Prof. Dr. Jan Jürjens - Publications by topic
Secure Software Engineering - Model-based Security Engineering (Misc.)

Disclaimer

  • R. Heinrich, S. Gärtner, T.-M. Hesse, T. Ruhroth, R. Reussner, K. Schneider, B. Paech, J. Jürjens: The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution. In: International Journal of Software Engineering and Knowledge Engineering (IJSEKE), 2015.
    @Article{ijseke16, author = {R.~Heinrich and S.~G\"artner and T.-M.~Hesse and T.~Ruhroth and R.~Reussner and K.~Schneider and B.~Paech and J.~{J}{\"u}{r}jens}, title = {The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution}, journal = {International Journal of Software Engineering and Knowledge Engineering (IJSEKE)}, year = {2015}, keywords = {modelbasedSecurityEngineering, softwareEvolution, secvolution}, }
     BibTeX 
  • J. Bürger, J. Jürjens, S. Wenzel: Restoring Security of Evolving Software Models using Graph-Transformation. In: International Journal on Software Tools for Technology Transfer (STTT), vol. 17, no. 3, pp. 267-289, 2015.
    @Article{BJW15, author = {J.~B\"urger and J.~J\"urjens and S.~Wenzel}, title = {Restoring Security of Evolving Software Models using Graph-Transformation}, journal = {International Journal on Software Tools for Technology Transfer (STTT)}, year = {2015}, volume = {17}, number = {3}, pages = {267--289}, doi = {10.1007/s1000901403648}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/bjw15.pdf:URL}, keywords = {modelbasedSecurityEngineering, softwareEvolution, secvolution}, }
     BibTeX   DOI   preprint 
  • J. Jürjens, A. S. Ahmadian: Model-based Security Analysis and Applications to Security Economics (Invited Talk). In: International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015), 2015. Special Session on Security and Privacy in Model Based Engineering.
    @InProceedings{modelsward15, author = {J.~{J}{\"u}{r}jens and A. S.~Ahmadian}, title = {Model-based Security Analysis and Applications to Security Economics (Invited Talk)}, booktitle = {International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015)}, note = {Special Session on Security and Privacy in Model Based Engineering.}, OPTpages = {}, year = {2015}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, OPTseries = {}, OPTorganization = {}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/spie_15.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/spie15.pdf:URL}, keywords = {conferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   preprint   slides 
  • F. Dupressoir, A. D. Gordon, J. Jürjens, D. Naumann: Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. In: Journal of Computer Security, vol. 22, no. 5, pp. 823-866, 2014. Special issue with best papers from the 24th IEEE Computer Security Foundations Symposium (CSF).
    @Article{DGJN14, author = {F.~Dupressoir and A. D.~Gordon and J.~J{\"u}rjens and D.~Naumann}, title = {Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols}, journal = {Journal of Computer Security}, volume = {22}, number = {5}, pages = {823--866}, year = {2014}, note = {Special issue with best papers from the 24th IEEE Computer Security Foundations Symposium (CSF)}, file = {preprint:http\://arxiv.org/abs/1312.6532:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {10.3233/JCS-140508}, keywords = {selectedPub,modelbasedSecurityEngineering,secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • S. Wenzel, D. Warzecha, J. Jürjens, M. Ochoa: UMLchange - Specifying Model Changes to Support Security Verification of Potential Evolution. In: Journal of Computer Standards & Interfaces, vol. 36, pp. 776-791, 2014. Special Issue on Security in Information Systems.
    @Article{CSI14wwjo, author = {S.~Wenzel and D.~Warzecha and J.~J{\"u}rjens and M.~Ochoa}, title = {{UMLchange} -- Specifying Model Changes to Support Security Verification of Potential Evolution}, journal = {Journal of Computer Standards \& Interfaces}, year = {2014}, volume = {36}, issue = {4}, pages = {776--791}, note = {Special Issue on Security in Information Systems.}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/csi14wwjo.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {http://doi.org/10.1016/j.csi.2013.12.011}, keywords = {selectedPub,modelbasedSecurityEngineering,softwareEvolution, secvolution}, }
     BibTeX   DOI   preprint   dblp 
  • M. Felderer, B. Katt, P. Kalb, J. Jürjens, M. Ochoa, F. Paci, L. M. S. Tran, T. T. Tun, K. Yskout, R. Scandariato, F. Piessens, D. Vanoverberghe, E. Fourneret, M. Gander, B. Solhaug, R. Breu: Evolution of Security Engineering Artifacts: A State of the Art Survey. In: International Journal of Secure Software Engineering (IJSSE), vol. 5, no. 4, pp. 48-98, 2014.
    @Article{ijsse14, author = {M.~Felderer and B.~Katt and P.~Kalb and J.~J{\"u}rjens and M.~Ochoa and F.~Paci and L. M. S.~Tran and T. T.~Tun and K.~Yskout and R.~Scandariato and F.~Piessens and D.~Vanoverberghe and E.~Fourneret and M.~Gander and B.~Solhaug and R.~Breu}, title = {Evolution of Security Engineering Artifacts: A State of the Art Survey}, journal = {International Journal of Secure Software Engineering (IJSSE)}, year = {2014}, volume = {5}, number = {4}, pages = {48--98}, file = {preprint:http://www.researchgate.net/profile/Michael_Felderer/publication/271213941_Evolution_of_Security_Engineering_Artifacts_A_State_of_the_Art_Survey/links/54c28b210cf2911c7a492759.pdf?ev=pub_ext_doc_dl&origin=publication_detail&inViewer=true:URL}, keywords = {modelbasedSecurityEngineering, softwareEvolution}, }
     BibTeX   preprint 
  • S. Taubenberger, J. Jürjens, Y. Yu, B. Nuseibeh: Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models. In: Journal on Information Management and Computer Security (IMCS), vol. 21, no. 3, pp. 202-223, 2013.
    @Article{TauJurYuNus13, author = {S.~Taubenberger and J.~{J}{\"u}{r}jens and Y.~Yu and B.~Nuseibeh}, title = {Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models}, journal = {Journal on Information Management and Computer Security (IMCS)}, year = {2013}, volume = {21}, number = {3}, pages = {202--223}, DOI = {http://doi.org/10.1108/IMCS-09-2012-0054}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/imcs13TJYN.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering,secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, B. Livshits, R. Scandariato (editors): 5th International Symposium on Engineering Secure Software and Systems (ESSoS 2013), Springer, LNCS, vol. 7781, 2013.
    @Proceedings{JurLivSca13, title = {5th International Symposium on Engineering Secure Software and Systems (ESSoS 2013)}, year = {2013}, editor = {J.~{J}{\"u}{r}jens and B.~Livshits and R.~Scandariato}, volume = {7781}, series = {LNCS}, publisher = {Springer}, file = {SpringerLink:http://link.springer.com/book/10.1007%2F978-3-642-36563-8:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {procs, book, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   SpringerLink   dblp 
  • J. Jürjens: Hot Topics in Model-based Security (Invited Panel Contribution) Eternals Workshop @ ESSOS'13, Paris 2013
    @Misc{eternals13Jpanel, author = {J.~{J}{\"u}{r}jens}, title = {Hot Topics in Model-based Security (Invited Panel Contribution)}, howpublished = {Eternals Workshop @ ESSOS'13, Paris}, year = {2013}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/eternals13panel.pdf:URL}, keywords = {invitedTalk, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides 
  • K. Schneider, E. Knauss, S. Houmb, S. Islam, J. Jürjens: Enhancing Security Requirements Engineering by Organisational Learning. In: Requirements Engineering Journal (REJ), vol. 17, no. 1, pp. 35-56, 2012.
    @Article{rej11SKHIJ, author = {K.~Schneider and E.~Knauss and S.~Houmb and S.~Islam and J.~J{\"u}rjens}, title = {Enhancing Security Requirements Engineering by Organisational Learning}, journal = {Requirements Engineering Journal (REJ)}, year = {2012}, volume = {17}, number = {1}, pages = {35--56}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/rej12SKHIJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s00766-011-0141-0:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens: Model-based Security Engineering. In: 12th International School on Foundations of Security Analysis and Design (FOSAD 2012), Bertinoro (Italy), 2012.
    @InProceedings{fosad12J, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering}, booktitle = {12th International School on Foundations of Security Analysis and Design (FOSAD 2012)}, year = {2012}, address = {Bertinoro (Italy)}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/fosad12talk.pdf:URL;audio-pt-1:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/fosad12_1.wma:URL;audio-pt-2:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/fosad12_2.spx:URL}, keywords = {graduateSchoolLectures, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides   audio-pt-1   audio-pt-2 
  • S. Islam, H. Mouratidis, J. Jürjens: A Framework to Support Alignment of Secure Software Engineering with Legal Regulations. In: Journal of Software and Systems Modeling (SoSyM), Springer-Verlag, vol. 10, no. 3, pp. 369-394, 2011.
    @Article{sosym11IMJ, author = {S.~Islam and H.~Mouratidis and J.~{J}{\"u}{r}jens}, title = {A Framework to Support Alignment of Secure Software Engineering with Legal Regulations}, journal = {Journal of Software and Systems Modeling (SoSyM), Springer-Verlag}, year = {2011}, volume = {10}, pages = {369--394}, number = {3}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/sosym10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s10270-010-0154-z:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering, secureSoftwareEngineeringCompliance}, }
     BibTeX   preprint   dblp   SpringerLink 
  • A. Bauer, J. Jürjens, Y. Yu: Run-Time Security Traceability for Evolving Systems. In: The Computer Journal, vol. 54, no. 1, pp. 58-87, 2011.
    @Article{cj11BJY, author = {A.~Bauer and J.~{J}{\"u}{r}jens and Y.~Yu}, title = {Run-Time Security Traceability for Evolving Systems}, journal = {The Computer Journal}, year = {2011}, volume = {54}, pages = {58--87}, number = {1}, DOI = {http://doi.org/10.1093/comjnl/bxq042}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/compjour10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {selectedPub,modelbasedSecurityEngineering,vorsecurestreams, softwareEvolution}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Model-based Security Engineering with UML: The last decade and towards the future (Keynote). In: 26th IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010), pp. 4, 2010.
    @InProceedings{vlhcc10, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering with {UML}: The last decade and towards the future (Keynote)}, booktitle = {26th IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010)}, year = {2010}, pages = {4}, DOI = {http://doi.org/10.1109/VLHCC.2010.10}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/slides/vlhcc10talk.pdf:URL;audio:http\://rgse.uni-koblenz.de/jj/publications/audio/vlhcc10rec.wav:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/vlhcc10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {overviewPub,conferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   slides   audio   preprint   dblp 
  • H. Mouratidis, J. Jürjens: From Goal-Driven Security Requirements Engineering to Secure Design. In: International Journal of Intelligent Systems (IJIS) (Wiley Interscience), International Journal of Intelligent Systems, vol. 25, no. 8, pp. 813-840, 2010. Special issue on "Goal-Driven Requirements Engineering".
    @InProceedings{fgdsresd10, author = {H.~Mouratidis and J.~{J}{\"u}{r}jens}, title = {From Goal-Driven Security Requirements Engineering to Secure Design}, booktitle = {International Journal of Intelligent Systems (IJIS) (Wiley Interscience)}, year = {2010}, volume = {25}, number = {8}, series = {International Journal of Intelligent Systems}, pages = {813--840}, note = {Special issue on {"}Goal-Driven Requirements Engineering{"}}, DOI = {http://doi.org/10.1002/int.20432}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ijis10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • S. H. Houmb, S. Islam, E. Knauss, J. Jürjens, K. Schneider: Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec. In: Requirements Engineering Journal (REJ), Springer-Verlag, vol. 15, no. 1, pp. 63-93, 2010. Special issue on Security Requirements Engineering.
    @Article{rej10HIKJS, author = {S. H.~Houmb and S.~Islam and E.~Knauss and J.~{J}{\"u}{r}jens and K.~Schneider}, title = {Eliciting Security Requirements and Tracing them to Design: An Integration of {Common Criteria, Heuristics, and UMLsec}}, journal = {Requirements Engineering Journal (REJ), Springer-Verlag}, year = {2010}, volume = {15}, pages = {63--93}, number = {1}, note = {Special issue on Security Requirements Engineering}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/JRE_SR_Elicitation.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s00766-009-0093-9:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 
  • S. Höhn, J. Jürjens, L. Lowis, R. Accorsi: Identification of Vulnerabilities in Web Services using Model-based Security. In: C. Gutierrez, E. Fernandez-Medina, M. Piattini: (editors): IGI Global Web Services Security Development and Architecture: Theoretical and Practical Issues, 2010. Print ISBN-13: 978-1-60566-950-2.
    @InCollection{ivwsmbs10, author = {S.~H{\"o}hn and J.~{J}{\"u}{r}jens and L.~Lowis and R.~Accorsi}, title = {Identification of Vulnerabilities in Web Services using Model-based Security}, booktitle = {Web Services Security Development and Architecture: Theoretical and Practical Issues}, year = {2010}, editor = {C. Gutierrez and E. Fernandez-Medina and M. Piattini:}, publisher = {IGI Global}, note = {Print ISBN-13: 978-1-60566-950-2}, keywords = {invitedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • A. Bauer, J. Jürjens: Runtime Verification of Cryptographic Protocols. In: Computers and Security, Computers and Security, vol. 29, no. 3, pp. 315-330, 2010.
    @InProceedings{cs10BJ, author = {A.~Bauer and J.~{J}{\"u}{r}jens}, title = {Runtime Verification of Cryptographic Protocols}, booktitle = {Computers and Security}, year = {2010}, volume = {29}, number = {3}, series = {Computers and Security}, pages = {315--330}, DOI = {10.1016/j.cose.2009.09.003}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/comsec10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   preprint   dblp 
  • A. Nhlabatsi, A. Bandara, Shinpei Hayashi, C. B. Haley, J. Jürjens, Haruhiko Kaiya, Atsuto Kubo, R. Laney, H. Mouratidis, B. Nuseibeh, Yasuyuki Tahara, T. T. Tun, Hironori Washizaki, Nobukazu Yoshioka, Yijun Yu: Security Patterns: Comparing Modeling Approaches. In: H. Mouratidis (editors): IGI Global Software Engineering for Secure Systems: Industrial and Research Perspectives, 2010
    @InCollection{spcma10, author = {A.~Nhlabatsi and A.~Bandara and Shinpei Hayashi and C. B.~Haley and J.~{J}{\"u}{r}jens and Haruhiko Kaiya and Atsuto Kubo and R. Laney and H.~Mouratidis and B.~Nuseibeh and Yasuyuki Tahara and T. T.~Tun and Hironori Washizaki and Nobukazu Yoshioka and Yijun Yu}, title = {Security Patterns: Comparing Modeling Approaches}, booktitle = {Software Engineering for Secure Systems: Industrial and Research Perspectives}, year = {2010}, editor = {H. Mouratidis}, publisher = {IGI Global}, file = {preprint:https://books.google.de/books?id=RBTK7QfYquoC&pg=PA75&lpg=PA75&dq=%22Security+Patterns:+Comparing+Modeling+Approaches%22&source=bl&ots=ZhKGFa2fab&sig=maktkbR5rb0nVDmDjtx0KepP004&hl=de&sa=X&ei=6Ve5VN_3NYbqUoeIgig&ved=0CEsQ6AEwBA#v=onepage&q=%22Security%20Patterns%3A%20Comparing%20Modeling%20Approaches%22&f=false:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   preprint 
  • E. B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki, J. Jürjens, M. VanHilst, G. Pernul: Using security patterns to develop secure systems. In: H. Mouratidis (editors): IGI Global Software Engineering for Secure Systems: Industrial and Research Perspectives, 2010
    @InCollection{uspdss10, author = {E. B.~Fernandez and Nobukazu Yoshioka and Hironori Washizaki and J.~{J}{\"u}{r}jens and M.~VanHilst and G.~Pernul}, title = {Using security patterns to develop secure systems}, booktitle = {Software Engineering for Secure Systems: Industrial and Research Perspectives}, year = {2010}, editor = {H. Mouratidis}, publisher = {IGI Global}, file = {preprint:http\://epub.uni-regensburg.de/18787/1/Mouratidis2010Ch2.pdf:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   preprint 
  • J. Jürjens: A domain-specific language for cryptographic protocols based on streams. In: Journal of Logic and Algebraic Programming, vol. 78, no. 2, pp. 54-73, 2009.
    @Article{jlap09J, author = {J.~{J}{\"u}{r}jens}, title = {A domain-specific language for cryptographic protocols based on streams}, journal = {Journal of Logic and Algebraic Programming}, year = {2009}, volume = {78}, pages = {54--73}, number = {2}, DOI = {http://doi.org/10.1016/j.jlap.2008.08.006}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/jlap07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • M. Woodside, D. C. Petriu, D. B. Petriu, J. Xu, T. Israr, G. Georg, R. France, J. M. Bieman, S. H. Houmb, Jan Jürjens: Performance Analysis of Security Aspects by Weaving Scenarios from UML Models. In: Journal of Systems and Software, vol. 82, no. 1, pp. 56-74, 2009.
    @Article{WPP+09, author = {M.~Woodside and D. C.~Petriu and D. B.~Petriu and J.~Xu and T.~Israr and G.~Georg and R.~France and J. M.~Bieman and S. H.~Houmb and Jan {J}{\"u}{r}jens}, title = {Performance Analysis of Security Aspects by Weaving Scenarios from {UML} Models}, journal = {Journal of Systems and Software}, year = {2009}, volume = {82}, pages = {56--74}, number = {1}, DOI = {10.1016/j.jss.2008.03.067}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/JSS-WOSP07-accepted.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering, securityPerformance}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Model-based Security Engineering for Evolving Systems. In: Workshop on Security in Model Driven Architecture (SEC-MDA`09), Fifth European Conference on Model Driven Architecture Foundations and Applications (ECMDA 2009), University of Twente, 2009.
    @InProceedings{mbsees, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering for Evolving Systems}, booktitle = {Workshop on Security in Model Driven Architecture (SEC-MDA`09), Fifth European Conference on Model Driven Architecture Foundations and Applications (ECMDA 2009)}, year = {2009}, address = {University of Twente}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/mdasec09.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering, softwareEvolution}, }
     BibTeX   slides 
  • J. Jürjens: Model-based Security Engineering with UMLsec. In: Serenity Day: Establishing IT Security as a full engineering discipline, Brussels, 2009.
    @InProceedings{mbseumlsec09, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering with {UMLsec}}, booktitle = {Serenity Day: Establishing IT Security as a full engineering discipline}, year = {2009}, address = {Brussels}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX 
  • J. Jürjens: Formal Foundations for Verifying Security-Critical Software. In: 12th European Joint Conferences on Theory and Practice of Software (ETAPS 2009), 2009. Tutorial.
    @InProceedings{ffvscs09, author = {J.~{J}{\"u}{r}jens}, title = {Formal Foundations for Verifying Security-Critical Software}, booktitle = {12th European Joint Conferences on Theory and Practice of Software (ETAPS 2009)}, year = {2009}, note = {Tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • M. Giddings, J. Jürjens, P. M. Allen: Challenges for the model based development of distributed real time systems. In: 1st Int. Workshop on Non-functional System Properties in Domain Specific Modeling Languages (NFPinDSML @ MoDELS 2008), 2008.
    @InProceedings{cfmbd08, author = {M.~Giddings and J.~{J}{\"u}{r}jens and P. M.~Allen}, title = {Challenges for the model based development of distributed real time systems}, booktitle = {1st Int. Workshop on Non-functional System Properties in Domain Specific Modeling Languages (NFPinDSML @ MoDELS 2008)}, year = {2008}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/nfpdsml08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/nfpdsml08GJA.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides   preprint 
  • J. Jürjens, R. Rumm: Model-based Security Analysis of the German Health Card Architecture. In: Methods of Information in Medicine, vol. 47, no. 5, pp. 409-416, 2008. Special section on Model-based Development of Trustworthy Health Information Systems.
    @Article{mothis08JR, author = {J.~{J}{\"u}{r}jens and R.~Rumm}, title = {Model-based Security Analysis of the German Health Card Architecture}, journal = {Methods of Information in Medicine}, year = {2008}, volume = {47}, pages = {409--416}, number = {5}, note = {Special section on Model-based Development of Trustworthy Health Information Systems}, DOI = {http://doi.org/10.3414/ME9122}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/mothis08web.pdf:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   preprint 
  • Michel R. V. Chaudron (editors): First International Modeling Security Workshop, Springer, Lecture Notes in Computer Science, vol. 5421, pp. 181-184, 2008.
    @Proceedings{modsec08, author = {Jon Whittle and Jan J{\"{u}}rjens and Bashar Nuseibeh and Glen Dobson}, editor = {Michel R. V. Chaudron}, title = {First International Modeling Security Workshop}, booktitle = {Models in Software Engineering, Workshops and Symposia at {MODELS} 2008, Toulouse, France, September 28 - October 3, 2008. Reports and Revised Selected Papers}, pages = {181--184}, series = {Lecture Notes in Computer Science}, volume = {5421}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01648-6\_19}, doi = {10.1007/978-3-642-01648-6\_19}, keywords = {procs, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI 
  • J. Jürjens: Modellbasierte Entwicklung Sicherheitskritischer Systeme (Keynote). In: Software Engineering 2007, 2007.
    @InProceedings{mbess07, author = {J.~{J}{\"u}{r}jens}, title = {{Modellbasierte Entwicklung Sicherheitskritischer Systeme (Keynote)}}, booktitle = {Software Engineering 2007}, year = {2007}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/se07de.pdf:URL}, keywords = {conferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides 
  • J. Jürjens: Model-based Security Engineering for Compliance with Regulatory and Business Requirements. In: H.-G. Hegering, H. Reiser, M. Schiffers, T. Nebe (editors): 14th Annual Workshop of the HP Software University Association, Munich (Germany), pp. 219-226, 2007.
    @InProceedings{mbsecrbr07, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering for Compliance with Regulatory and Business Requirements}, booktitle = {14th Annual Workshop of the HP Software University Association}, year = {2007}, editor = {H.-G.~Hegering and H.~Reiser and M.~Schiffers and T.~Nebe}, pages = {219--226}, address = {Munich (Germany)}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/hp07slides.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/hp07.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringCompliance}, }
     BibTeX   slides   preprint 
  • J. Jürjens: Model-based Security Engineering: Run-time Assurance. In: Third International Workshop on Software Engineering for Secure Systems (SESS 2007 @ ICSE 2007), Minneapolis (MN) (USA), 2007.
    @InProceedings{sess07, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering: Run-time Assurance}, booktitle = {Third International Workshop on Software Engineering for Secure Systems (SESS 2007 @ ICSE 2007)}, year = {2007}, address = {Minneapolis (MN) (USA)}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/sess07.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides 
  • J. Jürjens, P. Shabalin: Tools for Secure Systems Development with UML. In: International Journal on Software Tools for Technology Transfer (STTT), vol. 9, no. 5--6, pp. 527-544, 2007. Invited submission to the special issue for FASE 2004/05.
    @Article{sttt07JS, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tools for Secure Systems Development with {UML}}, journal = {International Journal on Software Tools for Technology Transfer (STTT)}, year = {2007}, volume = {9}, pages = {527--544}, number = {5--6}, note = {Invited submission to the special issue for FASE 2004/05}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/sttt07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s10009-007-0048-8:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • E. B. Fernandez, N. Yoshioka, H. Washizaki, J. Jürjens: Using security patterns to build secure systems. In: 1st International Workshop on Software Patterns and Quality (SPAQu'07), 2007.
    @InProceedings{uspbss07, author = {E. B.~Fernandez and N.~Yoshioka and H.~Washizaki and J.~{J}{\"u}{r}jens}, title = {Using security patterns to build secure systems}, booktitle = {1st International Workshop on Software Patterns and Quality (SPAQu'07)}, year = {2007}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • G. Georg, S. H. Houmb, R. B. France, S. Zschaler, D. C. Petriu, J. Jürjens: Critical Systems Development Using Modeling Languages: CSDUML 2006 Workshop Report. In: Models in Software Engineering, UML2006 Satellite Activities, Lecture Notes in Computer Science, vol. 4364, pp. 27-31, 2006.
    @InProceedings{csdusml06, author = {G.~Georg and S. H.~Houmb and R. B.~France and S.~Zschaler and D. C.~Petriu and J.~{J}{\"u}{r}jens}, title = {{Critical Systems Development Using Modeling Languages: CSDUML 2006 Workshop Report}}, booktitle = {Models in Software Engineering, UML2006 Satellite Activities}, year = {2006}, volume = {4364}, series = {Lecture Notes in Computer Science}, pages = {27--31}, crossref = {DBLP:conf/models/2006w}, DOI = {http://doi.org/10.1007/978-3-540-69489-2_4}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {editorials, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   dblp 
  • J. Jürjens: Model-based Security Engineering with UML: Introducing Security Aspects. In: Frank S. de Boer, Marcello M. Bonsangue, Susanne Graf, Willem P. de Roever (editors): Formal Methods for Components and Objects, 4th International Symposium, FMCO 2005, Amsterdam, The Netherlands, November 1-4, 2005, Revised Lectures, Springer, Lecture Notes in Computer Science, vol. 4111, pp. 64-87, 2005.
    @InProceedings{mbse06, author = {J.~{J}{\"u}{r}jens}, editor = {Frank S. de Boer and Marcello M. Bonsangue and Susanne Graf and Willem P. de Roever}, title = {Model-based Security Engineering with {UML:} Introducing Security Aspects}, booktitle = {Formal Methods for Components and Objects, 4th International Symposium, {FMCO} 2005, Amsterdam, The Netherlands, November 1-4, 2005, Revised Lectures}, pages = {64--87}, series = {Lecture Notes in Computer Science}, volume = {4111}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11804192\_4}, doi = {10.1007/11804192\_4}, crossref = {DBLP:conf/secrypt/2006}, file = {bibtex:http\://dblp.uni-trier.de/rec/bibtex/conf/secrypt/Jurjens06:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/secrypt06talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/secrypt06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {conferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://www.secrypt.org}, }
     BibTeX   DOI   URL   bibtex   slides   preprint   dblp 
  • J. Jürjens: Formal Development of Critical Systems with UML: Methods and Tools. In: International Symposium on Formal Methods for Components and Objects (FMCO 2005), 2005.
    @InProceedings{fdcsumt05, author = {J.~{J}{\"u}{r}jens}, title = {Formal Development of Critical Systems with {UML}: Methods and Tools}, booktitle = {International Symposium on Formal Methods for Components and Objects (FMCO 2005)}, year = {2005}, keywords = {tutorial, atScientificConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Fox, J. Jürjens: Introducing Security Aspects with Model Transformation. In: 12th Annual IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), Greenbelt, Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{isamt05, author = {J.~Fox and J.~{J}{\"u}{r}jens}, title = {Introducing Security Aspects with Model Transformation}, booktitle = {12th Annual IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005)}, year = {2005}, address = {Greenbelt}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {10.1109/ECBS.2005.48}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/IntroducingSecAspectsWithMT.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, M. Lehrhuber, G. Wimmel: Model-Based Design and Analysis of Permission-Based Security. In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), Shanghai (China), Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{mbdapbs05, author = {J.~{J}{\"u}{r}jens and M.~Lehrhuber and G.~Wimmel}, title = {Model-Based Design and Analysis of Permission-Based Security}, booktitle = {10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005)}, year = {2005}, address = {Shanghai (China)}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {10.1109/ICECCS.2005.61}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/iceccs05permissions.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Model-based Security Engineering with UML. In: A. Aldini, R. Gorrieri, F. Martinelli (editors): Lecture Notes in Computer Science pp. 42-77 Foundations of Security Analysis and Desing III: FOSAD 2004/2005 Tutorial Lectures, 2005
    @InCollection{fosad05, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering with {UML}}, booktitle = {Foundations of Security Analysis and Desing III: FOSAD 2004/2005 Tutorial Lectures}, year = {2005}, editor = {A. Aldini and R. Gorrieri and F. Martinelli}, volume = {3655}, series = {Lecture Notes in Computer Science}, pages = {42--77}, file = {slides (part 1/2):http\://rgse.uni-koblenz.de/jj/umlsec/fosad04handout1.pdf:URL;slides (part 2/2):http\://rgse.uni-koblenz.de/jj/umlsec/fosad04handout2.pdf:URL;book chapter:http\://rgse.uni-koblenz.de/jj/publications/papers/fosad04.pdf:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11554578_2:URL}, keywords = {graduateSchoolLectures, invitedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides (part 1/2)   slides (part 2/2)   book chapter   SpringerLink 
  • J. Jürjens: Security Modeling with UML 2005. Invited graduate course.
    @Misc{smuml05, author = {J.~{J}{\"u}{r}jens}, title = {Security Modeling with {UML}}, year = {2005}, note = {Invited graduate course}, file = {Slides:http\://rgse.uni-koblenz.de/jj/umlsec/madrid05.pdf:URL}, keywords = {graduateSchoolLectures, secureSoftwareEngineeringModelBasedSecurityEngineering}, organization = {Universidad Carlos III de Madrid}, }
     BibTeX   Slides 
  • J. Jürjens: Secure Systems Development with UML Published by Springer (2005) 300 pages. Chinese translation: Tsinghua University Press, Beijing 2009.
    @Book{UMLsecBook05, title = {Secure Systems Development with {UML}}, publisher = {Springer}, year = {2005}, author = {J.~{J}{\"u}{r}jens}, pages = {300}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/book/10.1007%2Fb137706:URL}, note = {Chinese translation: Tsinghua University Press, Beijing 2009}, keywords = {selectedPub,book,vorsecurestreams, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   dblp   SpringerLink 
  • J. Jürjens, P. Shabalin: Tool-support for Model-Driven Development of Security-Critical Systems with UML. In: Springer Model-driven Software Development -- Volume II of Research and Practice in Software Engineering, 2005
    @InCollection{tsmdd05, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tool-support for Model-Driven Development of Security-Critical Systems with {UML}}, booktitle = {Model-driven Software Development -- Volume II of Research and Practice in Software Engineering}, year = {2005}, publisher = {Springer}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.7379}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/mdsd05.pdf:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-28554-7_3:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   SpringerLink 
  • J. Jürjens: Automated Software Engineering of Critical Systems Development with UML. In: ASE 2004, Linz, 2004. Tutorial.
    @InProceedings{ase04, author = {J.~{J}{\"u}{r}jens}, title = {Automated Software Engineering of Critical Systems Development with {UML}}, booktitle = {ASE 2004}, year = {2004}, address = {Linz}, note = {Tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://ase2012.paluno.uni-due.de/}, }
     BibTeX   URL 
  • J. Jürjens, Lidiya Buda: Berechtigungsvergabe in SAP Systemen und ihre automatische Überprüfung. In: Datenschutz und Datensicherheit, 2004.
    @InProceedings{bsaps04, author = {J.~{J}{\"u}{r}jens and Lidiya Buda}, title = {Berechtigungsvergabe in SAP Systemen und ihre automatische {{\"U}}berpr{\"u}fung}, booktitle = {Datenschutz und Datensicherheit}, year = {2004}, keywords = {nonEnglishJournals, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Critical Systems Development with UML: Methods and Tools. In: European Conference on Object-Oriented Programming (ECOOP 2004), Oslo, Norway, ACM, 2004. Half-day tutorial.
    @InProceedings{csdumlmt04b, author = {J.~{J}{\"u}{r}jens}, title = {Critical Systems Development with {UML}: Methods and Tools}, booktitle = {European Conference on Object-Oriented Programming (ECOOP 2004)}, year = {2004}, address = {Oslo, Norway}, organization = {ACM}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens, E. B. Fernandez, R. B. France, B. Rumpe, C. Heitmeyer: Critical Systems Development Using Modeling Languages (CSDUML'04): Current Development and Future Challenges (Report on the Third International Workshop). In: UML Modeling Languages and Applications. UML 2004 Satellite Activities, Revised Selected Papers, Lecture Notes in Computer Science, vol. 3297, pp. 76-84, 2004.
    @InProceedings{csdusml04, author = {J.~{J}{\"u}{r}jens and E. B.~Fernandez and R. B.~France and B.~Rumpe and C.~Heitmeyer}, title = {Critical Systems Development Using Modeling Languages ({CSDUML}'04): Current Development and Future Challenges (Report on the Third International Workshop)}, booktitle = {UML Modeling Languages and Applications. UML 2004 Satellite Activities, Revised Selected Papers}, year = {2004}, volume = {3297}, pages = {76--84}, series = {Lecture Notes in Computer Science}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.176.2568}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-31797-5_9:URL}, keywords = {editorials, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   dblp   SpringerLink 
  • J. Jürjens: Componentware for Critical Systems. In: Journal of Object Technology, vol. 3, no. 4, pp. 47-50, 2004.
    @Article{cwcs04, author = {J.~{J}{\"u}{r}jens}, title = {Componentware for Critical Systems}, journal = {Journal of Object Technology}, year = {2004}, volume = {3}, pages = {47--50}, number = {4}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/jot04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {http://doi.org/10.5381/jot.2004.3.4.a3}, keywords = {invitedJournalPapers, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Developing High-Assurance Secure Systems with UML: An electronic purchase protocol. In: Eighth IEEE International Symposium on High Assurance Systems Engineering (HASE 2004), Tampa, FL (USA), pp. 231-240, Institute of Electrical and Electronics Engineers, 2004.
    @InProceedings{dhass04, author = {J.~{J}{\"u}{r}jens}, title = {Developing High-Assurance Secure Systems with {UML}: An electronic purchase protocol}, booktitle = {Eighth IEEE International Symposium on High Assurance Systems Engineering (HASE 2004)}, year = {2004}, pages = {231--240}, address = {Tampa, FL (USA)}, organization = {Institute of Electrical and Electronics Engineers}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/hase04.wav:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/hase04.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   preprint   dblp 
  • J. Jürjens: Developing Secure Web-based Applications with UML: Methods and Tools. In: Fourth International Conference on Web Engineering (ICWE'04), München (Germany), 2004. Tutorial.
    @InProceedings{dswba04, author = {J.~{J}{\"u}{r}jens}, title = {Developing Secure Web-based Applications with {UML}: Methods and Tools}, booktitle = {Fourth International Conference on Web Engineering (ICWE'04)}, year = {2004}, address = {M{\"u}nchen (Germany)}, note = {Tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://www.icwe2004.org/}, }
     BibTeX   URL 
  • J. Jürjens: Modell-basierte Sicherheit: Sicheres Konfigurations- und Änderungsmanagement. In: Systems 2004 (Software Development & Architecture Forum), München, 2004. Invited talk.
    @InProceedings{mbsska04, author = {J.~{J}{\"u}{r}jens}, title = {Modell-basierte Sicherheit: Sicheres Konfigurations- und {{\"A}}nderungsmanagement}, booktitle = {Systems 2004 (Software Development \& Architecture Forum)}, year = {2004}, address = {M{\"u}nchen}, note = {Invited talk}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/systems04.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/systems04.pdf:URL}, keywords = {conferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   slides 
  • J. Jürjens: Software Architectures for Safe and Secure Systems. In: 4th IEEE/IFIP Conference on Software Architecture (WICSA 2004), Oslo, Norway, Institute of Electrical and Electronics Engineers, 2004. Half-day tutorial.
    @InProceedings{sasss04, author = {J.~{J}{\"u}{r}jens}, title = {Software Architectures for Safe and Secure Systems}, booktitle = {4th IEEE/IFIP Conference on Software Architecture (WICSA 2004)}, year = {2004}, address = {Oslo, Norway}, organization = {Institute of Electrical and Electronics Engineers}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://wicsa4.cs.rug.nl/}, }
     BibTeX   URL 
  • J. Jürjens: Standards and Processes for Modelbased Engineering of Safety- and Security-Critical Systems. In: 23rd International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2004), Springer Verlag, Potsdam (Germany), Lecture Notes in Computer Science, 2004. Full-day tutorial.
    @InProceedings{spme04, author = {J.~{J}{\"u}{r}jens}, title = {Standards and Processes for Modelbased Engineering of Safety- and Security-Critical Systems}, booktitle = {23rd International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2004)}, year = {2004}, series = {Lecture Notes in Computer Science}, address = {Potsdam (Germany)}, publisher = {Springer Verlag}, note = {Full-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Secure Software Architecture Description using UML. In: Workshop on Software Architecture Description & UML (SADUML2004), Lisbon (Portugal), 2004. Invited talk.
    @InProceedings{ssad04, author = {J.~{J}{\"u}{r}jens}, title = {Secure Software Architecture Description using {UML}}, booktitle = {Workshop on Software Architecture Description \& UML (SADUML2004)}, year = {2004}, address = {Lisbon (Portugal)}, note = {Invited talk}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/saduml04.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides 
  • S. Höhn, J. Jürjens: Automated Checking of SAP Security Permissions. In: 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), Kluwer, Lausanne, Switzerland, pp. 13-30, IFIP, 2003.
    @InProceedings{acssp03, author = {S.~H{\"o}hn and J.~{J}{\"u}{r}jens}, title = {Automated Checking of {SAP} Security Permissions}, booktitle = {6th Working Conference on Integrity and Internal Control in Information Systems (IICIS)}, year = {2003}, volume = {140}, pages = {13--30}, address = {Lausanne, Switzerland}, organization = {IFIP}, publisher = {Kluwer}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/iicis03.pdf:URL;paper (ps.gz):http\://rgse.uni-koblenz.de/jj/publications/papers/iicis03.ps.gz:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/1-4020-7901-X_2:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   paper (pdf)   paper (ps.gz)   dblp   SpringerLink 
  • J. Jürjens: Algebraic State Machines: Concepts and Applications to Security. In: M. Broy, A. Zamulin, Manfred Broy, Alexandre V. Zamulin (editors): Andrei Ershov 5th International Conference ``Perspectives of System Informatics'' (PSI 2003), Springer Verlag, Novosibirsk (Russia), Lecture Notes in Computer Science, vol. 2890, pp. 338-343, 2003.
    @InProceedings{asm03, author = {J.~{J}{\"u}{r}jens}, title = {Algebraic State Machines: Concepts and Applications to Security}, booktitle = {Andrei Ershov 5th International Conference ``Perspectives of System Informatics'' (PSI 2003)}, year = {2003}, editor = {M. Broy and A. Zamulin and Manfred Broy and Alexandre V. Zamulin}, volume = {2890}, series = {Lecture Notes in Computer Science}, pages = {338--343}, address = {Novosibirsk (Russia)}, publisher = {Springer Verlag}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/psi03.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/psi03talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/psi03.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/psi03.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-39866-0_33:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Critical Systems Development with UML: Methods and Tools. In: 4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003), Lübeck, Germany, International Association for Computer and Information Science (ACIS), 2003. Half-day tutorial.
    @InProceedings{csdumlmt03, author = {J.~{J}{\"u}{r}jens}, title = {Critical Systems Development with {UML}: Methods and Tools}, booktitle = {4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003)}, year = {2003}, address = {L{\"u}beck, Germany}, organization = {International Association for Computer and Information Science (ACIS)}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://www.isp.uni-luebeck.de/snpd03/index.htm}, }
     BibTeX   URL 
  • J. Jürjens: Critical Systems Development with UML: Methods and Tools. In: International Conference on Circuits, Signals and Systems (CSS-2003), 2003. Half-day tutorial.
    @InProceedings{css03J, author = {J.~{J}{\"u}{r}jens}, title = {Critical Systems Development with {UML}: Methods and Tools}, booktitle = {International Conference on Circuits, Signals and Systems (CSS-2003)}, year = {2003}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens, P. Shabalin: Developing Critical Information Systems with UML: Concepts and Tool-support. In: M. Godlevsky, S. W.Liddle , H. C.Mayr (editors): 2nd International Conference on Information System Technology and its Applications (ISTA 2003), GI, Kharkiv, LNI, vol. 30, 2003. Half-day tutorial.
    @InProceedings{dcisuml03, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Developing Critical Information Systems with {UML}: Concepts and Tool-support}, booktitle = {2nd International Conference on Information System Technology and its Applications (ISTA 2003)}, year = {2003}, editor = {M. Godlevsky and {S.\,W.} Liddle and {H.\,C.} Mayr}, volume = {30}, series = {LNI}, address = {Kharkiv}, publisher = {GI}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://www.ifi.uni-klu.ac.at/Conferences/ISTA2003}, }
     BibTeX   URL 
  • J. Jürjens: Developing Security-Critical Distributed Systems with UML: Methods and Tools. In: 6th International Conference on Formal Methods for Open Object-based Distributed Systems, Paris (France), IFIP, 2003. Half-day tutorial.
    @InProceedings{dscds03, author = {J.~{J}{\"u}{r}jens}, title = {Developing Security-Critical Distributed Systems with {UML}: Methods and Tools}, booktitle = {6th International Conference on Formal Methods for Open Object-based Distributed Systems}, year = {2003}, address = {Paris (France)}, organization = {IFIP}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://fedconf.enst.fr/}, }
     BibTeX   URL 
  • J. Jürjens: Developing Secure Enterprise Applications with UML. In: Fourth Workshop on UML for Enterprise Applications, Burlingame, California, OMG, 2003. Half-day tutorial.
    @InProceedings{dseau03, author = {J.~{J}{\"u}{r}jens}, title = {Developing Secure Enterprise Applications with {UML}}, booktitle = {Fourth Workshop on UML for Enterprise Applications}, year = {2003}, address = {Burlingame, California}, organization = {OMG}, note = {Half-day tutorial}, keywords = {withIndustry, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens, T. Kuhn: Developing Secure and Mobile Web-based Applications with UML: Concepts and Tools. In: WWW/Internet 2003, Algarve (Portugal), 2003.
    @InProceedings{dsmwba03, author = {J.~{J}{\"u}{r}jens and T.~Kuhn}, title = {Developing Secure and Mobile Web-based Applications with {UML}: Concepts and Tools}, booktitle = {WWW/Internet 2003}, year = {2003}, address = {Algarve (Portugal)}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Developing Safety- and Security-critical Systems with UML. In: DARP workshop, Loughborough, 2003. Invited talk.
    @InProceedings{dsscs03, author = {J.~{J}{\"u}{r}jens}, title = {Developing Safety- and Security-critical Systems with {UML}}, booktitle = {DARP workshop}, year = {2003}, address = {Loughborough}, note = {Invited talk}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/darp03.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/darp03.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   slides 
  • J. Jürjens: Formal Development of Critical Systems with UML. In: IFIP International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2003), Berlin, IFIP, 2003. Half-day tutorial.
    @InProceedings{fdcsu03, author = {J.~{J}{\"u}{r}jens}, title = {Formal Development of Critical Systems with {UML}}, booktitle = {IFIP International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2003)}, year = {2003}, address = {Berlin}, organization = {IFIP}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Formal Development of Critical Systems with UML. In: ETAPS 2003 -- European joint conferences on Theory And Practice of Software 2003, Warsaw, Poland, 2003. Half-day tutorial.
    @InProceedings{fdcsuml03, author = {J.~{J}{\"u}{r}jens}, title = {Formal Development of Critical Systems with {UML}}, booktitle = {ETAPS 2003 -- European joint conferences on Theory And Practice of Software 2003}, year = {2003}, address = {Warsaw, Poland}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Formal Development of Critical Systems with UML: Methods and Tools. In: FM 2003 -- 12th International Formal Methods Europe Symposium, Pisa, Italy, 2003. Half-day tutorial.
    @InProceedings{fdcsumt03, author = {J.~{J}{\"u}{r}jens}, title = {Formal Development of Critical Systems with {UML}: Methods and Tools}, booktitle = {FM 2003 -- 12th International Formal Methods Europe Symposium}, year = {2003}, address = {Pisa, Italy}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, G. Wimmel, V. Lotz: Key Issues of a Formally Based Process Model for Security Engineering. In: Sixteenth International Conference "Software & Systems Engineering & their Applications", Paris, 2003.
    @InProceedings{kifbpmse03, author = {R.~Breu and K.~Burger and M.~Hafner and J.~{J}{\"u}{r}jens and G.~Popp and G.~Wimmel and V.~Lotz}, title = {Key Issues of a Formally Based Process Model for Security Engineering}, booktitle = {Sixteenth International Conference {"}Software \& Systems Engineering \& their Applications{"}}, year = {2003}, address = {Paris}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5457}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ICSSEA2003v6.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icssea03BBHJPWL.ps:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, address = {Paris}, }
     BibTeX   DOI   slides   preprint 
  • J. Grünbauer, H. Hollmann, J. Jürjens, G. Wimmel: Modelling and Verification of Layered Security Protocols: A Bank Application. In: Computer Safety, Reliability, and Security (SAFECOMP 2003), Springer Verlag, Edinburgh, Lecture Notes in Computer Science, vol. 2788, pp. 116-129, 2003.
    @InProceedings{mvlsp03, author = {J.~Gr{\"u}nbauer and H.~Hollmann and J.~{J}{\"u}{r}jens and G.~Wimmel}, title = {Modelling and Verification of Layered Security Protocols: A Bank Application}, booktitle = {Computer Safety, Reliability, and Security (SAFECOMP 2003)}, year = {2003}, volume = {2788}, series = {Lecture Notes in Computer Science}, pages = {116--129}, address = {Edinburgh}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.4724}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/safecomp03GHJWtalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/safecomp03GHJW.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/safecomp03GHJW.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-39878-3_10:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • G. Popp, J. Jürjens, G. Wimmel, R. Breu: Security-Critical System Development with Extended Use Cases. In: 10th Asia-Pacific Software Engineering Conference (APSEC 2003), Chiangmai (Thailand), pp. 478-487, Institute of Electrical and Electronics Engineers, 2003.
    @InProceedings{scsdeuc03, author = {G.~Popp and J.~{J}{\"u}{r}jens and G.~Wimmel and R.~Breu}, title = {Security-Critical System Development with Extended Use Cases}, booktitle = {10th Asia-Pacific Software Engineering Conference (APSEC 2003)}, year = {2003}, pages = {478--487}, address = {Chiangmai (Thailand)}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.9698}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/apsec03.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/apsec03.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens, T. Kuhn: Mobile Web-based Applications with UML: Concepts and Tools. In: International Conference WWW/Internet 2003, International Association for Development of the Information Society (IADIS), 2003. Half-day tutorial.
    @InProceedings{wwwinternet03J, author = {J.~{J}{\"u}{r}jens and T.~Kuhn}, title = {Mobile Web-based Applications with {UML}: Concepts and Tools}, booktitle = {International Conference WWW/Internet 2003}, year = {2003}, organization = {International Association for Development of the Information Society (IADIS)}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • E. B. Fernandez, J. Jürjens: A Holistic View of Secure Systems Development: Using Patterns and UML. In: 17th International Conference on Information Security (SEC 2002), Cairo, International Federation for Information Processing (IFIP), 2002. Half-day tutorial.
    @InProceedings{ahvssd02, author = {E. B.~Fernandez and J.~{J}{\"u}{r}jens}, title = {A Holistic View of Secure Systems Development: Using Patterns and {UML}}, booktitle = {17th International Conference on Information Security (SEC 2002)}, year = {2002}, address = {Cairo}, organization = {International Federation for Information Processing (IFIP)}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: A UML statecharts semantics with message-passing. In: G. B.Lamont , H. Haddad, G. Papadopoulos, B. Panda (editors): Proceedings of the 2002 Symposium of Applied Computing (SAC), ACM Press, Madrid, Spain, pp. 1009-1013, ACM, 2002. Proceedings of the 2002 ACM Symposium of Applied Computing.
    @InProceedings{auss02, author = {J.~{J}{\"u}{r}jens}, title = {A {UML} statecharts semantics with message-passing}, booktitle = {Proceedings of the 2002 Symposium of Applied Computing (SAC)}, year = {2002}, editor = {{G. B.} Lamont and H. Haddad and G. Papadopoulos and B. Panda}, pages = {1009--1013}, address = {Madrid, Spain}, organization = {ACM}, publisher = {ACM Press}, note = {Proceedings of the 2002 ACM Symposium of Applied Computing}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.3196}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/sac02.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2Talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, umlModelAnalysis, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   audio   slides   paper (pdf)   paper (ps)   dblp 
  • J. Jürjens, G. Popp, G. Wimmel: Towards Using Security Patterns in Model-based System Development. In: 7th European Conference on Pattern Languages of Programs (EuroPLoP 2002), Kloster Irsee, 2002. Security Focus Group.
    @InProceedings{europlop02J, author = {J.~{J}{\"u}{r}jens and G.~Popp and G.~Wimmel}, title = {Towards Using Security Patterns in Model-based System Development}, booktitle = {7th European Conference on Pattern Languages of Programs (EuroPLoP 2002)}, year = {2002}, address = {Kloster Irsee}, note = {Security Focus Group}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.8894}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/europlop02.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/europlop02.ps:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   paper (pdf)   paper (ps) 
  • J. Jürjens: Methodische Entwicklung sicherer CORBA-Anwendungen. In: P. Horster, Patrick Horster (editors): Enterprise Security, IT-Verlag, Sauerlach, Paderborn (Germany), GI-Fachgruppe 2.5.3 Verlässliche IT-Systeme et al., 2002.
    @InProceedings{mesca02, author = {J.~{J}{\"u}{r}jens}, title = {Methodische Entwicklung sicherer CORBA-Anwendungen}, booktitle = {Enterprise Security}, year = {2002}, editor = {P. Horster and Patrick Horster}, address = {Paderborn (Germany)}, organization = {GI-Fachgruppe 2.5.3 Verl{\"a}ssliche IT-Systeme et al.}, publisher = {IT-Verlag, Sauerlach}, file = {audio (MS Outlook):http\://rgse.uni-koblenz.de/jj/publications/audio/eps02.msg:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/eps02Talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/eps02.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/eps02.ps:URL}, ISBN = {3-9360-52-03-4}, keywords = {nonEnglish, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio (MS Outlook)   slides   paper (pdf)   paper (ps) 
  • J. Jürjens: Secure Systems Development with UML - Applications to Telemedicine. In: CORAS Public Workshop, Regensburg, 2002. International Conference on Telemedicine (ICT 2002). Invited talk.
    @InProceedings{smunl02, author = {J.~{J}{\"u}{r}jens}, title = {Secure Systems Development with {UML} -- Applications to Telemedicine}, booktitle = {CORAS Public Workshop}, year = {2002}, address = {Regensburg}, note = {International Conference on Telemedicine (ICT 2002). Invited talk}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/coras02.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/UMLsecTelemed.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   slides 
  • J. Jürjens: Using UMLsec and Goal-Trees for Secure Systems Development. In: G. B.Lamont , H. Haddad, G. Papadopoulos, B. Panda (editors): Proceedings of the 2002 Symposium of Applied Computing (SAC), ACM, Madrid, Spain, pp. 1026-1031, 2002. Proceedings of the 2002 ACM Symposium of Applied Computing.
    @InProceedings{uusgtssd02, author = {J.~{J}{\"u}{r}jens}, title = {Using {UMLsec} and Goal-Trees for Secure Systems Development}, booktitle = {Proceedings of the 2002 Symposium of Applied Computing (SAC)}, year = {2002}, editor = {{G. B.} Lamont and H. Haddad and G. Papadopoulos and B. Panda}, pages = {1026--1031}, address = {Madrid, Spain}, publisher = {ACM}, note = {Proceedings of the 2002 ACM Symposium of Applied Computing}, DOI = {10.1145/508791.508990}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/sac02ii.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sac02softTalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   audio   slides   paper (pdf)   paper (ps)   dblp 
  • J. Jürjens: Composability of Secrecy. In: V. Gorodetski, V. Skormin, L. Popyack (editors): International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2001), Springer Verlag, St. Petersburg (Russia), Lecture Notes in Computer Science, vol. 2052, pp. 28-38, 2001.
    @InProceedings{cs01, author = {J.~{J}{\"u}{r}jens}, title = {Composability of Secrecy}, booktitle = {International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2001)}, year = {2001}, editor = {V. Gorodetski and V. Skormin and L. Popyack}, volume = {2052}, series = {Lecture Notes in Computer Science}, pages = {28--38}, address = {St. Petersburg (Russia)}, publisher = {Springer Verlag}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/J01cSli.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/J01cWeb.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/J01cWeb.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45116-1_6:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, summary = {Gives notion of secrecy preserved under composition and refinement and results on modular verification}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Encapsulating Rules of Prudent Security Engineering. In: B. Christianson, B. Crispo, J. A.Malcolm , M. Roe (editors): International Workshop on Security Protocols, Springer Verlag, Cambridge, Lecture Notes in Computer Science, vol. 2467, pp. 95-101, 2001. 9th International Workshop. Transcript of discussion on pages 102--106.
    @InProceedings{erpse01, author = {J.~{J}{\"u}{r}jens}, title = {Encapsulating Rules of Prudent Security Engineering}, booktitle = {International Workshop on Security Protocols}, year = {2001}, editor = {B. Christianson and B. Crispo and {J. A.} Malcolm and M. Roe}, volume = {2467}, series = {Lecture Notes in Computer Science}, pages = {95--101}, address = {Cambridge}, publisher = {Springer Verlag}, note = {9th International Workshop. Transcript of discussion on pages 102--106}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/iwtalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/IWSecP01.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/IWSecP01.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45807-7_15:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Modelling audit security for smart-card payment schemes with UMLsec. In: 16th International Conference on Information Security (IFIPSEC''01), Kluwer, pp. 93-108, IFIP, 2001.
    @InProceedings{ifipsec01J, author = {J.~{J}{\"u}{r}jens}, title = {Modelling audit security for smart-card payment schemes with {UMLsec}}, booktitle = {16th International Conference on Information Security (IFIPSEC''01)}, year = {2001}, pages = {93--108}, organization = {IFIP}, publisher = {Kluwer}, file = {audio 3/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ii.wav:URL;audio 2/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ib.wav:URL;audio 1/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ia.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/iftalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/ifipsec01final.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/ifipsec01final.ps:URL;SpringerLink:http://link.springer.com/chapter/10.1007/0-306-46998-7_7:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   audio 3/3   audio 2/3   audio 1/3   slides   paper (pdf)   paper (ps)   SpringerLink 
  • J. Jürjens: Secure Java Development with UML. In: I-NetSec 01 – First International IFIP TC-11 WG 11.4 Working Conference on Network Security, Kluwer, Leuven (Belgium), 2001.
    @InProceedings{sjdu01, author = {J.~{J}{\"u}{r}jens}, title = {Secure Java Development with {UML}}, booktitle = {I-NetSec 01 – First International IFIP TC-11 WG 11.4 Working Conference on Network Security}, year = {2001}, address = {Leuven (Belgium)}, publisher = {Kluwer}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/inetsec01talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/inetsec01.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/inetsec01.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/0-306-46958-8_8:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens, G. Wimmel: Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. In: First IFIP Conference on e-Commerce, e-Business, and e-Government (I3E), Kluwer, pp. 489-505, 2001.
    @InProceedings{i3eJW01, author = {J.~{J}{\"u}{r}jens and G. Wimmel}, title = {Security Modelling for Electronic Commerce: The {Common Electronic Purse Specifications}}, booktitle = {First IFIP Conference on e-Commerce, e-Business, and e-Government (I3E)}, year = {2001}, pages = {489--505}, publisher = {Kluwer}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/i3esli.ps:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/JW01_I3E.ps:URL;SpringerLink:http://link.springer.com/chapter/10.1007/0-306-47009-8_36:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   slides   preprint   SpringerLink 
  • J. Jürjens: Transformations for Introducing Patterns - A Secure Systems Case Study. In: Workshop on Transformations in UML (WTUML, ETAPS 2001 Satellite Event), Genova, 2001.
    @InProceedings{tip01, author = {J.~{J}{\"u}{r}jens}, title = {Transformations for Introducing Patterns -- A Secure Systems Case Study}, booktitle = {Workshop on Transformations in UML (WTUML, ETAPS 2001 Satellite Event)}, year = {2001}, address = {Genova}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.1124}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/wtuml01.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/wtuml01.ps:URL}, keywords = {workshop,industrialConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   paper (pdf)   paper (ps)