Prof. Dr. Jan Jürjens - Veröffentlichungen nach Thema
Sichere Softwareentwicklung - Industrielle Anwendungen

Disclaimer

  • A. Bauer, J. Jürjens: Runtime Verification of Cryptographic Protocols. In: Computers and Security, Computers and Security, vol. 29, no. 3, pp. 315-330, 2010.
    @InProceedings{cs10BJ, author = {A.~Bauer and J.~{J}{\"u}{r}jens}, title = {Runtime Verification of Cryptographic Protocols}, booktitle = {Computers and Security}, year = {2010}, volume = {29}, number = {3}, series = {Computers and Security}, pages = {315--330}, DOI = {10.1016/j.cose.2009.09.003}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/comsec10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   preprint   dblp 
  • J. Lloyd, J. Jürjens: Security Analysis of a Biometric Authentication System using UMLsec and JML. In: Model Driven Engineering Languages and Systems, 12th International Conference, MODELS 2009, Denver, CO, USA, October 4-9, 2009. Proceedings, Springer, Lecture Notes in Computer Science, vol. 5795, pp. 77-91, 2009.
    @InProceedings{sabas09, author = {J.~Lloyd and J.~{J}{\"u}{r}jens}, title = {Security Analysis of a Biometric Authentication System using {UMLsec} and {JML}}, booktitle = {Model Driven Engineering Languages and Systems, 12th International Conference, {MODELS} 2009, Denver, CO, USA, October 4-9, 2009. Proceedings}, year = {2009}, volume = {5795}, series = {Lecture Notes in Computer Science}, pages = {77--91}, publisher = {Springer}, crossref = {DBLP:conf/models/2009}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/models09.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-04425-0_7:URL}, keywords = {internationalConferences, secureSoftwareEngineeringIndustrialApplications}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_9}, doi = {10.1007/978-3-8348-9788-6\_9}, }
     BibTeX   DOI   preprint   dblp   SpringerLink 
  • J. Jürjens, J. Schreck, P. Bartmann: Model-based Security Analysis for Mobile Communications. In: 30th Intern. Conference on Software Engineering (ICSE 2008), pp. 683-692, ACM, 2008.
    @InProceedings{mbsamc08, author = {J.~{J}{\"u}{r}jens and J.~Schreck and P.~Bartmann}, title = {Model-based Security Analysis for Mobile Communications}, booktitle = {30th Intern.\ Conference on Software Engineering (ICSE 2008)}, year = {2008}, pages = {683--692}, organization = {ACM}, crossref = {DBLP:conf/icse/2008}, DOI = {http://doi.org/10.1145/1368088.1368186}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse08teletalk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsetele08-jurjens.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens, R. Rumm: Model-based Security Analysis of the German Health Card Architecture. In: Methods of Information in Medicine, vol. 47, no. 5, pp. 409-416, 2008. Special section on Model-based Development of Trustworthy Health Information Systems.
    @Article{mothis08JR, author = {J.~{J}{\"u}{r}jens and R.~Rumm}, title = {Model-based Security Analysis of the German Health Card Architecture}, journal = {Methods of Information in Medicine}, year = {2008}, volume = {47}, pages = {409--416}, number = {5}, note = {Special section on Model-based Development of Trustworthy Health Information Systems}, DOI = {http://doi.org/10.3414/ME9122}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/mothis08web.pdf:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   preprint 
  • B. Best, J. Jürjens, B. Nuseibeh: Model-based Security Engineering of Distributed Information Systems using UMLsec. In: 29th International Conference on Software Engineering (ICSE 2007), pp. 581-590, ACM, 2007.
    @InProceedings{mbsedis07, author = {B.~Best and J.~{J}{\"u}{r}jens and B.~Nuseibeh}, title = {Model-based Security Engineering of Distributed Information Systems using {UMLsec}}, booktitle = {29th International Conference on Software Engineering (ICSE 2007)}, year = {2007}, pages = {581--590}, organization = {ACM}, crossref = {DBLP:conf/icse/2007}, DOI = {http://doi.ieeecomputersociety.org/10.1109/ICSE.2007.55}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse07talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icse07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens: Model-Based Security Engineering for Real (Industry Day Invited Paper). In: 14th International Symposium on Formal Methods (FM 2006), Springer Verlag, Lecture Notes in Computer Science, vol. 4085, pp. 600-606, 2006. Industry Day Invited Paper.
    @InProceedings{mbser06, author = {J.~{J}{\"u}{r}jens}, title = {Model-Based Security Engineering for Real (Industry Day Invited Paper)}, booktitle = {14th International Symposium on Formal Methods (FM 2006)}, year = {2006}, volume = {4085}, series = {Lecture Notes in Computer Science}, pages = {600--606}, publisher = {Springer Verlag}, note = {Industry Day Invited Paper}, crossref = {DBLP:conf/fm/2006}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fm06talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fm06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11813040_42:URL}, keywords = {conferences, internationalConferences, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   slides   preprint   dblp   SpringerLink