Prof. Dr. Jan Jürjens - Veröffentlichungen nach Thema
Sichere Softwareentwicklung - Automatisierte formale Sicherheitsanalyse

Disclaimer

  • M. Ochoa, J. Jürjens, J. Cuellar: Non-interference on UML State-charts. In: 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), Springer, Lecture Notes in Computer Science, vol. 7304, pp. 219-235, 2012.
    @InProceedings{tools12OJC, author = {M.~Ochoa and J.~{J}{\"u}{r}jens and J.~Cuellar}, title = {Non-interference on {UML} State-charts}, booktitle = {50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012)}, year = {2012}, series = {Lecture Notes in Computer Science}, pages = {219--235}, volume = {7304}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/tools12OJC.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-30561-0_16:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • M. Ochoa, J. Jürjens, D. Warzecha: A Sound Decision Procedure for the Compositionality of Secrecy. In: 4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012), Springer, Lecture Notes in Computer Science, vol. 7159, pp. 97-105, 2012.
    @InProceedings{essos12OJW, author = {M.~Ochoa and J.~{J}{\"u}{r}jens and D.~Warzecha}, title = {A Sound Decision Procedure for the Compositionality of Secrecy}, booktitle = {4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012)}, year = {2012}, series = {Lecture Notes in Computer Science}, pages = {97--105}, volume = {7159}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/essos12OJW.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-28166-2_10:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • L. Montrieux, J. Jürjens, C. B. Haley, Yijun Yu, P.-Y. Schobbens, H. Toussaint: Tool Support for Code Generation from a UMLsec Property. In: 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
    @InProceedings{tscg10, author = {L.~Montrieux and J.~{J}{\"u}{r}jens and C. B.~Haley and Yijun Yu and P.-Y.~Schobbens and H.~Toussaint}, title = {Tool Support for Code Generation from a {UMLsec} Property}, booktitle = {25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10)}, year = {2010}, DOI = {http://doi.acm.org/10.1145/1858996.1859074}, file = {preprint:http://oro.open.ac.uk/22231/1:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: A domain-specific language for cryptographic protocols based on streams. In: Journal of Logic and Algebraic Programming, vol. 78, no. 2, pp. 54-73, 2009.
    @Article{jlap09J, author = {J.~{J}{\"u}{r}jens}, title = {A domain-specific language for cryptographic protocols based on streams}, journal = {Journal of Logic and Algebraic Programming}, year = {2009}, volume = {78}, pages = {54--73}, number = {2}, DOI = {http://doi.org/10.1016/j.jlap.2008.08.006}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/jlap07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, T. Weber: Finite Models in FOL-based Crypto-Protocol Verification. In: ARSPA-WITS 2009, Springer Verlag, Lecture Notes in Computer Science, vol. 5511, pp. 155-172, 2009.
    @InProceedings{fmfol09, author = {J.~{J}{\"u}{r}jens and T.~Weber}, title = {Finite Models in FOL-based Crypto-Protocol Verification}, booktitle = {ARSPA-WITS 2009}, year = {2009}, series = {Lecture Notes in Computer Science}, pages = {155--172}, volume = {5511}, publisher = {Springer Verlag}, crossref = {DBLP:conf/ifip1-7/2009wits}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/wits09.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-03459-6_11:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens, J. Schreck, Yijun Yu: Automated Analysis of Permission-Based Security using UMLsec. In: Fundamental Approaches to Software Engineering (FASE), Springer Verlag, Lecture Notes in Computer Science, vol. 4961, pp. 292-295, 2008.
    @InProceedings{fase08JS, author = {J.~{J}{\"u}{r}jens and J.~Schreck and Yijun Yu}, title = {Automated Analysis of Permission-Based Security using {UMLsec}}, booktitle = {Fundamental Approaches to Software Engineering (FASE)}, year = {2008}, series = {Lecture Notes in Computer Science}, pages = {292--295}, volume = {4961}, publisher = {Springer Verlag}, crossref = {DBLP:conf/fase/2008}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fase08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fase08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-78743-3_21:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   slides   preprint   dblp   SpringerLink 
  • S. Höhn, J. Jürjens: Rubacon: Automated Support for Model-based Compliance Engineering. In: International Conference on Software Engineering (ICSE), pp. 875-878, ACM, 2008.
    @InProceedings{icse08HJ, author = {S.~H{\"o}hn and J.~{J}{\"u}{r}jens}, title = {Rubacon: Automated Support for Model-based Compliance Engineering}, booktitle = {International Conference on Software Engineering (ICSE)}, year = {2008}, pages = {875--878}, organization = {ACM}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse08tooltalk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsede57-hohn.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis, secureSoftwareEngineeringCompliance}, }
     BibTeX   slides   preprint   dblp 
  • Yijun Yu, J. Jürjens, J. Schreck: Tools for Traceability in Secure Software Development. In: 23nd International Conference on Automated Software Engineering (ASE 2008), 2008.
    @InProceedings{ttssd08, author = {Yijun Yu and J.~{J}{\"u}{r}jens and J.~Schreck}, title = {Tools for Traceability in Secure Software Development}, booktitle = {23nd International Conference on Automated Software Engineering (ASE 2008)}, year = {2008}, crossref = {DBLP:conf/kbse/2008}, DOI = {http://doi.org/10.1109/ASE.2008.92}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ase08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, Yijun Yu: Tools for Model-based Security Engineering: Models vs. Code. In: 22nd International Conference on Automated Software Engineering (ASE), Automated Software Engineering (ASE), Institute of Electrical and Electronics Engineers/ACM, 2007.
    @InProceedings{tmbsemvc07, author = {J.~{J}{\"u}{r}jens and Yijun Yu}, title = {Tools for Model-based Security Engineering: Models vs. Code}, booktitle = {22nd International Conference on Automated Software Engineering (ASE)}, year = {2007}, series = {Automated Software Engineering (ASE)}, organization = {Institute of Electrical and Electronics Engineers/ACM}, crossref = {DBLP:conf/kbse/2007}, DOI = {http://doi.org/10.1145/1321631.1321736}, file = {preprint:http://mcs.open.ac.uk/yy66/paper/jurjens07ase.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, P. Shabalin: Tools for Secure Systems Development with UML. In: International Journal on Software Tools for Technology Transfer (STTT), vol. 9, no. 5--6, pp. 527-544, 2007. Invited submission to the special issue for FASE 2004/05.
    @Article{sttt07JS, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tools for Secure Systems Development with {UML}}, journal = {International Journal on Software Tools for Technology Transfer (STTT)}, year = {2007}, volume = {9}, pages = {527--544}, number = {5--6}, note = {Invited submission to the special issue for FASE 2004/05}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/sttt07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s10009-007-0048-8:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens, J. Fox: A Framework for Analyzing Composition of Security Aspects. In: Methods for Modelling Software Systems (MMOSS), 27.08. - 01.09.2006, ICSE, ACM, 2006.
    @InProceedings{tmbse06, author = {J.~{J}{\"u}{r}jens and J.~Fox}, title = {A Framework for Analyzing Composition of Security Aspects}, booktitle = {Methods for Modelling Software Systems (MMOSS), 27.08. - 01.09.2006}, year = {2006}, series = {ICSE}, organization = {ACM}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icse06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp 
  • J. Jürjens, P. Shabalin: Tools for Secure Systems Development with UML: Security Analysis with ATPs. In: FASE 2005, Springer Verlag, Edinburgh, Lecture Notes in Computer Science, vol. 3442, pp. 305-309, 2005.
    @InProceedings{fase05JS, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tools for Secure Systems Development with {UML}: Security Analysis with {ATPs}}, booktitle = {FASE 2005}, year = {2005}, series = {Lecture Notes in Computer Science}, address = {Edinburgh}, pages = {305--309}, volume = {3442}, publisher = {Springer Verlag}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fase05talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fase05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-31984-9_23:URL}, keywords = {toolDescription, internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   slides   preprint   dblp   SpringerLink 
  • J. Jürjens: Sound Methods and Effective Tools for Model-based Security Engineering with UML. In: 27th International Conference on Software Engineering (ICSE 2005), pp. 322-331, ACM, 2005.
    @InProceedings{smetmbse05, author = {J.~{J}{\"u}{r}jens}, title = {Sound Methods and Effective Tools for Model-based Security Engineering with {UML}}, booktitle = {27th International Conference on Software Engineering (ICSE 2005)}, year = {2005}, pages = {322--331}, organization = {ACM}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.4820}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse05_ppt.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icse05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {toolDescription, internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens: Towards using game semantics for crypto protocol verification: Lorenzen games.. In: Dan R. Ghica, Guy McCusker (editors): ETAPS Workshop on Games for Logic and Programming Languages (GALOP 2005), University of Edinburgh, pp. 241-257, 2005.
    @InProceedings{tugscpv05, author = {J.~{J}{\"u}{r}jens}, title = {Towards using game semantics for crypto protocol verification: Lorenzen games.}, booktitle = {ETAPS Workshop on Games for Logic and Programming Languages (GALOP 2005)}, year = {2005}, editor = {Dan R. Ghica and Guy McCusker}, pages = {241--257}, address = {University of Edinburgh}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/galop05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   slides   dblp 
  • J. Jürjens, P. Shabalin: Automated Verification of UMLsec Models for Security Requirements. In: \guillemotleftUML\guillemotright 2004 - The Unified Modelling Language: Modelling Languages and Applications. 7th International Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings, Springer Verlag, Lisabon, Lecture Notes in Computer Science, vol. 3273, pp. 365-379, 2004.
    @InProceedings{avus04, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Automated Verification of {UMLsec} Models for Security Requirements}, booktitle = {{\guillemotleft}UML{\guillemotright} 2004 - The Unified Modelling Language: Modelling Languages and Applications. 7th International Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings}, year = {2004}, pages = {365--379}, series = {Lecture Notes in Computer Science}, volume = {3273}, address = {Lisabon}, publisher = {Springer Verlag}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/uml04talk.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/uml04talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/uml04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-30187-5_26:URL}, keywords = {toolDescription, internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   audio   slides   preprint   dblp   SpringerLink 
  • J. Jürjens: Towards Automated Computationally Faithful Verification of Cryptoprotocols. In: DIMACS Security Protocols Workshop, Rutgers University, 2004.
    @InProceedings{dimacs04J, author = {J.~{J}{\"u}{r}jens}, title = {Towards Automated Computationally Faithful Verification of Cryptoprotocols}, booktitle = {DIMACS Security Protocols Workshop}, year = {2004}, address = {Rutgers University}, keywords = {industrialConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX 
  • J. Jürjens: Logic for Security. In: Spring School "Logic in Computer Science", Venezia, Graduate School on Logic in Informatics, Munich, 2004.
    @InProceedings{lfs04, author = {J.~{J}{\"u}{r}jens}, title = {Logic for Security}, booktitle = {Spring School {"}Logic in Computer Science{"}}, year = {2004}, address = {Venezia}, organization = {Graduate School on Logic in Informatics, Munich}, keywords = {graduateSchoolLectures, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX 
  • J. Jürjens: Formal Development and Verification of Security-Critical Systems with UML. In: Workshop on Automated Verification of Critical Systems (AVoCS 2001), Oxford, 2001. Published as OUCL Technical Report PRG-RR-01-07.
    @InProceedings{fdvscsu01, author = {J.~{J}{\"u}{r}jens}, title = {Formal Development and Verification of Security-Critical Systems with {UML}}, booktitle = {Workshop on Automated Verification of Critical Systems (AVoCS 2001)}, year = {2001}, address = {Oxford}, note = {Published as OUCL Technical Report PRG-RR-01-07.}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/avocs01talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/avocs01abs.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/avocs01abs.ps:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   slides   paper (pdf)   paper (ps)