSJ, Title = {Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge}, Author = {S.~G\"artner and T.~Ruhroth and J.~B\"urger and K.~Schneider and J.~J\"urjens}, Booktitle = {22nd IEEE International Requirements Engineering Conference}, Year = {2014}, Organization = {IEEE}, Keywords = {secureSoftwareEngineeringSecurityRequirementsEngineering} }
     BibTeX 
  • Stefan Gärtner, Jens Bürger, Kurt Schneider, Jan Jürjens: Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen. In: 1st Collaborative Workshop on Evolution and Maintenance of Long-Living Systems (EMLS), 2014.
    @InProceedings{GBSJ14, Title = {{Z}ielgerichtete {A}npassung von {S}oftware nach der {E}volution von kontextspezifischem {W}issen}, Author = {Stefan Gärtner and Jens Bürger and Kurt Schneider and Jan Jürjens}, Booktitle = {1st Collaborative Workshop on Evolution and Maintenance of Long-Living Systems (EMLS)}, Year = {2014}, Url = {http://ceur-ws.org/Vol-1129/paper13.pdf} }
     BibTeX   URL 
  • Thomas Ruhroth, Stefan Gärtner, Jens Bürger, Jan Jürjens, Kurt Schneider: Versioning and Evolution Requirements for Model-Based System Development. In: International Workshop on Comparison and Versioning of Software Models (CVSM 2014), Softwaretechnik-Trends, vol. 34/2, pp. 20-24, 2014.
    Long-living software systems “ages” not by wearing out, but by failing to keep up-to-date with its requirements. Moreover, security is an increasingly important quality facet in modern information systems and needs to be retained properly. In model-based system development, this leads to a continuously changing information system model accordingly. The problem is that software engineers cannot simply overview changes of the system model and their impact on the applied security model. To overcome this problem, a semantic representation of model changes is needed which is determined from fine-grained edit operations. Based on the semantic representation of system model changes, software engineers are supported to choose an evolution strategy of the associated security model. In this paper, we discuss challenges and problems that arise from the granularity of the change operations as well as the selection of different evolution strategies which can be performed interleaved.
     Abstract 
    @INPROCEEDINGS{cvsm14RGBJS, author = {Thomas Ruhroth and Stefan G\"artner and Jens B\"urger and Jan J{\"u}rjens and Kurt Schneider}, title = {Versioning and Evolution Requirements for Model-Based System Development}, booktitle = {International Workshop on Comparison and Versioning of Software Models (CVSM 2014)}, year = {2014}, keywords = {hotOffThePress, workshop}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/cvsm14.pdf:URL}, pages = {20--24}, volume = {34/2}, series = {Softwaretechnik-Trends}, abstract = {Long-living software systems “ages” not by wearing out, but by failing to keep up-to-date with its requirements. Moreover, security is an increasingly important quality facet in modern information systems and needs to be retained properly. In model-based system development, this leads to a continuously changing information system model accordingly. The problem is that software engineers cannot simply overview changes of the system model and their impact on the applied security model. To overcome this problem, a semantic representation of model changes is needed which is determined from fine-grained edit operations. Based on the semantic representation of system model changes, software engineers are supported to choose an evolution strategy of the associated security model. In this paper, we discuss challenges and problems that arise from the granularity of the change operations as well as the selection of different evolution strategies which can be performed interleaved. } }
     BibTeX   preprint