Prof. Dr. Jan Jürjens - Internationale Konferenzen

Disclaimer

Sichere Softwareentwicklung

Allgemeines

  • J. Jürjens, B. Nuseibeh: Software Engineering for Secure Systems. In: 33rd International Conference on Software Engineering (ICSE 2011), 2011. Technical Briefing. ACM 2011.
    @InProceedings{icse11JN, author = {J.~{J}{\"u}{r}jens and B.~Nuseibeh}, title = {Software Engineering for Secure Systems}, booktitle = {33rd International Conference on Software Engineering (ICSE 2011)}, year = {2011}, note = {Technical Briefing. ACM 2011.}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/icse11brief_talk.pdf:URL}, keywords = {overviewPub,internationalConferences, secureSoftwareEngineeringGeneral}, }
     BibTeX   slides 

Grundlagen der Sicherheit

  • M. Abadi, J. Jürjens: Formal Eavesdropping and its Computational Interpretation. In: N. Kobayashi, B. C.Pierce (editors): Theoretical Aspects of Computer Software (4th International Symposium, TACS 2001), Springer Verlag, Lecture Notes in Computer Science, vol. 2215, pp. 82-94, 2001.
    @InProceedings{feci01, author = {M.~Abadi and J.~{J}{\"u}{r}jens}, title = {Formal Eavesdropping and its Computational Interpretation}, booktitle = {Theoretical Aspects of Computer Software (4th International Symposium, TACS 2001)}, year = {2001}, editor = {N. Kobayashi and {B. C.} Pierce}, volume = {2215}, series = {Lecture Notes in Computer Science}, pages = {82--94}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.1076}, file = {extended version:http\://rgse.uni-koblenz.de/jj/publications/papers/lambdaweb.pdf:URL;(older) slides:http\://rgse.uni-koblenz.de/jj/publications/papers/dagstuhl.ps:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/lambda.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/lambda.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45500-0_4:URL}, keywords = {internationalConferences, secureSoftwareEngineeringFoundationsOfSecurity}, }
     BibTeX   DOI   extended version   (older) slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Secrecy-preserving Refinement. In: J. Fiadeiro, P. Zave (editors): International Symposium on Formal Methods Europe (FME), Springer Verlag, Berlin Heidelberg New York, Lecture Notes in Computer Science, vol. 2021, pp. 135-152, 2001.
    @InProceedings{spr01, author = {J.~{J}{\"u}{r}jens}, title = {Secrecy-preserving Refinement}, booktitle = {International Symposium on Formal Methods Europe (FME)}, year = {2001}, editor = {J. Fiadeiro and P. Zave}, volume = {2021}, series = {Lecture Notes in Computer Science}, pages = {135--152}, address = {Berlin Heidelberg New York}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.11}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/J00kSli.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/J00kWeb.ps:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/J00kWeb.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45251-6_8:URL}, keywords = {internationalConferences, secureSoftwareEngineeringFoundationsOfSecurity}, summary = {Presents secrecy property preserved under refinement; uncovers flaw in variant of security protocol TLS.}, }
     BibTeX   DOI   slides   paper (ps)   paper (pdf)   dblp   SpringerLink 
  • J. Jürjens: Secure Information Flow for Concurrent Processes. In: 11th International Conference on Concurrency Theory (CONCUR 2000), Springer Verlag, Lecture Notes in Computer Science, vol. 1877, pp. 395-409, 2000.
    @InProceedings{concur00J, author = {J.~{J}{\"u}{r}jens}, title = {Secure Information Flow for Concurrent Processes}, booktitle = {11th International Conference on Concurrency Theory (CONCUR 2000)}, year = {2000}, volume = {1877}, series = {Lecture Notes in Computer Science}, pages = {395--409}, publisher = {Springer Verlag}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/J00eSli.ps:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/J00eWeb.pdf:URL;paper (ps.gz):http\://rgse.uni-koblenz.de/jj/publications/papers/J00eWeb.ps.gz:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-44618-4_29:URL}, keywords = {internationalConferences, secureSoftwareEngineeringFoundationsOfSecurity}, }
     BibTeX   slides   paper (pdf)   paper (ps.gz)   dblp   SpringerLink 

Code-Sicherheits-Analyse

  • M. Aizatulin, A. D. Gordon, J. Jürjens: Computational Verification of C Protocol Implementations by Symbolic Execution. In: 19th ACM Conference on Computer and Communications Security (CCS 2012), ACM, pp. 712-723, 2012.
    @InProceedings{ccs12AGJ, author = {M.~Aizatulin and A. D.~Gordon and J.~J{\"u}rjens}, title = {Computational Verification of C Protocol Implementations by Symbolic Execution}, booktitle = {19th ACM Conference on Computer and Communications Security (CCS 2012)}, year = {2012}, pages = {712--723}, DOI = {http://doi.acm.org/10.1145/2382196.2382271}, publisher = {ACM}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/ccs12AGJslides.pdf:URL;preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ccs12AGJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {selectedPub,internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis,vorsecurestreams}, }
     BibTeX   DOI   slides   preprint   dblp 
  • M. Aizatulin, A. D. Gordon, J. Jürjens: Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution. In: 18th ACM Conference on Computer and Communications Security (CCS 2011), pp. 331-340, 2011.
    @InProceedings{ccs11AGJ, author = {M.~Aizatulin and A. D.~Gordon and J.~{J}{\"u}{r}jens}, title = {Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution}, booktitle = {18th ACM Conference on Computer and Communications Security (CCS 2011)}, year = {2011}, pages = {331--340}, crossref = {DBLP:conf/ccs/2011}, DOI = {http://doi.acm.org/10.1145/2046707.2046745}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ccs11AGJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/ccs11AGJslides.pdf:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis,vorsecurestreams}, }
     BibTeX   DOI   preprint   dblp   slides 
  • M. Aizatulin, F. Dupressoir, A. D. Gordon, J. Jürjens: Verifying Cryptographic Code in C: Some Experience and the Csec Challenge. In: 8th International Workshop on Formal Aspects of Security & Trust (FAST2011), pp. 1-20, 2011.
    @Conference{fast11ADGJ, author = {M.~Aizatulin and F.~Dupressoir and A. D.~Gordon and J.~{J}{\"u}{r}jens}, title = {Verifying Cryptographic Code in C: Some Experience and the Csec Challenge}, booktitle = {8th International Workshop on Formal Aspects of Security \& Trust (FAST2011)}, year = {2011}, pages = {1--20}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/fast11ADGJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-29420-4_1:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis, invitedWorkshop}, }
     BibTeX   preprint   dblp   SpringerLink 
  • F. Dupressoir, A. D. Gordon, J. Jürjens, D. A. Naumann: Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. In: 24th IEEE Computer Security Foundations Symposium (CSF), pp. 3-17, 2011.
    @InProceedings{csf11DGJN, author = {F.~Dupressoir and A. D.~Gordon and J.~{J}{\"u}{r}jens and D. A.~Naumann}, title = {Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols}, booktitle = {24th IEEE Computer Security Foundations Symposium (CSF)}, year = {2011}, pages = {3--17}, DOI = {http://doi.ieeecomputersociety.org/10.1109/CSF.2011.8}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/csf11DGJN.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/csf11DGJNtalk.pdf:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis,vorsecurestreams}, URL = {http://research.microsoft.com/apps/pubs/?id=147704}, }
     BibTeX   DOI   URL   preprint   dblp   slides 
  • J. Jürjens, Yijun Yu, A. Bauer: Tools for Traceable Security Verification. In: BCS Visions of Computer Science Conference, pp. 367-390, 2008.
    @InProceedings{ttsc08, author = {J.~{J}{\"u}{r}jens and Yijun Yu and A.~Bauer}, title = {Tools for Traceable Security Verification}, booktitle = {BCS Visions of Computer Science Conference}, year = {2008}, pages = {367--390}, crossref = {DBLP:conf/bcs/2008}, DOI = {http://www.bcs.org/server.php?show=ConWebDoc.22980}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/bcs08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/bcs08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens: Security Analysis of Crypto-based Java Programs using Automated Theorem Provers. In: S. Easterbrook, S. Uchitel (editors): 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), ACM, pp. 167-176, 2006.
    @InProceedings{sacbjp06, author = {J.~{J}{\"u}{r}jens}, title = {Security Analysis of Crypto-based Java Programs using Automated Theorem Provers}, booktitle = {21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006)}, year = {2006}, editor = {S.~Easterbrook and S.~Uchitel}, pages = {167--176}, publisher = {ACM}, DOI = {http://doi.org/10.1109/ASE.2006.60}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ase06talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ase06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens, M. Yampolskiy: Code security analysis with assertions. In: 20th International Conference on Automated Software Engineering (ASE 2005), IEEE/ACM, pp. 392-395, 2005.
    @InProceedings{ase05, author = {J.~{J}{\"u}{r}jens and M.~Yampolskiy}, title = {Code security analysis with assertions}, booktitle = {20th International Conference on Automated Software Engineering (ASE 2005)}, year = {2005}, pages = {392--395}, publisher = {IEEE/ACM}, DOI = {http://doi.acm.org/10.1145/1101908.1101978}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ase05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. In: 21st Annual Computer Security Applications Conference (ACSAC 2005), pp. 138-149, Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{csabas05, author = {J.~{J}{\"u}{r}jens}, title = {Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers}, booktitle = {21st Annual Computer Security Applications Conference (ACSAC 2005)}, year = {2005}, pages = {138--149}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {http://doi.org/10.1109/CSAC.2005.15}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/acsac05talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/acsac05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens: Verification of Low-level Crypto-Protocol Implementations Using Automated Theorem Proving. In: 3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005), pp. 89-98, Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{memocode05J, author = {J.~{J}{\"u}{r}jens}, title = {Verification of Low-level Crypto-Protocol Implementations Using Automated Theorem Proving}, booktitle = {3rd ACM \& IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005)}, year = {2005}, pages = {89--98}, organization = {Institute of Electrical and Electronics Engineers}, alt_note = {Technical report with additional material accessible at \URL{http://www4.in.tum.de/$\tilde{\ }$juerjens/pkcs11results}}, DOI = {http://doi.org/10.1109/MEMCOD.2005.1487898}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/memocode05talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/memocode05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens: Understanding Security Goals Provided by Crypto-Protocol Implementations. In: 21st International Conference on Software Maintenance (ICSM 2005), pp. 643-646, Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{usgpcpi05, author = {J.~{J}{\"u}{r}jens}, title = {Understanding Security Goals Provided by Crypto-Protocol Implementations}, booktitle = {21st International Conference on Software Maintenance (ICSM 2005)}, year = {2005}, pages = {643--646}, organization = {Institute of Electrical and Electronics Engineers}, alt_note = {Technical report with additional material accessible at \URL{http://www4.in.tum.de/$\tilde{\ }$juerjens/opensslresults}}, DOI = {http://doi.org/10.1109/ICSM.2005.97}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icsm05talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsm05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 

Industrielle Anwendungen

  • J. Lloyd, J. Jürjens: Security Analysis of a Biometric Authentication System using UMLsec and JML. In: Model Driven Engineering Languages and Systems, 12th International Conference, MODELS 2009, Denver, CO, USA, October 4-9, 2009. Proceedings, Springer, Lecture Notes in Computer Science, vol. 5795, pp. 77-91, 2009.
    @InProceedings{sabas09, author = {J.~Lloyd and J.~{J}{\"u}{r}jens}, title = {Security Analysis of a Biometric Authentication System using {UMLsec} and {JML}}, booktitle = {Model Driven Engineering Languages and Systems, 12th International Conference, {MODELS} 2009, Denver, CO, USA, October 4-9, 2009. Proceedings}, year = {2009}, volume = {5795}, series = {Lecture Notes in Computer Science}, pages = {77--91}, publisher = {Springer}, crossref = {DBLP:conf/models/2009}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/models09.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-04425-0_7:URL}, keywords = {internationalConferences, secureSoftwareEngineeringIndustrialApplications}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_9}, doi = {10.1007/978-3-8348-9788-6\_9}, }
     BibTeX   DOI   preprint   dblp   SpringerLink 
  • J. Jürjens, J. Schreck, P. Bartmann: Model-based Security Analysis for Mobile Communications. In: 30th Intern. Conference on Software Engineering (ICSE 2008), pp. 683-692, ACM, 2008.
    @InProceedings{mbsamc08, author = {J.~{J}{\"u}{r}jens and J.~Schreck and P.~Bartmann}, title = {Model-based Security Analysis for Mobile Communications}, booktitle = {30th Intern.\ Conference on Software Engineering (ICSE 2008)}, year = {2008}, pages = {683--692}, organization = {ACM}, crossref = {DBLP:conf/icse/2008}, DOI = {http://doi.org/10.1145/1368088.1368186}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse08teletalk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsetele08-jurjens.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   slides   preprint   dblp 
  • B. Best, J. Jürjens, B. Nuseibeh: Model-based Security Engineering of Distributed Information Systems using UMLsec. In: 29th International Conference on Software Engineering (ICSE 2007), pp. 581-590, ACM, 2007.
    @InProceedings{mbsedis07, author = {B.~Best and J.~{J}{\"u}{r}jens and B.~Nuseibeh}, title = {Model-based Security Engineering of Distributed Information Systems using {UMLsec}}, booktitle = {29th International Conference on Software Engineering (ICSE 2007)}, year = {2007}, pages = {581--590}, organization = {ACM}, crossref = {DBLP:conf/icse/2007}, DOI = {http://doi.ieeecomputersociety.org/10.1109/ICSE.2007.55}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse07talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icse07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens: Model-Based Security Engineering for Real (Industry Day Invited Paper). In: 14th International Symposium on Formal Methods (FM 2006), Springer Verlag, Lecture Notes in Computer Science, vol. 4085, pp. 600-606, 2006. Industry Day Invited Paper.
    @InProceedings{mbser06, author = {J.~{J}{\"u}{r}jens}, title = {Model-Based Security Engineering for Real (Industry Day Invited Paper)}, booktitle = {14th International Symposium on Formal Methods (FM 2006)}, year = {2006}, volume = {4085}, series = {Lecture Notes in Computer Science}, pages = {600--606}, publisher = {Springer Verlag}, note = {Industry Day Invited Paper}, crossref = {DBLP:conf/fm/2006}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fm06talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fm06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11813040_42:URL}, keywords = {conferences, internationalConferences, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   slides   preprint   dblp   SpringerLink 

Softwareevolution

  • C. Apfelbeck, M. Fritz, J. Jürjens, J. Zweihoff: Preserving Validity of Batch-job Nets under Change at Runtime. In: 39th Annual IEEE Computer Software and Applications Conference (COMPSAC 2015), IEEE, 2015. 10 pp.
    @InProceedings{compsac15A, author = {C.~Apfelbeck and M.~Fritz and J.~{J}{\"u}{r}jens and J.~Zweihoff}, title = {Preserving Validity of Batch-job Nets under Change at Runtime}, booktitle = {39th Annual IEEE Computer Software and Applications Conference (COMPSAC 2015)}, OPTpages = {}, note = {10 pp.}, year = {2015}, organization = {IEEE}, keywords = {internationalConferences, softwareEvolution, secvolution}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/compsac15A.pdf:URL}, }
     BibTeX   preprint 
  • J. Bürger, S. Gärtner, T. Ruhroth, J. Zweihoff, J. Jürjens, K. Schneider: Restoring Security of Long-Living Systems by Co-Evolution. In: 39th Annual IEEE Computer Software and Applications Conference (COMPSAC 2015), IEEE, 2015.
    @InProceedings{compsac15B, author = {J.~B{\"u}rger and S.~G{\"a}rtner and T.~Ruhroth and J.~Zweihoff and J.~{J}{\"u}{r}jens and K.~Schneider}, title = {Restoring Security of Long-Living Systems by Co-Evolution}, booktitle = {39th Annual IEEE Computer Software and Applications Conference (COMPSAC 2015)}, OPTpages = {}, year = {2015}, organization = {IEEE}, keywords = {internationalConferences, softwareEvolution, secvolution}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/compsac15B.pdf:URL}, }
     BibTeX   preprint 
  • R. Heinrich, S. Gärtner, T.-M. Hesse, T. Ruhroth, R. Reussner, B. Paech, K. Schneider, J. Jürjens: A Platform for Empirical Research on Information System Evolution. In: 27th International Conference on Software Engineering and Knowledge Engineering (SEKE 2015), IEEE, 2015. Regular paper.
    @InProceedings{seke15HGH, author = {R.~Heinrich and S.~G{\"a}rtner and T.-M.~Hesse and T.~Ruhroth and R.~Reussner and B.~Paech and K.~Schneider and J.~{J}{\"u}{r}jens}, title = {A Platform for Empirical Research on Information System Evolution}, booktitle = {27th International Conference on Software Engineering and Knowledge Engineering (SEKE 2015)}, OPTpages = {}, note = {Regular paper}, year = {2015}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, organization = {IEEE}, keywords = {internationalConferences, softwareEvolution}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/seke15HGH:URL}, }
     BibTeX   preprint 
  • T. Ruhroth, S. Gärtner, J. Bürger, J. Jürjens, K. Schneider: Towards Adaptation and Evolution of Domain-specific Knowledge for Maintaining Secure Systems. In: 15th International Conference of Product Focused Software Development and Process Improvement (Profes'14), Springer-Verlag, LNCS, vol. 8892, pp. 239-253, 2014.
    @InProceedings{profes14, author = {T.~Ruhroth and S.~G{\"a}rtner and J.~B{\"u}rger and J.~J{\"u}rjens and K.~Schneider}, title = {Towards Adaptation and Evolution of Domain-specific Knowledge for Maintaining Secure Systems}, booktitle = {15th International Conference of Product Focused Software Development and Process Improvement (Profes'14)}, pages = {239--253}, year = {2014}, volume = {8892}, series = {LNCS}, publisher = {Springer-Verlag}, DOI = {10.1007/978-3-319-13835-0_17}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/profes14.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-319-13835-0_17:URL}, keywords = {internationalConferences, softwareEvolution, secvolution}, }
     BibTeX   DOI   preprint   dblp   SpringerLink 
  • T. Ruhroth, J. Jürjens: Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec. In: International Symposium on High Assurance Systems Engineering (HASE), IEEE, pp. 177-184, 2012.
    @InProceedings{hase12RJ, author = {T.~Ruhroth and J.~{J}{\"u}{r}jens}, title = {Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with {UMLsec}}, booktitle = {International Symposium on High Assurance Systems Engineering (HASE)}, year = {2012}, pages = {177--184}, publisher = {IEEE}, DOI = {http://doi.ieeecomputersociety.org/10.1109/HASE.2012.35}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/hase12RJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, softwareEvolution, secvolution}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Automated Security Hardening for Evolving UML Models. In: 33rd International Conference on Software Engineering (ICSE 2011), ACM, 2011.
    @InProceedings{icse11J, author = {J.~{J}{\"u}{r}jens}, title = {Automated Security Hardening for Evolving {UML} Models}, booktitle = {33rd International Conference on Software Engineering (ICSE 2011)}, year = {2011}, publisher = {ACM}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, softwareEvolution}, }
     BibTeX   dblp 
  • J. Jürjens, Loïc Marchal, Martín Ochoa, Holger Schmidt: Incremental Security Verification for Evolving UMLsec models. In: Seventh European Conference on Modelling Foundations and Applications (ECMFA 2011), Springer, Lecture Notes in Computer Science, vol. 6698, pp. 52-68, 2011.
    @InProceedings{ecmfa11JMOS, author = {J.~{J}{\"u}{r}jens and Lo{\"i}c Marchal and Mart{\'i}n Ochoa and Holger Schmidt}, title = {Incremental Security Verification for Evolving {UMLsec} models}, booktitle = {Seventh European Conference on Modelling Foundations and Applications (ECMFA 2011)}, year = {2011}, series = {Lecture Notes in Computer Science}, volume = {6698}, publisher = {Springer}, pages = {52--68}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ecmfa11JMOS.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-21470-7_5:URL}, keywords = {internationalConferences, softwareEvolution}, }
     BibTeX   preprint   dblp   SpringerLink 
  • Yijun Yu, J. Jürjens, J. Mylopoulos: Traceability for the Maintenance of Secure Software. In: 24th International Conference on Software Maintenance (ICSM), pp. 297-306, IEEE, 2008.
    @InProceedings{icsm08YJM, author = {Yijun Yu and J.~{J}{\"u}{r}jens and J.~Mylopoulos}, title = {Traceability for the Maintenance of Secure Software}, booktitle = {24th International Conference on Software Maintenance (ICSM)}, year = {2008}, pages = {297--306}, organization = {IEEE}, DOI = {http://doi.org/10.1109/ICSM.2008.4658078}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsm08.pdf:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/yu08icsm-v4.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, softwareEvolution}, }
     BibTeX   DOI   preprint   slides   dblp 

Automatisierte formale Sicherheitsanalyse

  • M. Ochoa, J. Jürjens, J. Cuellar: Non-interference on UML State-charts. In: 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), Springer, Lecture Notes in Computer Science, vol. 7304, pp. 219-235, 2012.
    @InProceedings{tools12OJC, author = {M.~Ochoa and J.~{J}{\"u}{r}jens and J.~Cuellar}, title = {Non-interference on {UML} State-charts}, booktitle = {50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012)}, year = {2012}, series = {Lecture Notes in Computer Science}, pages = {219--235}, volume = {7304}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/tools12OJC.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-30561-0_16:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • M. Ochoa, J. Jürjens, D. Warzecha: A Sound Decision Procedure for the Compositionality of Secrecy. In: 4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012), Springer, Lecture Notes in Computer Science, vol. 7159, pp. 97-105, 2012.
    @InProceedings{essos12OJW, author = {M.~Ochoa and J.~{J}{\"u}{r}jens and D.~Warzecha}, title = {A Sound Decision Procedure for the Compositionality of Secrecy}, booktitle = {4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012)}, year = {2012}, series = {Lecture Notes in Computer Science}, pages = {97--105}, volume = {7159}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/essos12OJW.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-28166-2_10:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • L. Montrieux, J. Jürjens, C. B. Haley, Yijun Yu, P.-Y. Schobbens, H. Toussaint: Tool Support for Code Generation from a UMLsec Property. In: 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
    @InProceedings{tscg10, author = {L.~Montrieux and J.~{J}{\"u}{r}jens and C. B.~Haley and Yijun Yu and P.-Y.~Schobbens and H.~Toussaint}, title = {Tool Support for Code Generation from a {UMLsec} Property}, booktitle = {25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10)}, year = {2010}, DOI = {http://doi.acm.org/10.1145/1858996.1859074}, file = {preprint:http://oro.open.ac.uk/22231/1:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, T. Weber: Finite Models in FOL-based Crypto-Protocol Verification. In: ARSPA-WITS 2009, Springer Verlag, Lecture Notes in Computer Science, vol. 5511, pp. 155-172, 2009.
    @InProceedings{fmfol09, author = {J.~{J}{\"u}{r}jens and T.~Weber}, title = {Finite Models in FOL-based Crypto-Protocol Verification}, booktitle = {ARSPA-WITS 2009}, year = {2009}, series = {Lecture Notes in Computer Science}, pages = {155--172}, volume = {5511}, publisher = {Springer Verlag}, crossref = {DBLP:conf/ifip1-7/2009wits}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/wits09.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-03459-6_11:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens, J. Schreck, Yijun Yu: Automated Analysis of Permission-Based Security using UMLsec. In: Fundamental Approaches to Software Engineering (FASE), Springer Verlag, Lecture Notes in Computer Science, vol. 4961, pp. 292-295, 2008.
    @InProceedings{fase08JS, author = {J.~{J}{\"u}{r}jens and J.~Schreck and Yijun Yu}, title = {Automated Analysis of Permission-Based Security using {UMLsec}}, booktitle = {Fundamental Approaches to Software Engineering (FASE)}, year = {2008}, series = {Lecture Notes in Computer Science}, pages = {292--295}, volume = {4961}, publisher = {Springer Verlag}, crossref = {DBLP:conf/fase/2008}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fase08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fase08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-78743-3_21:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   slides   preprint   dblp   SpringerLink 
  • S. Höhn, J. Jürjens: Rubacon: Automated Support for Model-based Compliance Engineering. In: International Conference on Software Engineering (ICSE), pp. 875-878, ACM, 2008.
    @InProceedings{icse08HJ, author = {S.~H{\"o}hn and J.~{J}{\"u}{r}jens}, title = {Rubacon: Automated Support for Model-based Compliance Engineering}, booktitle = {International Conference on Software Engineering (ICSE)}, year = {2008}, pages = {875--878}, organization = {ACM}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse08tooltalk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsede57-hohn.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis, secureSoftwareEngineeringCompliance}, }
     BibTeX   slides   preprint   dblp 
  • Yijun Yu, J. Jürjens, J. Schreck: Tools for Traceability in Secure Software Development. In: 23nd International Conference on Automated Software Engineering (ASE 2008), 2008.
    @InProceedings{ttssd08, author = {Yijun Yu and J.~{J}{\"u}{r}jens and J.~Schreck}, title = {Tools for Traceability in Secure Software Development}, booktitle = {23nd International Conference on Automated Software Engineering (ASE 2008)}, year = {2008}, crossref = {DBLP:conf/kbse/2008}, DOI = {http://doi.org/10.1109/ASE.2008.92}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ase08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, Yijun Yu: Tools for Model-based Security Engineering: Models vs. Code. In: 22nd International Conference on Automated Software Engineering (ASE), Automated Software Engineering (ASE), Institute of Electrical and Electronics Engineers/ACM, 2007.
    @InProceedings{tmbsemvc07, author = {J.~{J}{\"u}{r}jens and Yijun Yu}, title = {Tools for Model-based Security Engineering: Models vs. Code}, booktitle = {22nd International Conference on Automated Software Engineering (ASE)}, year = {2007}, series = {Automated Software Engineering (ASE)}, organization = {Institute of Electrical and Electronics Engineers/ACM}, crossref = {DBLP:conf/kbse/2007}, DOI = {http://doi.org/10.1145/1321631.1321736}, file = {preprint:http://mcs.open.ac.uk/yy66/paper/jurjens07ase.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, J. Fox: A Framework for Analyzing Composition of Security Aspects. In: Methods for Modelling Software Systems (MMOSS), 27.08. - 01.09.2006, ICSE, ACM, 2006.
    @InProceedings{tmbse06, author = {J.~{J}{\"u}{r}jens and J.~Fox}, title = {A Framework for Analyzing Composition of Security Aspects}, booktitle = {Methods for Modelling Software Systems (MMOSS), 27.08. - 01.09.2006}, year = {2006}, series = {ICSE}, organization = {ACM}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icse06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp 
  • J. Jürjens, P. Shabalin: Tools for Secure Systems Development with UML: Security Analysis with ATPs. In: FASE 2005, Springer Verlag, Edinburgh, Lecture Notes in Computer Science, vol. 3442, pp. 305-309, 2005.
    @InProceedings{fase05JS, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tools for Secure Systems Development with {UML}: Security Analysis with {ATPs}}, booktitle = {FASE 2005}, year = {2005}, series = {Lecture Notes in Computer Science}, address = {Edinburgh}, pages = {305--309}, volume = {3442}, publisher = {Springer Verlag}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fase05talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fase05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-31984-9_23:URL}, keywords = {toolDescription, internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   slides   preprint   dblp   SpringerLink 
  • J. Jürjens: Sound Methods and Effective Tools for Model-based Security Engineering with UML. In: 27th International Conference on Software Engineering (ICSE 2005), pp. 322-331, ACM, 2005.
    @InProceedings{smetmbse05, author = {J.~{J}{\"u}{r}jens}, title = {Sound Methods and Effective Tools for Model-based Security Engineering with {UML}}, booktitle = {27th International Conference on Software Engineering (ICSE 2005)}, year = {2005}, pages = {322--331}, organization = {ACM}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.4820}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse05_ppt.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icse05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {toolDescription, internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens, P. Shabalin: Automated Verification of UMLsec Models for Security Requirements. In: \guillemotleftUML\guillemotright 2004 - The Unified Modelling Language: Modelling Languages and Applications. 7th International Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings, Springer Verlag, Lisabon, Lecture Notes in Computer Science, vol. 3273, pp. 365-379, 2004.
    @InProceedings{avus04, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Automated Verification of {UMLsec} Models for Security Requirements}, booktitle = {{\guillemotleft}UML{\guillemotright} 2004 - The Unified Modelling Language: Modelling Languages and Applications. 7th International Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings}, year = {2004}, pages = {365--379}, series = {Lecture Notes in Computer Science}, volume = {3273}, address = {Lisabon}, publisher = {Springer Verlag}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/uml04talk.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/uml04talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/uml04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-30187-5_26:URL}, keywords = {toolDescription, internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   audio   slides   preprint   dblp   SpringerLink 

Security Requirements Engineering

  • S. Gärtner, T. Ruhroth, J. Bürger, K. Schneider, J. Jürjens: Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge. In: 22nd IEEE International Requirements Engineering Conference, pp. 103-112, IEEE, 2014.
    @InProceedings{re14GRBSJ, author = {S.~G{\"a}rtner and T.~Ruhroth and J.~B{\"u}rger and K.~Schneider and J.~J{\"u}rjens}, title = {Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge}, booktitle = {22nd IEEE International Requirements Engineering Conference}, pages = {103--112}, year = {2014}, organization = {IEEE}, DOI = {10.1109/RE.2014.6912252}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/re14grbsj.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/Presentation-RE-2014-Gaertner.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering, secvolution}, }
     BibTeX   DOI   preprint   slides   dblp 
  • Holger Schmidt, J. Jürjens: Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec. In: 23rd International Conference on Advanced Information System Engineering (CAiSE), Springer, London, Lecture Notes in Computer Science, vol. 6741, pp. 367-382, 2011.
    @InProceedings{caise11SJ, author = {Holger Schmidt and J.~{J}{\"u}{r}jens}, title = {Connecting Security Requirements Analysis and Secure Design Using Patterns and {UMLsec}}, booktitle = {23rd International Conference on Advanced Information System Engineering (CAiSE)}, year = {2011}, series = {Lecture Notes in Computer Science}, pages = {367--382}, volume = {6741}, address = {London}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/caise11SJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-21640-4_28:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering}, URL = {http://www.caise2011.com/}, }
     BibTeX   URL   preprint   dblp   SpringerLink 
  • Denis Hatebur, Maritta Heisel, J. Jürjens, Holger Schmidt: Systematic Development of UMLsec Design Models Based on Security Requirements. In: Dimitra Giannakopoulou, Fernando Orejas (editors): Fundamental Approaches to Software Engineering - 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26-April 3, 2011. Proceedings, Springer, Saarbrücken (Germany), Lecture Notes in Computer Science, vol. 6603, pp. 232-246, 2011.
    @InProceedings{fase11HHJS, author = {Denis Hatebur and Maritta Heisel and J.~{J}{\"u}{r}jens and Holger Schmidt}, editor = {Dimitra Giannakopoulou and Fernando Orejas}, title = {Systematic Development of UMLsec Design Models Based on Security Requirements}, booktitle = {Fundamental Approaches to Software Engineering - 14th International Conference, {FASE} 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2011, Saarbr{\"{u}}cken, Germany, March 26-April 3, 2011. Proceedings}, year = {2011}, series = {Lecture Notes in Computer Science}, pages = {232--246}, volume = {6603}, address = {Saarbr{\"u}cken (Germany)}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/fase11HHJS.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-19811-3_17:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering}, URL = {http://www.lsi.upc.edu/~orejas/FASE.html}, }
     BibTeX   URL   preprint   dblp   SpringerLink 
  • Eric Knauss, Siv Hilde Houmb, Kurt Schneider, Shareeful Islam, J. Jürjens: Supporting Requirements Engineers in Recognising Security Issues. In: 17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Springer, Essen (Germany), Lecture Notes in Computer Science, vol. 6606, pp. 4-18, 2011.
    @InProceedings{refsq11KHSIJ, author = {Eric Knauss and Siv Hilde Houmb and Kurt Schneider and Shareeful Islam and J.~{J}{\"u}{r}jens}, title = {Supporting Requirements Engineers in Recognising Security Issues}, booktitle = {17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011)}, year = {2011}, series = {Lecture Notes in Computer Science}, pages = {4--18}, volume = {6606}, address = {Essen (Germany)}, publisher = {Springer}, crossref = {DBLP:conf/refsq/2011}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/refsq11KHSIJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-19858-8_2:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 
  • H. Mouratidis, A. Sunyaev, J. Jürjens: Secure Information Systems Engineering: Experiences and Lessons Learned from two Health Care Projects. In: Computer Aided Information Systems Engineering (CAiSE 2009), Springer, Lecture Notes in Computer Science, vol. 5565, pp. 231-245, 2009.
    @InProceedings{sise09, author = {H.~Mouratidis and A.~Sunyaev and J.~{J}{\"u}{r}jens}, title = {Secure Information Systems Engineering: Experiences and Lessons Learned from two Health Care Projects}, booktitle = {Computer Aided Information Systems Engineering (CAiSE 2009)}, year = {2009}, pages = {231--245}, volume = {5565}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/caise09.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-02144-2_21:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 
  • H. Mouratidis, J. Jürjens, J. Fox: Towards a Comprehensive Framework for Secure Systems Development. In: 18th International Conference on Advanced Information Systems Engineering (CAiSE 2006), Springer Verlag, Lecture Notes in Computer Science, vol. 4001, pp. 48-62, 2006.
    @InProceedings{tcfssd06, author = {H.~Mouratidis and J.~{J}{\"u}{r}jens and J.~Fox}, title = {Towards a Comprehensive Framework for Secure Systems Development}, booktitle = {18th International Conference on Advanced Information Systems Engineering (CAiSE 2006)}, year = {2006}, volume = {4001}, series = {Lecture Notes in Computer Science}, pages = {48--62}, publisher = {Springer Verlag}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/caise06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11767138_5:URL}, ISBN = {3-540-26095-1}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 

Security Testing

  • E. Fourneret, M. Ochoa, F. Bouquet, J. Botella, J. Jürjens, P. Yousefi: Model-Based Security Verification and Testing for Smart-cards. In: Sixth International Conference on Availability, Reliability and Security (AReS 2011), Vienna, pp. 272-279, 2011.
    @InProceedings{ares11FOBBJY, author = {E.~Fourneret and M.~Ochoa and F.~Bouquet and J.~Botella and J.~{J}{\"u}{r}jens and P.~Yousefi}, title = {Model-Based Security Verification and Testing for Smart-cards}, booktitle = {Sixth International Conference on Availability, Reliability and Security (AReS 2011)}, year = {2011}, pages = {272--279}, address = {Vienna}, DOI = {10.1109/ARES.2011.46}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ares11FOBBJY.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/ares11FOBBJYtalk.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityTesting, secureSoftwareEngineeringSecureEmbeddedSystems}, URL = {http://www.ares-conference.eu/}, }
     BibTeX   DOI   URL   preprint   slides   dblp 
  • G. Wimmel, J. Jürjens: Specification-based Test Generation for Security-Critical Systems Using Mutations. In: International Conference on Formal Engineering Methods (ICFEM), Springer Verlag, Shanghai (China), Lecture Notes in Computer Science, vol. 2495, pp. 471-482, 2002.
    @InProceedings{sbtgscsum02, author = {G.~Wimmel and J.~{J}{\"u}{r}jens}, title = {Specification-based Test Generation for Security-Critical Systems Using Mutations}, booktitle = {International Conference on Formal Engineering Methods (ICFEM)}, year = {2002}, volume = {2495}, series = {Lecture Notes in Computer Science}, pages = {471--482}, address = {Shanghai (China)}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.724}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/icfem02.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/icfem02.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-36103-0_48:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX   DOI   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens, G. Wimmel: Formally Testing Fail-safety of Electronic Purse Protocols. In: 16th International Conference on Automated Software Engineering (ASE 2001), IEEE, pp. 408-411, 2001.
    @InProceedings{ase01JW, author = {J.~{J}{\"u}{r}jens and G. Wimmel}, title = {Formally Testing Fail-safety of Electronic Purse Protocols}, booktitle = {16th International Conference on Automated Software Engineering (ASE 2001)}, year = {2001}, pages = {408--411}, publisher = {IEEE}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ase01sli.ps:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ase01.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityTesting, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   slides   preprint   dblp 
  • J. Jürjens, G. Wimmel: Specification-Based Testing of Firewalls. In: D. Bjørner, M. Broy, A. Zamulin (editors): Andrei Ershov 4th International Conference ``Perspectives of System Informatics'' (PSI 2001), Springer Verlag, Novosibirsk (Russia), Lecture Notes in Computer Science, vol. 2244, pp. 308-316, 2001.
    @InProceedings{sbtf01, author = {J.~{J}{\"u}{r}jens and G. Wimmel}, title = {Specification-Based Testing of Firewalls}, booktitle = {Andrei Ershov 4th International Conference ``Perspectives of System Informatics'' (PSI 2001)}, year = {2001}, editor = {D. Bj{\o}rner and M. Broy and A. Zamulin}, volume = {2244}, series = {Lecture Notes in Computer Science}, pages = {308--316}, address = {Novosibirsk (Russia)}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.2132}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/JurWim01sli.ps:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/JurWim01.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/JurWim01.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45575-2_31:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX   DOI   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 

Security Monitoring

  • A. Pironti, J. Jürjens: Formally-Based Black-Box Monitoring of Security Protocols. In: International Symposium on Engineering Secure Software and Systems (ESSOS 2010), Springer Verlag, Lecture Notes in Computer Science, vol. 5965, pp. 79-95, 2010.
    @InProceedings{fbbbmsp10, author = {A.~Pironti and J.~{J}{\"u}{r}jens}, title = {Formally-Based Black-Box Monitoring of Security Protocols}, booktitle = {International Symposium on Engineering Secure Software and Systems (ESSOS 2010)}, year = {2010}, series = {Lecture Notes in Computer Science}, pages = {79--95}, volume = {5965}, publisher = {Springer Verlag}, crossref = {DBLP:conf/essos/2010}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/paper_4.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-11747-3_7:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityMonitoring,vorsecurestreams}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens: Model-based Run-time Checking of Security Permissions using Guarded Objects. In: Runtime-Verification 2008 (RV`08 @ ETAPS 2008), Springer Verlag, Lecture Notes in Computer Science, vol. 5289, pp. 36-50, 2008.
    @InProceedings{mbrtc08, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Run-time Checking of Security Permissions using Guarded Objects}, booktitle = {Runtime-Verification 2008 (RV`08 @ ETAPS 2008)}, year = {2008}, volume = {5289}, series = {Lecture Notes in Computer Science}, pages = {36--50}, publisher = {Springer Verlag}, crossref = {DBLP:conf/rv/2008}, DOI = {http://doi.org/10.1007/978-3-540-89247-2_3}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/rv08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/rv08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-89247-2_3:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityMonitoring}, }
     BibTeX   DOI   slides   preprint   dblp   SpringerLink 

Eingebettete Systeme absichern

  • E. Fourneret, M. Ochoa, F. Bouquet, J. Botella, J. Jürjens, P. Yousefi: Model-Based Security Verification and Testing for Smart-cards. In: Sixth International Conference on Availability, Reliability and Security (AReS 2011), Vienna, pp. 272-279, 2011.
    @InProceedings{ares11FOBBJY, author = {E.~Fourneret and M.~Ochoa and F.~Bouquet and J.~Botella and J.~{J}{\"u}{r}jens and P.~Yousefi}, title = {Model-Based Security Verification and Testing for Smart-cards}, booktitle = {Sixth International Conference on Availability, Reliability and Security (AReS 2011)}, year = {2011}, pages = {272--279}, address = {Vienna}, DOI = {10.1109/ARES.2011.46}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ares11FOBBJY.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/ares11FOBBJYtalk.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityTesting, secureSoftwareEngineeringSecureEmbeddedSystems}, URL = {http://www.ares-conference.eu/}, }
     BibTeX   DOI   URL   preprint   slides   dblp 
  • J. Jürjens: Developing Secure Embedded Systems: Pitfalls and How to Avoid Them. In: 29th International Conference on Software Engineering (ICSE 2007), pp. 182-183, ACM, 2007.
    @InProceedings{dses07, author = {J.~{J}{\"u}{r}jens}, title = {Developing Secure Embedded Systems: Pitfalls and How to Avoid Them}, booktitle = {29th International Conference on Software Engineering (ICSE 2007)}, year = {2007}, pages = {182--183}, organization = {ACM}, crossref = {DBLP:conf/icse/2007c}, DOI = {http://doi.ieeecomputersociety.org/10.1109/ICSECOMPANION.2007.30}, file = {slides:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials.html:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icse07tut.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecureEmbeddedSystems, atScientificConferences}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens, G. Wimmel: Formally Testing Fail-safety of Electronic Purse Protocols. In: 16th International Conference on Automated Software Engineering (ASE 2001), IEEE, pp. 408-411, 2001.
    @InProceedings{ase01JW, author = {J.~{J}{\"u}{r}jens and G. Wimmel}, title = {Formally Testing Fail-safety of Electronic Purse Protocols}, booktitle = {16th International Conference on Automated Software Engineering (ASE 2001)}, year = {2001}, pages = {408--411}, publisher = {IEEE}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ase01sli.ps:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ase01.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityTesting, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   slides   preprint   dblp 
  • J. Jürjens: Modelling audit security for smart-card payment schemes with UMLsec. In: 16th International Conference on Information Security (IFIPSEC''01), Kluwer, pp. 93-108, IFIP, 2001.
    @InProceedings{ifipsec01J, author = {J.~{J}{\"u}{r}jens}, title = {Modelling audit security for smart-card payment schemes with {UMLsec}}, booktitle = {16th International Conference on Information Security (IFIPSEC''01)}, year = {2001}, pages = {93--108}, organization = {IFIP}, publisher = {Kluwer}, file = {audio 3/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ii.wav:URL;audio 2/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ib.wav:URL;audio 1/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ia.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/iftalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/ifipsec01final.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/ifipsec01final.ps:URL;SpringerLink:http://link.springer.com/chapter/10.1007/0-306-46998-7_7:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   audio 3/3   audio 2/3   audio 1/3   slides   paper (pdf)   paper (ps)   SpringerLink 
  • J. Jürjens, G. Wimmel: Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. In: First IFIP Conference on e-Commerce, e-Business, and e-Government (I3E), Kluwer, pp. 489-505, 2001.
    @InProceedings{i3eJW01, author = {J.~{J}{\"u}{r}jens and G. Wimmel}, title = {Security Modelling for Electronic Commerce: The {Common Electronic Purse Specifications}}, booktitle = {First IFIP Conference on e-Commerce, e-Business, and e-Government (I3E)}, year = {2001}, pages = {489--505}, publisher = {Kluwer}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/i3esli.ps:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/JW01_I3E.ps:URL;SpringerLink:http://link.springer.com/chapter/10.1007/0-306-47009-8_36:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   slides   preprint   SpringerLink 

Aspektorientierte Sicherheit

  • J. Jürjens, S. H. Houmb: Dynamic Secure Aspect Modeling with UML: From Models to Code. In: ACM / IEEE 8th International Conference on Model Driven Engineering Languages and Systems (MoDELS / UML 2005), Springer Verlag, Lecture Notes in Computer Science, pp. 142-155, ACM/Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{dsamu05, author = {J.~{J}{\"u}{r}jens and S. H.~Houmb}, title = {Dynamic Secure Aspect Modeling with {UML}: From Models to Code}, booktitle = {ACM / IEEE 8th International Conference on Model Driven Engineering Languages and Systems (MoDELS / UML 2005)}, year = {2005}, series = {Lecture Notes in Computer Science}, pages = {142--155}, organization = {ACM/Institute of Electrical and Electronics Engineers}, publisher = {Springer Verlag}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/models05talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/models05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11557432_11:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAspectOrientedSecurity}, }
     BibTeX   slides   preprint   dblp   SpringerLink 

Sichere Service-/Cloud-basierte Systeme

  • S. Ahmadian, J. Jürjens: Supporting Model-based Privacy Analysis by Exploiting Privacy Level Agreements. In: 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016), 2016.
    @InProceedings{cloudcom16, author = {S.~Ahmadian and J.~{J}{\"u}{r}jens}, title = {Supporting Model-based Privacy Analysis by Exploiting Privacy Level Agreements}, booktitle = {8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016)}, year = {2016}, keywords = {internationalConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, }
     BibTeX 
  • T. Humberg, C. Wessel, D. Poggenpohl, S. Wenzel, T. Ruhroth, J. Jürjens: Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes. In: Cloud Computing and Services Science (selected best papers), Springer, Communications in Computer and Information Science, vol. 453, pp. 1-16, 2014.
    @InProceedings{closer13selected, author = {T.~Humberg and C.~Wessel and D.~Poggenpohl and S.~Wenzel and T.~Ruhroth and J.~J{\"u}rjens}, title = {Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes}, booktitle = {Cloud Computing and Services Science (selected best papers)}, year = {2014}, volume = {453}, series = {Communications in Computer and Information Science}, publisher = {Springer}, keywords = {internationalConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems, secvolution, secureSoftwareEngineeringCompliance}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/closer13selected.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-319-11561-0_3:URL}, pages = {1--16}, }
     BibTeX   preprint   dblp   SpringerLink 
  • T. Humberg, C. Wessel, D. Poggenpohl, S. Wenzel, T. Ruhroth, J. Jürjens: Ontology-Based Analysis of Compliance and Regulatory Requirements of Business Processes. In: F. Desprez, D. Ferguson, E. Hadar, F. Leymann, M. Jarke, M. Helfert (editors): 3rd International Conference on Cloud Computing and Services Science (Closer 2013), SciTePress, pp. 553-561, 2013.
    @InProceedings{closer13WHWPRJ, author = {T.~Humberg and C.~Wessel and D.~Poggenpohl and S.~Wenzel and T.~Ruhroth and J.~J{\"u}rjens}, title = {Ontology-Based Analysis of Compliance and Regulatory Requirements of Business Processes}, booktitle = {3rd International Conference on Cloud Computing and Services Science (Closer 2013)}, year = {2013}, editor = {F.~Desprez and D.~Ferguson and E.~Hadar and F.~Leymann and M.~Jarke and M.~Helfert}, publisher = {SciTePress}, keywords = {internationalConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/cloudsecgov13HWPWRJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, pages = {553--561}, }
     BibTeX   preprint   dblp 
  • S. Wenzel, C. Wessel, T. Humberg, J. Jürjens: Securing Processes for Outsourcing into the Cloud. In: F. Leymann, I. Ivanov, M. van Sinderen, T. Shan (editors): 2nd International Conference on Cloud Computing and Services Science (Closer 2012), pp. 675-680, 2012.
    @InProceedings{spoc12, author = {S.~Wenzel and C.~Wessel and T.~Humberg and J.~{J}{\"u}{r}jens}, title = {Securing Processes for Outsourcing into the Cloud}, booktitle = {2nd International Conference on Cloud Computing and Services Science (Closer 2012)}, year = {2012}, editor = {F.~Leymann and I.~Ivanov and M.~van Sinderen and T.~Shan}, pages = {675--680}, DOI = {10.5220/0003979306750680}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/slides/closer12_secureclouds.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/cloudsecgov.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems}, }
     BibTeX   DOI   slides   preprint   dblp 
  • Martin Deubler, Johannes Grünbauer, J. Jürjens, Guido Wimmel: Sound development of secure service-based systems.. In: Marco Aiello, Mikio Aoyama, Francisco Curbera, Mike P. Papazoglou (editors): 2nd International Conference on Service Oriented Computing (ICSOC 2004), ACM, pp. 115-124, 2004.
    @InProceedings{sdssbs04, author = {Martin Deubler and Johannes Gr{\"u}nbauer and J.~{J}{\"u}{r}jens and Guido Wimmel}, title = {Sound development of secure service-based systems.}, booktitle = {2nd International Conference on Service Oriented Computing (ICSOC 2004)}, year = {2004}, editor = {Marco Aiello and Mikio Aoyama and Francisco Curbera and Mike P. Papazoglou}, pages = {115--124}, publisher = {ACM}, DOI = {http://doi.org/10.1145/1035167.1035185}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsoc04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, ISBN = {1-58113-871-7}, keywords = {internationalConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems}, }
     BibTeX   DOI   preprint   dblp 

UMLsec Profil

  • J. Jürjens: UMLsec: Extending UML for Secure Systems Development. In: 5th International Conference on the Unified Modeling Language (UML 2002), Springer Verlag, Lecture Notes in Computer Science, vol. 2460, pp. 412-425, 2002. 10 years most influential paper award at Models 2012.
    @InProceedings{uml02J, author = {J.~{J}{\"u}{r}jens}, title = {{UMLsec}: Extending {UML} for Secure Systems Development}, booktitle = {5th International Conference on the Unified Modeling Language (UML 2002)}, year = {2002}, volume = {2460}, series = {Lecture Notes in Computer Science}, pages = {412--425}, publisher = {Springer Verlag}, note = {10 years most influential paper award at Models 2012}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/uml02talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/uml02.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/uml02.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45800-X_32:URL}, keywords = {internationalConferences, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Towards Development of Secure Systems using UMLsec. In: 4th International Conference on Fundamental Approaches to Software Engineering (FASE), Springer, Lecture Notes in Computer Science, vol. 2029, pp. 187-200, 2001.
    @InProceedings{fase01J, author = {J.~{J}{\"u}{r}jens}, title = {Towards Development of Secure Systems using {UMLsec}}, booktitle = {4th International Conference on Fundamental Approaches to Software Engineering (FASE)}, year = {2001}, volume = {2029}, series = {Lecture Notes in Computer Science}, pages = {187--200}, publisher = {Springer}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fasetalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/secuml.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/secuml.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45314-8_14:URL}, keywords = {internationalConferences, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 

IT-Sicherheits Risikobewertung

  • S. Taubenberger, J. Jürjens, B. Nuseibeh, Yijun Yu: Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain. In: 26th IFIP International Information Security Conference, Lucerne, pp. 259-270, 2011.
    @InProceedings{ifipsec11TJNY, author = {S.~Taubenberger and J.~{J}{\"u}{r}jens and B.~Nuseibeh and Yijun Yu}, title = {Problem Analysis of Traditional IT-Security Risk Assessment Methods -- An Experience Report from the Insurance and Auditing Domain}, booktitle = {26th IFIP International Information Security Conference}, year = {2011}, volume = {354}, pages = {259--270}, address = {Lucerne}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ifipsec11TJNY.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/ifipsec11TJNYtalk.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-21424-0_21:URL}, keywords = {internationalConferences, secureSoftwareEngineeringITSecurityRiskAssessment}, URL = {http://www.sec2011.org/}, }
     BibTeX   URL   preprint   slides   dblp   SpringerLink 
  • S. H. Houmb, G. Georg, R. France, J. Bieman, J. Jürjens: Cost-Benefit Trade-Off Analysis using BBN for Aspect-Oriented Risk-Driven Development. In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), Shanghai (China), Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{cbtoa05, author = {S. H.~Houmb and G.~Georg and R.~France and J.~Bieman and J.~{J}{\"u}{r}jens}, title = {Cost-Benefit Trade-Off Analysis using {BBN} for Aspect-Oriented Risk-Driven Development}, booktitle = {10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005)}, year = {2005}, address = {Shanghai (China)}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {http://doi.org/10.1109/ICECCS.2005.30}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/iceccs05camera.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringITSecurityRiskAssessment}, }
     BibTeX   DOI   preprint   dblp 
  • S. H. Houmb, J. Jürjens: Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec. In: 10th Asia-Pacific Software Engineering Conference (APSEC 2003), Chiangmai (Thailand), pp. 488ff, Institute of Electrical and Electronics Engineers, 2003.
    @InProceedings{dsnwbs03, author = {S. H.~Houmb and J.~{J}{\"u}{r}jens}, title = {Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and {UMLsec}}, booktitle = {10th Asia-Pacific Software Engineering Conference (APSEC 2003)}, year = {2003}, pages = {488ff}, address = {Chiangmai (Thailand)}, organization = {Institute of Electrical and Electronics Engineers}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/APSEC_2003_MBRA_UMLsec_final.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/apsec03siv.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringITSecurityRiskAssessment}, }
     BibTeX   slides   preprint   dblp 

Sichere Informationssysteme

  • C. Blanco, E. Fernandez-Medina, J. Trujillo, J. Jürjens: Towards the Secure Modelling of OLAP Users Behaviour. In: 7th Workshop on Secure Data Management (SDM @ VLDB 2010), Springer Verlag, Lecture Notes in Computer Science, vol. 6358, pp. 101-112, 2010.
    @InProceedings{tsmoub10, author = {C.~Blanco and E.~Fernandez-Medina and J.~Trujillo and J.~{J}{\"u}{r}jens}, title = {Towards the Secure Modelling of OLAP Users Behaviour}, booktitle = {7th Workshop on Secure Data Management (SDM @ VLDB 2010)}, year = {2010}, series = {Lecture Notes in Computer Science}, pages = {101--112}, volume = {6358}, publisher = {Springer Verlag}, crossref = {DBLP:conf/sdmw/2010}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/sdm10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-15546-8_8:URL}, keywords = {workshop,internationalConferences, secureSoftwareEngineeringSecureInformationSystems}, }
     BibTeX   preprint   dblp   SpringerLink 

Model-based Security Engineering (Misc.)

  • J. Fox, J. Jürjens: Introducing Security Aspects with Model Transformation. In: 12th Annual IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), Greenbelt, Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{isamt05, author = {J.~Fox and J.~{J}{\"u}{r}jens}, title = {Introducing Security Aspects with Model Transformation}, booktitle = {12th Annual IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005)}, year = {2005}, address = {Greenbelt}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {10.1109/ECBS.2005.48}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/IntroducingSecAspectsWithMT.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, M. Lehrhuber, G. Wimmel: Model-Based Design and Analysis of Permission-Based Security. In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), Shanghai (China), Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{mbdapbs05, author = {J.~{J}{\"u}{r}jens and M.~Lehrhuber and G.~Wimmel}, title = {Model-Based Design and Analysis of Permission-Based Security}, booktitle = {10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005)}, year = {2005}, address = {Shanghai (China)}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {10.1109/ICECCS.2005.61}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/iceccs05permissions.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Developing High-Assurance Secure Systems with UML: An electronic purchase protocol. In: Eighth IEEE International Symposium on High Assurance Systems Engineering (HASE 2004), Tampa, FL (USA), pp. 231-240, Institute of Electrical and Electronics Engineers, 2004.
    @InProceedings{dhass04, author = {J.~{J}{\"u}{r}jens}, title = {Developing High-Assurance Secure Systems with {UML}: An electronic purchase protocol}, booktitle = {Eighth IEEE International Symposium on High Assurance Systems Engineering (HASE 2004)}, year = {2004}, pages = {231--240}, address = {Tampa, FL (USA)}, organization = {Institute of Electrical and Electronics Engineers}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/hase04.wav:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/hase04.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   preprint   dblp 
  • S. Höhn, J. Jürjens: Automated Checking of SAP Security Permissions. In: 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), Kluwer, Lausanne, Switzerland, pp. 13-30, IFIP, 2003.
    @InProceedings{acssp03, author = {S.~H{\"o}hn and J.~{J}{\"u}{r}jens}, title = {Automated Checking of {SAP} Security Permissions}, booktitle = {6th Working Conference on Integrity and Internal Control in Information Systems (IICIS)}, year = {2003}, volume = {140}, pages = {13--30}, address = {Lausanne, Switzerland}, organization = {IFIP}, publisher = {Kluwer}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/iicis03.pdf:URL;paper (ps.gz):http\://rgse.uni-koblenz.de/jj/publications/papers/iicis03.ps.gz:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/1-4020-7901-X_2:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   paper (pdf)   paper (ps.gz)   dblp   SpringerLink 
  • J. Jürjens: Algebraic State Machines: Concepts and Applications to Security. In: M. Broy, A. Zamulin, Manfred Broy, Alexandre V. Zamulin (editors): Andrei Ershov 5th International Conference ``Perspectives of System Informatics'' (PSI 2003), Springer Verlag, Novosibirsk (Russia), Lecture Notes in Computer Science, vol. 2890, pp. 338-343, 2003.
    @InProceedings{asm03, author = {J.~{J}{\"u}{r}jens}, title = {Algebraic State Machines: Concepts and Applications to Security}, booktitle = {Andrei Ershov 5th International Conference ``Perspectives of System Informatics'' (PSI 2003)}, year = {2003}, editor = {M. Broy and A. Zamulin and Manfred Broy and Alexandre V. Zamulin}, volume = {2890}, series = {Lecture Notes in Computer Science}, pages = {338--343}, address = {Novosibirsk (Russia)}, publisher = {Springer Verlag}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/psi03.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/psi03talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/psi03.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/psi03.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-39866-0_33:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, G. Wimmel, V. Lotz: Key Issues of a Formally Based Process Model for Security Engineering. In: Sixteenth International Conference "Software & Systems Engineering & their Applications", Paris, 2003.
    @InProceedings{kifbpmse03, author = {R.~Breu and K.~Burger and M.~Hafner and J.~{J}{\"u}{r}jens and G.~Popp and G.~Wimmel and V.~Lotz}, title = {Key Issues of a Formally Based Process Model for Security Engineering}, booktitle = {Sixteenth International Conference {"}Software \& Systems Engineering \& their Applications{"}}, year = {2003}, address = {Paris}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5457}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ICSSEA2003v6.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icssea03BBHJPWL.ps:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, address = {Paris}, }
     BibTeX   DOI   slides   preprint 
  • J. Grünbauer, H. Hollmann, J. Jürjens, G. Wimmel: Modelling and Verification of Layered Security Protocols: A Bank Application. In: Computer Safety, Reliability, and Security (SAFECOMP 2003), Springer Verlag, Edinburgh, Lecture Notes in Computer Science, vol. 2788, pp. 116-129, 2003.
    @InProceedings{mvlsp03, author = {J.~Gr{\"u}nbauer and H.~Hollmann and J.~{J}{\"u}{r}jens and G.~Wimmel}, title = {Modelling and Verification of Layered Security Protocols: A Bank Application}, booktitle = {Computer Safety, Reliability, and Security (SAFECOMP 2003)}, year = {2003}, volume = {2788}, series = {Lecture Notes in Computer Science}, pages = {116--129}, address = {Edinburgh}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.4724}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/safecomp03GHJWtalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/safecomp03GHJW.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/safecomp03GHJW.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-39878-3_10:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • G. Popp, J. Jürjens, G. Wimmel, R. Breu: Security-Critical System Development with Extended Use Cases. In: 10th Asia-Pacific Software Engineering Conference (APSEC 2003), Chiangmai (Thailand), pp. 478-487, Institute of Electrical and Electronics Engineers, 2003.
    @InProceedings{scsdeuc03, author = {G.~Popp and J.~{J}{\"u}{r}jens and G.~Wimmel and R.~Breu}, title = {Security-Critical System Development with Extended Use Cases}, booktitle = {10th Asia-Pacific Software Engineering Conference (APSEC 2003)}, year = {2003}, pages = {478--487}, address = {Chiangmai (Thailand)}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.9698}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/apsec03.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/apsec03.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens: A UML statecharts semantics with message-passing. In: G. B.Lamont , H. Haddad, G. Papadopoulos, B. Panda (editors): Proceedings of the 2002 Symposium of Applied Computing (SAC), ACM Press, Madrid, Spain, pp. 1009-1013, ACM, 2002. Proceedings of the 2002 ACM Symposium of Applied Computing.
    @InProceedings{auss02, author = {J.~{J}{\"u}{r}jens}, title = {A {UML} statecharts semantics with message-passing}, booktitle = {Proceedings of the 2002 Symposium of Applied Computing (SAC)}, year = {2002}, editor = {{G. B.} Lamont and H. Haddad and G. Papadopoulos and B. Panda}, pages = {1009--1013}, address = {Madrid, Spain}, organization = {ACM}, publisher = {ACM Press}, note = {Proceedings of the 2002 ACM Symposium of Applied Computing}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.3196}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/sac02.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2Talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, umlModelAnalysis, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   audio   slides   paper (pdf)   paper (ps)   dblp 
  • J. Jürjens: Using UMLsec and Goal-Trees for Secure Systems Development. In: G. B.Lamont , H. Haddad, G. Papadopoulos, B. Panda (editors): Proceedings of the 2002 Symposium of Applied Computing (SAC), ACM, Madrid, Spain, pp. 1026-1031, 2002. Proceedings of the 2002 ACM Symposium of Applied Computing.
    @InProceedings{uusgtssd02, author = {J.~{J}{\"u}{r}jens}, title = {Using {UMLsec} and Goal-Trees for Secure Systems Development}, booktitle = {Proceedings of the 2002 Symposium of Applied Computing (SAC)}, year = {2002}, editor = {{G. B.} Lamont and H. Haddad and G. Papadopoulos and B. Panda}, pages = {1026--1031}, address = {Madrid, Spain}, publisher = {ACM}, note = {Proceedings of the 2002 ACM Symposium of Applied Computing}, DOI = {10.1145/508791.508990}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/sac02ii.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sac02softTalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   audio   slides   paper (pdf)   paper (ps)   dblp 
  • J. Jürjens: Composability of Secrecy. In: V. Gorodetski, V. Skormin, L. Popyack (editors): International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2001), Springer Verlag, St. Petersburg (Russia), Lecture Notes in Computer Science, vol. 2052, pp. 28-38, 2001.
    @InProceedings{cs01, author = {J.~{J}{\"u}{r}jens}, title = {Composability of Secrecy}, booktitle = {International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2001)}, year = {2001}, editor = {V. Gorodetski and V. Skormin and L. Popyack}, volume = {2052}, series = {Lecture Notes in Computer Science}, pages = {28--38}, address = {St. Petersburg (Russia)}, publisher = {Springer Verlag}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/J01cSli.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/J01cWeb.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/J01cWeb.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45116-1_6:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, summary = {Gives notion of secrecy preserved under composition and refinement and results on modular verification}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Encapsulating Rules of Prudent Security Engineering. In: B. Christianson, B. Crispo, J. A.Malcolm , M. Roe (editors): International Workshop on Security Protocols, Springer Verlag, Cambridge, Lecture Notes in Computer Science, vol. 2467, pp. 95-101, 2001. 9th International Workshop. Transcript of discussion on pages 102--106.
    @InProceedings{erpse01, author = {J.~{J}{\"u}{r}jens}, title = {Encapsulating Rules of Prudent Security Engineering}, booktitle = {International Workshop on Security Protocols}, year = {2001}, editor = {B. Christianson and B. Crispo and {J. A.} Malcolm and M. Roe}, volume = {2467}, series = {Lecture Notes in Computer Science}, pages = {95--101}, address = {Cambridge}, publisher = {Springer Verlag}, note = {9th International Workshop. Transcript of discussion on pages 102--106}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/iwtalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/IWSecP01.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/IWSecP01.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45807-7_15:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Modelling audit security for smart-card payment schemes with UMLsec. In: 16th International Conference on Information Security (IFIPSEC''01), Kluwer, pp. 93-108, IFIP, 2001.
    @InProceedings{ifipsec01J, author = {J.~{J}{\"u}{r}jens}, title = {Modelling audit security for smart-card payment schemes with {UMLsec}}, booktitle = {16th International Conference on Information Security (IFIPSEC''01)}, year = {2001}, pages = {93--108}, organization = {IFIP}, publisher = {Kluwer}, file = {audio 3/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ii.wav:URL;audio 2/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ib.wav:URL;audio 1/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ia.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/iftalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/ifipsec01final.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/ifipsec01final.ps:URL;SpringerLink:http://link.springer.com/chapter/10.1007/0-306-46998-7_7:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   audio 3/3   audio 2/3   audio 1/3   slides   paper (pdf)   paper (ps)   SpringerLink 
  • J. Jürjens: Secure Java Development with UML. In: I-NetSec 01 – First International IFIP TC-11 WG 11.4 Working Conference on Network Security, Kluwer, Leuven (Belgium), 2001.
    @InProceedings{sjdu01, author = {J.~{J}{\"u}{r}jens}, title = {Secure Java Development with {UML}}, booktitle = {I-NetSec 01 – First International IFIP TC-11 WG 11.4 Working Conference on Network Security}, year = {2001}, address = {Leuven (Belgium)}, publisher = {Kluwer}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/inetsec01talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/inetsec01.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/inetsec01.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/0-306-46958-8_8:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens, G. Wimmel: Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. In: First IFIP Conference on e-Commerce, e-Business, and e-Government (I3E), Kluwer, pp. 489-505, 2001.
    @InProceedings{i3eJW01, author = {J.~{J}{\"u}{r}jens and G. Wimmel}, title = {Security Modelling for Electronic Commerce: The {Common Electronic Purse Specifications}}, booktitle = {First IFIP Conference on e-Commerce, e-Business, and e-Government (I3E)}, year = {2001}, pages = {489--505}, publisher = {Kluwer}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/i3esli.ps:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/JW01_I3E.ps:URL;SpringerLink:http://link.springer.com/chapter/10.1007/0-306-47009-8_36:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   slides   preprint   SpringerLink 

Programmverständnis

  • D. Ratiu, R. Marinescu, J. Jürjens: The Logical Modularity of Programs. In: Working Conference for Reverse Engineering (WCRE 2009), pp. 123-127, 2009.
    @InProceedings{lmp09, author = {D.~Ratiu and R.~Marinescu and J.~{J}{\"u}{r}jens}, title = {The Logical Modularity of Programs}, booktitle = {Working Conference for Reverse Engineering (WCRE 2009)}, year = {2009}, pages = {123--127}, crossref = {DBLP:conf/wcre/2009}, DOI = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.29}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/wcre09.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, programComprehension}, url = {https://doi.org/10.1007/978-3-642-04425-0\_7}, doi = {10.1007/978-3-642-04425-0\_7}, }
     BibTeX   DOI   preprint   dblp 
  • D. Ratiu, M. Feilkas, J. Jürjens: Extracting Domain Ontologies from Domain Specific APIs. In: 12th European Conference on Software Maintenance and Reengineering (CSMR 08), pp. 203-212, IEEE, 2008.
    @InProceedings{csmr08RFJ, author = {D.~Ratiu and M.~Feilkas and J.~{J}{\"u}{r}jens}, title = {Extracting Domain Ontologies from Domain Specific APIs}, booktitle = {12th European Conference on Software Maintenance and Reengineering (CSMR 08)}, year = {2008}, pages = {203--212}, organization = {IEEE}, DOI = {http://doi.org/10.1109/CSMR.2008.4493315}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ExtractingDomainOntologiesFromAPIs.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/csmr075-ratiu.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, programComprehension}, }
     BibTeX   DOI   slides   preprint   dblp 
  • D. Ratiu, J. Jürjens: Evaluating the Reference and Representation of Domain Concepts in APIs. In: 16th IEEE International Conference on Program Comprehension (ICPC 2008), pp. 242-247, Institute of Electrical and Electronics Engineers, 2008.
    @InProceedings{errdc08, author = {D.~Ratiu and J.~{J}{\"u}{r}jens}, title = {Evaluating the Reference and Representation of Domain Concepts in APIs}, booktitle = {16th IEEE International Conference on Program Comprehension (ICPC 2008)}, year = {2008}, pages = {242--247}, organization = {Institute of Electrical and Electronics Engineers}, crossref = {DBLP:conf/iwpc/2008}, DOI = {http://doi.org/10.1109/ICPC.2008.11}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ReferenceAndRepresentationOfCOnceptsInAPIs.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ratiud_concepts_in_apis.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, programComprehension}, }
     BibTeX   DOI   slides   preprint   dblp 
  • D. Ratiu, J. Jürjens: The Reality of Libraries. In: 11th European Conference on Software Maintenance and Reengineering (CSMR 2007), pp. 307-318, Institute of Electrical and Electronics Engineers, 2007.
    @InProceedings{rl07, author = {D.~Ratiu and J.~{J}{\"u}{r}jens}, title = {The Reality of Libraries}, booktitle = {11th European Conference on Software Maintenance and Reengineering (CSMR 2007)}, year = {2007}, pages = {307--318}, organization = {Institute of Electrical and Electronics Engineers}, crossref = {DBLP:conf/csmr/2007}, DOI = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2007.48}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/csmr07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, programComprehension}, }
     BibTeX   DOI   preprint   dblp 

Code-Analyse

  • S. Pape, J. Flake, A. Beckmann, J. Jürjens: STAGE - A Software Tool for Automatic Grading of Testing Exercises. In: 38th International Conference on Software Engineering (ICSE 2016), Software Engineering Education and Training (SEET), pp. 10, 2016.
    @InProceedings{icse16seet, author = {S.~Pape and J.~Flake and A.~Beckmann and J.~{J}{\"u}{r}jens}, title = {{STAGE} -- A Software Tool for Automatic Grading of Testing Exercises}, booktitle = {38th International Conference on Software Engineering (ICSE 2016), Software Engineering Education and Training (SEET)}, year = {2016}, pages = {10}, keywords = {internationalConferences, codeAnalysis}, }
     BibTeX 
  • S. Wagner, J. Jürjens, C. Koller, P. Trischberger: A Case Study Comparing Bug Finding Tools with Reviews and Tests. In: Testcom, Springer Verlag, Lecture Notes in Computer Science, vol. 3502, pp. 40-55, 2005.
    @InProceedings{acscbft05, author = {S.~Wagner and J.~{J}{\"u}{r}jens and C.~Koller and P.~Trischberger}, title = {A Case Study Comparing Bug Finding Tools with Reviews and Tests}, booktitle = {Testcom}, year = {2005}, series = {Lecture Notes in Computer Science}, pages = {40--55}, volume = {3502}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.9397}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/testcom05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11430230_4:URL}, keywords = {internationalConferences, codeAnalysis}, }
     BibTeX   DOI   preprint   dblp   SpringerLink 

Verlässliche Systeme

  • M. S. Rahman, M. S. Sadi, S. Ahammed, J. Jürjens: Soft Error Tolerance using HVDD: Horizontal-Vertical-Double-Bit Diagonal Parity Method. In: International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), IEEE, 2015.
    @InProceedings{iceeict15RSAJ, author = {M. S.~Rahman and M. S.~Sadi and S.~Ahammed and J.~{J}{\"u}{r}jens}, title = {Soft Error Tolerance using {HVDD}: Horizontal-Vertical-Double-Bit Diagonal Parity Method}, booktitle = {International Conference on Electrical Engineering and Information Communication Technology (ICEEICT)}, OPTpages = {}, year = {2015}, organization = {IEEE}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/iceeict15RSAJ.pdf:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   preprint 
  • M. S. Sadi, M. N. Uddin, M. M. R. Khan, J. Jürjens: Mitigating Soft Error Risks through Protecting Critical Variables and Blocks. In: International Conference on Computer Science, Engineering & Applications (ICCSEA'11), Springer, Communications in Computer and Information Science, vol. 154, pp. 137-145, 2011.
    @InProceedings{iccsea11SUKJ, author = {M. S.~Sadi and M. N.~Uddin and M. M. R.~Khan and J.~{J}{\"u}{r}jens}, title = {Mitigating Soft Error Risks through Protecting Critical Variables and Blocks}, booktitle = {International Conference on Computer Science, Engineering \& Applications (ICCSEA'11)}, year = {2011}, pages = {137--145}, volume = {154}, series = {Communications in Computer and Information Science}, publisher = {Springer}, DOI = {http://arxiv.org/abs/1110.3969}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/iccsea11SUKJ.pdf:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-21153-9_13:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   preprint   SpringerLink 
  • M. S. Sadi, D. G. Myers, C. Ortega, J. Jürjens: A Novel Approach to Minimizing the Risks of Soft Errors in Mobile and Ubiquitous Systems. In: IEEE TENCON, Institute of Electrical and Electronics Engineers, 2009.
    @InProceedings{anamr09, author = {M. S.~Sadi and D. G.~Myers and C.~Ortega and J.~{J}{\"u}{r}jens}, title = {A Novel Approach to Minimizing the Risks of Soft Errors in Mobile and Ubiquitous Systems}, booktitle = {IEEE TENCON}, year = {2009}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {http://doi.org/10.1109/TENCON.2009.5395903}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/tencon09.pdf:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   preprint 
  • J. Jürjens, D. Trachtenherz, D. Reiss: Model-based Quality Assurance of Automotive Software. In: ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems (Models 2008), pp. 858-873, ACM/Institute of Electrical and Electronics Engineers, 2008.
    @InProceedings{mbqaas08, author = {J.~{J}{\"u}{r}jens and D.~Trachtenherz and D.~Reiss}, title = {Model-based Quality Assurance of Automotive Software}, booktitle = {ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems (Models 2008)}, year = {2008}, volume = {5301}, pages = {858--873}, organization = {ACM/Institute of Electrical and Electronics Engineers}, crossref = {DBLP:conf/models/2008}, file = {experimental data:http\://rgse.uni-koblenz.de/jj/publications/experiments/autoqa:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/models08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/models08d.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-87875-9_59:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   experimental data   slides   preprint   dblp   SpringerLink 
  • J. Botaschanjan, J. Jürjens: Modeling and Analyzing Time-Constraints. In: 12th Annual IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), Greenbelt, 2005.
    @InProceedings{matc05, author = {J.~Botaschanjan and J.~{J}{\"u}{r}jens}, title = {Modeling and Analyzing Time-Constraints}, booktitle = {12th Annual IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005)}, year = {2005}, address = {Greenbelt}, DOI = {10.1109/ECBS.2005.52}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ecbs05bot.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   preprint   dblp 
  • S. Wagner, J. Jürjens: Model-Based Identification of Fault-Prone Components. In: 5th European Dependable Computing Conference on Dependable Computing (EDCC-5), Springer Verlag, Lecture Notes in Computer Science, vol. 3463, pp. 435-452, 2005.
    @InProceedings{mbifpc05, author = {S.~Wagner and J.~{J}{\"u}{r}jens}, title = {Model-Based Identification of Fault-Prone Components}, booktitle = {5th European Dependable Computing Conference on Dependable Computing (EDCC-5)}, year = {2005}, volume = {3463}, series = {Lecture Notes in Computer Science}, pages = {435--452}, publisher = {Springer Verlag}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/edcc05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11408901_32:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Romberg, J. Jürjens, G. Wimmel, O. Slotosch, G. Hahn: AUTOFOCUS and the MoDe Tool. In: Third International Conference on Application of Concurrency to System Design (ACSD), Guimaraes (Portugal), Institute of Electrical and Electronics Engineers, 2003.
    @InProceedings{automode03, author = {J.~Romberg and J.~{J}{\"u}{r}jens and G.~Wimmel and O.~Slotosch and G.~Hahn}, title = {AUTOFOCUS and the MoDe Tool}, booktitle = {Third International Conference on Application of Concurrency to System Design (ACSD)}, year = {2003}, address = {Guimaraes (Portugal)}, organization = {Institute of Electrical and Electronics Engineers}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/rombergj_modetool.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {http://doi.ieeecomputersociety.org/10.1109/CSD.2003.1207727}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, J. Grünbauer: Critical Systems Development with UML: motive Case-study. In: 4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003), Lübeck (Germany), pp. 512-517, International Association for Computer and Information Science (ACIS), 2003.
    @InProceedings{csd03, author = {J.~{J}{\"u}{r}jens and J. Gr{\"u}nbauer}, title = {Critical Systems Development with {UML}: motive Case-study}, booktitle = {4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003)}, year = {2003}, pages = {512--517}, address = {L{\"u}beck (Germany)}, organization = {International Association for Computer and Information Science (ACIS)}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.5805}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/snpd03.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/snpd03.ps:URL;audio 2/2:http\://rgse.uni-koblenz.de/jj/publications/audio/snpd03b.wav:URL;audio 1/2:http\://rgse.uni-koblenz.de/jj/publications/audio/snpd03a.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/snpd03slides.pdf:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   paper (pdf)   paper (ps)   audio 2/2   audio 1/2   slides 
  • J. Jürjens: Developing safety-critical systems with UML. In: P. Stevens (editors): The Unified Modeling Language (UML 2003), Springer Verlag, San Francisco, CA, Lecture Notes in Computer Science, vol. 2863, pp. 360-372, 2003. 6th International Conference.
    @InProceedings{dscs03, author = {J.~{J}{\"u}{r}jens}, title = {Developing safety-critical systems with {UML}}, booktitle = {The Unified Modeling Language (UML 2003)}, year = {2003}, editor = {P. Stevens}, volume = {2863}, series = {Lecture Notes in Computer Science}, pages = {360--372}, address = {San Francisco, CA}, publisher = {Springer Verlag}, note = {6th International Conference}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/uml03.wav:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/uml03.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/uml03.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-45221-8_31:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   audio   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens, S. H. Houmb: Development of Safety-Critical Systems and Model-Based Risk Analysis with UML. In: Dependable Computing, Springer Verlag, São Paulo (Brazil), Lecture Notes in Computer Science, vol. 2847, pp. 364-365, 2003.
    @InProceedings{dscsmbra03, author = {J.~{J}{\"u}{r}jens and S. H.~Houmb}, title = {Development of Safety-Critical Systems and Model-Based Risk Analysis with {UML}}, booktitle = {Dependable Computing}, year = {2003}, volume = {2847}, series = {Lecture Notes in Computer Science}, pages = {364--365}, address = {S\~{a}o Paulo (Brazil)}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-45214-0_28:URL}, publisher = {Springer Verlag}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   dblp   SpringerLink 
  • J. Jürjens: Abstracting from Failure Probabilities. In: Second International Conference on Application of Concurrency to System Design (ACSD 2001), Institute of Electrical and Electronics Engineers, Newcastle, pp. 53-64, 2001.
    @InProceedings{afp01, author = {J.~{J}{\"u}{r}jens}, title = {Abstracting from Failure Probabilities}, booktitle = {Second International Conference on Application of Concurrency to System Design (ACSD 2001)}, year = {2001}, pages = {53--64}, address = {Newcastle}, publisher = {Institute of Electrical and Electronics Engineers}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.6032}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/J00hSli.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/J00hWeb.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/J00hWeb.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   slides   paper (pdf)   paper (ps)   dblp 

UML-Modell-Analyse

  • J. Jürjens, Pasha Shabalin: A Foundation for Tool-Supported Critical Systems Development with UML. In: 11th Annual IEEE International Conference on the Engineering of Computer Based Systems (ECBS 2004), Brno, Czech Republic, Institute of Electrical and Electronics Engineers, 2004.
    @InProceedings{aftscsd04, author = {J.~{J}{\"u}{r}jens and Pasha Shabalin}, title = {A Foundation for Tool-Supported Critical Systems Development with {UML}}, booktitle = {11th Annual IEEE International Conference on the Engineering of Computer Based Systems (ECBS 2004)}, year = {2004}, address = {Brno, Czech Republic}, organization = {Institute of Electrical and Electronics Engineers}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ecbs04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, umlModelAnalysis}, }
     BibTeX   preprint   dblp 
  • J. Jürjens, P. Shabalin: Tools for Critical Systems Development with UML. In: N. Jardin Nunes, B. Selic, A. Silva, A. Toval (editors): UML Modeling Languages and Applications, \guillemotleftUML\guillemotright 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers, Springer Verlag, Lisbon, Portugal, Lecture Notes in Computer Science, vol. 3297, pp. 250-253, 2004. Revised Selected Papers.
    @InProceedings{tcsdu04, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tools for {Critical Systems Development with UML}}, booktitle = {{UML} Modeling Languages and Applications, {\guillemotleft}UML{\guillemotright} 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers}, year = {2004}, editor = {N. {Jardin Nunes} and B. Selic and A. Silva and A. Toval}, pages = {250--253}, series = {Lecture Notes in Computer Science}, volume = {3297}, address = {Lisbon, Portugal}, publisher = {Springer Verlag}, note = {Revised Selected Papers}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/uml04tool.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007%2F978-3-540-31797-5_27:URL}, keywords = {internationalConferences, umlModelAnalysis}, url = {https://doi.org/10.1007/978-3-540-31797-5\_27}, doi = {10.1007/978-3-540-31797-5\_27}, }
     BibTeX   DOI   preprint   dblp   SpringerLink 
  • J. Jürjens: A UML statecharts semantics with message-passing. In: G. B.Lamont , H. Haddad, G. Papadopoulos, B. Panda (editors): Proceedings of the 2002 Symposium of Applied Computing (SAC), ACM Press, Madrid, Spain, pp. 1009-1013, ACM, 2002. Proceedings of the 2002 ACM Symposium of Applied Computing.
    @InProceedings{auss02, author = {J.~{J}{\"u}{r}jens}, title = {A {UML} statecharts semantics with message-passing}, booktitle = {Proceedings of the 2002 Symposium of Applied Computing (SAC)}, year = {2002}, editor = {{G. B.} Lamont and H. Haddad and G. Papadopoulos and B. Panda}, pages = {1009--1013}, address = {Madrid, Spain}, organization = {ACM}, publisher = {ACM Press}, note = {Proceedings of the 2002 ACM Symposium of Applied Computing}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.3196}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/sac02.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2Talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, umlModelAnalysis, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   audio   slides   paper (pdf)   paper (ps)   dblp 
  • J. Jürjens: Formal Semantics for Interacting UML subsystems. In: B. Jacobs, A. Rensink, Bart Jacobs, Arend Rensink (editors): 5th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002), Kluwer, Twente, pp. 29-44, ifip, 2002.
    @InProceedings{fsius02, author = {J.~{J}{\"u}{r}jens}, title = {Formal Semantics for Interacting {UML} subsystems}, booktitle = {5th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002)}, year = {2002}, editor = {B. Jacobs and A. Rensink and Bart Jacobs and Arend Rensink}, pages = {29--44}, volume = {81}, address = {Twente}, organization = {ifip}, publisher = {Kluwer}, file = {audio (MS outlook):http\://rgse.uni-koblenz.de/jj/publications/audio/fmoods02.msg:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fmoods02Talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/fmoods02.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/fmoods02.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007%2F978-0-387-35496-5_4:URL}, keywords = {internationalConferences, umlModelAnalysis}, }
     BibTeX   audio (MS outlook)   slides   paper (pdf)   paper (ps)   dblp   SpringerLink