Prof. Dr. Jan Jürjens - Zeitschriften / Buchkapitel

Disclaimer

Zeitschriftenartikel

Mathematische Logik

  • J. Jürjens: On a problem of Gabriel and Ulmer. In: Journal of Pure and Applied Algebra, vol. 158, pp. 183-196, 2001.
    @Article{jpaa01, author = {J.~{J}{\"u}{r}jens}, title = {On a problem of {Gabriel and Ulmer}}, journal = {Journal of Pure and Applied Algebra}, year = {2001}, volume = {158}, pages = {183--196}, DOI = {10.1016/S0022-4049(00)00043-8}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/gurevd.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/gurevd.ps:URL;paper (gz):http\://rgse.uni-koblenz.de/jj/publications/papers/gurevd.ps.gz:URL}, keywords = {mathematicalLogic, journalPaper}, URL = {http://www.jurjens.de/jan}, }
     BibTeX   DOI   URL   paper (pdf)   paper (ps)   paper (gz) 

Secure Software Engineering

  • R. Heinrich, S. Gärtner, T.-M. Hesse, T. Ruhroth, R. Reussner, K. Schneider, B. Paech, J. Jürjens: The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution. In: International Journal of Software Engineering and Knowledge Engineering (IJSEKE), 2015.
    @Article{ijseke16, author = {R.~Heinrich and S.~G\"artner and T.-M.~Hesse and T.~Ruhroth and R.~Reussner and K.~Schneider and B.~Paech and J.~{J}{\"u}{r}jens}, title = {The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution}, journal = {International Journal of Software Engineering and Knowledge Engineering (IJSEKE)}, year = {2015}, keywords = {modelbasedSecurityEngineering, softwareEvolution, secvolution}, }
     BibTeX 
  • J. Bürger, J. Jürjens, S. Wenzel: Restoring Security of Evolving Software Models using Graph-Transformation. In: International Journal on Software Tools for Technology Transfer (STTT), vol. 17, no. 3, pp. 267-289, 2015.
    @Article{BJW15, author = {J.~B\"urger and J.~J\"urjens and S.~Wenzel}, title = {Restoring Security of Evolving Software Models using Graph-Transformation}, journal = {International Journal on Software Tools for Technology Transfer (STTT)}, year = {2015}, volume = {17}, number = {3}, pages = {267--289}, doi = {10.1007/s1000901403648}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/bjw15.pdf:URL}, keywords = {modelbasedSecurityEngineering, softwareEvolution, secvolution}, }
     BibTeX   DOI   preprint 
  • F. Dupressoir, A. D. Gordon, J. Jürjens, D. Naumann: Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. In: Journal of Computer Security, vol. 22, no. 5, pp. 823-866, 2014. Special issue with best papers from the 24th IEEE Computer Security Foundations Symposium (CSF).
    @Article{DGJN14, author = {F.~Dupressoir and A. D.~Gordon and J.~J{\"u}rjens and D.~Naumann}, title = {Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols}, journal = {Journal of Computer Security}, volume = {22}, number = {5}, pages = {823--866}, year = {2014}, note = {Special issue with best papers from the 24th IEEE Computer Security Foundations Symposium (CSF)}, file = {preprint:http\://arxiv.org/abs/1312.6532:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {10.3233/JCS-140508}, keywords = {selectedPub,modelbasedSecurityEngineering,secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • S. Wenzel, D. Warzecha, J. Jürjens, M. Ochoa: UMLchange - Specifying Model Changes to Support Security Verification of Potential Evolution. In: Journal of Computer Standards & Interfaces, vol. 36, pp. 776-791, 2014. Special Issue on Security in Information Systems.
    @Article{CSI14wwjo, author = {S.~Wenzel and D.~Warzecha and J.~J{\"u}rjens and M.~Ochoa}, title = {{UMLchange} -- Specifying Model Changes to Support Security Verification of Potential Evolution}, journal = {Journal of Computer Standards \& Interfaces}, year = {2014}, volume = {36}, issue = {4}, pages = {776--791}, note = {Special Issue on Security in Information Systems.}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/csi14wwjo.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {http://doi.org/10.1016/j.csi.2013.12.011}, keywords = {selectedPub,modelbasedSecurityEngineering,softwareEvolution, secvolution}, }
     BibTeX   DOI   preprint   dblp 
  • M. Felderer, B. Katt, P. Kalb, J. Jürjens, M. Ochoa, F. Paci, L. M. S. Tran, T. T. Tun, K. Yskout, R. Scandariato, F. Piessens, D. Vanoverberghe, E. Fourneret, M. Gander, B. Solhaug, R. Breu: Evolution of Security Engineering Artifacts: A State of the Art Survey. In: International Journal of Secure Software Engineering (IJSSE), vol. 5, no. 4, pp. 48-98, 2014.
    @Article{ijsse14, author = {M.~Felderer and B.~Katt and P.~Kalb and J.~J{\"u}rjens and M.~Ochoa and F.~Paci and L. M. S.~Tran and T. T.~Tun and K.~Yskout and R.~Scandariato and F.~Piessens and D.~Vanoverberghe and E.~Fourneret and M.~Gander and B.~Solhaug and R.~Breu}, title = {Evolution of Security Engineering Artifacts: A State of the Art Survey}, journal = {International Journal of Secure Software Engineering (IJSSE)}, year = {2014}, volume = {5}, number = {4}, pages = {48--98}, file = {preprint:http://www.researchgate.net/profile/Michael_Felderer/publication/271213941_Evolution_of_Security_Engineering_Artifacts_A_State_of_the_Art_Survey/links/54c28b210cf2911c7a492759.pdf?ev=pub_ext_doc_dl&origin=publication_detail&inViewer=true:URL}, keywords = {modelbasedSecurityEngineering, softwareEvolution}, }
     BibTeX   preprint 
  • S. Taubenberger, J. Jürjens, Y. Yu, B. Nuseibeh: Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models. In: Journal on Information Management and Computer Security (IMCS), vol. 21, no. 3, pp. 202-223, 2013.
    @Article{TauJurYuNus13, author = {S.~Taubenberger and J.~{J}{\"u}{r}jens and Y.~Yu and B.~Nuseibeh}, title = {Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models}, journal = {Journal on Information Management and Computer Security (IMCS)}, year = {2013}, volume = {21}, number = {3}, pages = {202--223}, DOI = {http://doi.org/10.1108/IMCS-09-2012-0054}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/imcs13TJYN.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering,secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • K. Schneider, E. Knauss, S. Houmb, S. Islam, J. Jürjens: Enhancing Security Requirements Engineering by Organisational Learning. In: Requirements Engineering Journal (REJ), vol. 17, no. 1, pp. 35-56, 2012.
    @Article{rej11SKHIJ, author = {K.~Schneider and E.~Knauss and S.~Houmb and S.~Islam and J.~J{\"u}rjens}, title = {Enhancing Security Requirements Engineering by Organisational Learning}, journal = {Requirements Engineering Journal (REJ)}, year = {2012}, volume = {17}, number = {1}, pages = {35--56}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/rej12SKHIJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s00766-011-0141-0:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 
  • S. Islam, H. Mouratidis, J. Jürjens: A Framework to Support Alignment of Secure Software Engineering with Legal Regulations. In: Journal of Software and Systems Modeling (SoSyM), Springer-Verlag, vol. 10, no. 3, pp. 369-394, 2011.
    @Article{sosym11IMJ, author = {S.~Islam and H.~Mouratidis and J.~{J}{\"u}{r}jens}, title = {A Framework to Support Alignment of Secure Software Engineering with Legal Regulations}, journal = {Journal of Software and Systems Modeling (SoSyM), Springer-Verlag}, year = {2011}, volume = {10}, pages = {369--394}, number = {3}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/sosym10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s10270-010-0154-z:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering, secureSoftwareEngineeringCompliance}, }
     BibTeX   preprint   dblp   SpringerLink 
  • A. Bauer, J. Jürjens, Y. Yu: Run-Time Security Traceability for Evolving Systems. In: The Computer Journal, vol. 54, no. 1, pp. 58-87, 2011.
    @Article{cj11BJY, author = {A.~Bauer and J.~{J}{\"u}{r}jens and Y.~Yu}, title = {Run-Time Security Traceability for Evolving Systems}, journal = {The Computer Journal}, year = {2011}, volume = {54}, pages = {58--87}, number = {1}, DOI = {http://doi.org/10.1093/comjnl/bxq042}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/compjour10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {selectedPub,modelbasedSecurityEngineering,vorsecurestreams, softwareEvolution}, }
     BibTeX   DOI   preprint   dblp 
  • H. Mouratidis, J. Jürjens: From Goal-Driven Security Requirements Engineering to Secure Design. In: International Journal of Intelligent Systems (IJIS) (Wiley Interscience), International Journal of Intelligent Systems, vol. 25, no. 8, pp. 813-840, 2010. Special issue on "Goal-Driven Requirements Engineering".
    @InProceedings{fgdsresd10, author = {H.~Mouratidis and J.~{J}{\"u}{r}jens}, title = {From Goal-Driven Security Requirements Engineering to Secure Design}, booktitle = {International Journal of Intelligent Systems (IJIS) (Wiley Interscience)}, year = {2010}, volume = {25}, number = {8}, series = {International Journal of Intelligent Systems}, pages = {813--840}, note = {Special issue on {"}Goal-Driven Requirements Engineering{"}}, DOI = {http://doi.org/10.1002/int.20432}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ijis10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • S. H. Houmb, S. Islam, E. Knauss, J. Jürjens, K. Schneider: Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec. In: Requirements Engineering Journal (REJ), Springer-Verlag, vol. 15, no. 1, pp. 63-93, 2010. Special issue on Security Requirements Engineering.
    @Article{rej10HIKJS, author = {S. H.~Houmb and S.~Islam and E.~Knauss and J.~{J}{\"u}{r}jens and K.~Schneider}, title = {Eliciting Security Requirements and Tracing them to Design: An Integration of {Common Criteria, Heuristics, and UMLsec}}, journal = {Requirements Engineering Journal (REJ), Springer-Verlag}, year = {2010}, volume = {15}, pages = {63--93}, number = {1}, note = {Special issue on Security Requirements Engineering}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/JRE_SR_Elicitation.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s00766-009-0093-9:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 
  • A. Bauer, J. Jürjens: Runtime Verification of Cryptographic Protocols. In: Computers and Security, Computers and Security, vol. 29, no. 3, pp. 315-330, 2010.
    @InProceedings{cs10BJ, author = {A.~Bauer and J.~{J}{\"u}{r}jens}, title = {Runtime Verification of Cryptographic Protocols}, booktitle = {Computers and Security}, year = {2010}, volume = {29}, number = {3}, series = {Computers and Security}, pages = {315--330}, DOI = {10.1016/j.cose.2009.09.003}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/comsec10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: A domain-specific language for cryptographic protocols based on streams. In: Journal of Logic and Algebraic Programming, vol. 78, no. 2, pp. 54-73, 2009.
    @Article{jlap09J, author = {J.~{J}{\"u}{r}jens}, title = {A domain-specific language for cryptographic protocols based on streams}, journal = {Journal of Logic and Algebraic Programming}, year = {2009}, volume = {78}, pages = {54--73}, number = {2}, DOI = {http://doi.org/10.1016/j.jlap.2008.08.006}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/jlap07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • M. Woodside, D. C. Petriu, D. B. Petriu, J. Xu, T. Israr, G. Georg, R. France, J. M. Bieman, S. H. Houmb, Jan Jürjens: Performance Analysis of Security Aspects by Weaving Scenarios from UML Models. In: Journal of Systems and Software, vol. 82, no. 1, pp. 56-74, 2009.
    @Article{WPP+09, author = {M.~Woodside and D. C.~Petriu and D. B.~Petriu and J.~Xu and T.~Israr and G.~Georg and R.~France and J. M.~Bieman and S. H.~Houmb and Jan {J}{\"u}{r}jens}, title = {Performance Analysis of Security Aspects by Weaving Scenarios from {UML} Models}, journal = {Journal of Systems and Software}, year = {2009}, volume = {82}, pages = {56--74}, number = {1}, DOI = {10.1016/j.jss.2008.03.067}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/JSS-WOSP07-accepted.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering, securityPerformance}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, R. Rumm: Model-based Security Analysis of the German Health Card Architecture. In: Methods of Information in Medicine, vol. 47, no. 5, pp. 409-416, 2008. Special section on Model-based Development of Trustworthy Health Information Systems.
    @Article{mothis08JR, author = {J.~{J}{\"u}{r}jens and R.~Rumm}, title = {Model-based Security Analysis of the German Health Card Architecture}, journal = {Methods of Information in Medicine}, year = {2008}, volume = {47}, pages = {409--416}, number = {5}, note = {Special section on Model-based Development of Trustworthy Health Information Systems}, DOI = {http://doi.org/10.3414/ME9122}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/mothis08web.pdf:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   preprint 
  • J. Jürjens, P. Shabalin: Tools for Secure Systems Development with UML. In: International Journal on Software Tools for Technology Transfer (STTT), vol. 9, no. 5--6, pp. 527-544, 2007. Invited submission to the special issue for FASE 2004/05.
    @Article{sttt07JS, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tools for Secure Systems Development with {UML}}, journal = {International Journal on Software Tools for Technology Transfer (STTT)}, year = {2007}, volume = {9}, pages = {527--544}, number = {5--6}, note = {Invited submission to the special issue for FASE 2004/05}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/sttt07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s10009-007-0048-8:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 

Zuverlässigkeit

  • D. Zaitsev, J. Jürjens: Programming in Sleptsov Net Language for Systems Control. In: Advances in Mechanical Engineering, 2016.
    @InProceedings{ame16, author = {D.~Zaitsev and J.~{J}{\"u}{r}jens}, title = {Programming in Sleptsov Net Language for Systems Control}, booktitle = {Advances in Mechanical Engineering}, year = {2016}, keywords = {dependability, dependableSystems}, }
     BibTeX 
  • M. S. Sadi, D. G. Myers, C. O. Sanchez, J. Jürjens: Component criticality analysis to minimize soft errors risk. In: International Journal of Computer Systems Science & Engineering, vol. 25, no. 5, pp. 23-37, 2010.
    @Article{ijcsse10SMSJ, author = {M. S.~Sadi and D. G.~Myers and C. O.~Sanchez and J.~{J}{\"u}{r}jens}, title = {Component criticality analysis to minimize soft errors risk}, journal = {International Journal of Computer Systems Science \& Engineering}, year = {2010}, volume = {25}, number = {5}, pages = {23--37}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ijcsse10SMSJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {dependability, dependableSystems}, }
     BibTeX   preprint   dblp 

Eingeladene Zeitschriftenartikel

  • J. Jürjens: Componentware for Critical Systems. In: Journal of Object Technology, vol. 3, no. 4, pp. 47-50, 2004.
    @Article{cwcs04, author = {J.~{J}{\"u}{r}jens}, title = {Componentware for Critical Systems}, journal = {Journal of Object Technology}, year = {2004}, volume = {3}, pages = {47--50}, number = {4}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/jot04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {http://doi.org/10.5381/jot.2004.3.4.a3}, keywords = {invitedJournalPapers, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Developing Security-Critical Applications with UMLsec - A Short Walk-Through. In: Novatica, vol. 168, 2004.
    @Article{dscaumlsec04, author = {J.~{J}{\"u}{r}jens}, title = {Developing Security-Critical Applications with {UMLsec} -- A Short Walk-Through}, journal = {Novatica}, year = {2004}, volume = {168}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.73.2657}, file = {paper (spanish):http\://rgse.uni-koblenz.de/jj/publications/papers/novatica04-spa.pdf:URL;paper (english):http\://rgse.uni-koblenz.de/jj/publications/papers/novatica04.pdf:URL}, keywords = {conferences, invitedJournalPapers, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX   DOI   paper (spanish)   paper (english) 
  • J. Jürjens: Foundations for Designing Secure Architectures. In: First International Workshop on Views On Designing Complex Architectures (VODCA 2004), Bertinoro, pp. 31-46, 2006. Invited talk.
    @InProceedings{fdsa04, author = {J.~{J}{\"u}{r}jens}, title = {Foundations for Designing Secure Architectures}, booktitle = {First International Workshop on Views On Designing Complex Architectures (VODCA 2004)}, journal = {Electr. Notes Theor. Comput. Sci.}, volume = {142}, pages = {31--46}, year = {2006}, address = {Bertinoro}, note = {Invited talk}, DOI = {10.1016/j.entcs.2005.07.012}, file = {photo:http\://rgse.uni-koblenz.de/jj/pics/vodca04.jpg:URL;audio:http\://rgse.uni-koblenz.de/jj/publications/audio/vodca04.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/vodca04talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/vodca04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {workshop, invitedJournalPapers, invitedWorkshop, secureSoftwareEngineeringFoundationsOfSecurity}, }
     BibTeX   DOI   photo   audio   slides   preprint   dblp 

Programmiersprachensemantik

  • J. Jürjens: Games in the Semantics of Programming Languages. In: Journal Synthese, vol. 133, no. 1-2, pp. 131-158, 2002.
    @Article{gspl02, author = {J.~{J}{\"u}{r}jens}, title = {Games in the Semantics of Programming Languages}, journal = {Journal Synthese}, year = {2002}, volume = {133}, number = {1-2}, pages = {131--158}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.69}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/gamesrevd.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/gamesrevd.ps:URL;paper (gz):http\://rgse.uni-koblenz.de/jj/publications/papers/gamesrevd.ps.gz:URL;SpringerLink:http://link.springer.com/article/10.1023/A%3A1020883810034:URL}, keywords = {programmingLanguageSemantics, codeAnalysis}, URL = {http://www.wkap.nl/journalhome.htm/0039-7857}, }
     BibTeX   DOI   URL   paper (pdf)   paper (ps)   paper (gz)   SpringerLink 

Elektronische Zeitschriften

  • J. Jürjens: Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project. In: Electr. Notes Theor. Comput. Sci., vol. 250, no. 1, pp. 123-136, 2009.
    @Article{DBLP:journals/entcs/Jurjens09, author = {J.~{J}{\"u}{r}jens}, title = {Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project}, journal = {Electr. Notes Theor. Comput. Sci.}, year = {2009}, volume = {250}, pages = {123--136}, number = {1}, bibsource = {DBLP, http://dblp.uni-trier.de}, booktitle = {Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems (AVOCS 2007)}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {http://doi.org/10.1016/j.entcs.2009.08.009}, keywords = {electronicJournals, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   dblp 
  • J. Jürjens: Model-based Security Testing using UMLsec. In: Electronic Notes in Theoretical Computer Science, vol. 220, no. 1, pp. 93-104, 2008.
    @Article{entcs08J, title = {Model-based Security Testing using {UMLsec}}, author = {J.~{J}{\"u}{r}jens}, journal = {Electronic Notes in Theoretical Computer Science}, year = {2008}, number = {1}, pages = {93--104}, series = {Electronic Notes in Theoretical Computer Science}, volume = {220}, DOI = {10.1016/j.entcs.2008.11.008}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/mbt08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {electronicJournals, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX   DOI   preprint   dblp 

Nicht-English Zeitschriftenartikel

  • J. Jürjens, Lidiya Buda: Berechtigungsvergabe in SAP Systemen und ihre automatische Überprüfung. In: Datenschutz und Datensicherheit, 2004.
    @InProceedings{bsaps04, author = {J.~{J}{\"u}{r}jens and Lidiya Buda}, title = {Berechtigungsvergabe in SAP Systemen und ihre automatische {{\"U}}berpr{\"u}fung}, booktitle = {Datenschutz und Datensicherheit}, year = {2004}, keywords = {nonEnglishJournals, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 

Eingeladene Buchkapitel

  • T. Humberg, J. Jürjens: Compliance in Clouds. In: Encyclopedia of Cloud Computing, 2016
    @InCollection{clouds16, author = {T.~Humberg and J.~{J}{\"u}{r}jens}, title = {Compliance in Clouds}, booktitle = {Encyclopedia of Cloud Computing}, year = {2016}, keywords = {invitedBookChapters,secureSoftwareEngineeringSecureService/CloudBasedSystems}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space and European Data Space. In: BITKOM Germany - Excellence in Big Data, 2016
    @InCollection{bitkom16, author = {J.~{J}{\"u}{r}jens}, title = {Industrial Data Space and European Data Space}, booktitle = {Germany - Excellence in Big Data}, publisher = {BITKOM}, year = {2016}, keywords = {invitedBookChapters, dataanalysis}, }
     BibTeX 
  • J. Jürjens, Eduardo Fernandez: Secure Database Development. In: Springer pp. TBD Encyclopedia of Database Systems, 2015. Invited chapter, to be published.
    @InCollection{eds14, author = {J.~{J}{\"u}{r}jens and Eduardo Fernandez}, title = {Secure Database Development}, booktitle = {Encyclopedia of Database Systems}, year = {2015}, pages = {TBD}, publisher = {Springer}, note = {Invited chapter, to be published}, keywords = {invitedBookChapters, databaseSecurity}, }
     BibTeX 
  • J. Bürger, J. Jürjens, T. Ruhroth, S. Gärtner, K. Schneider: Model-based Security Engineering: Managed Co-Evolution of Security Knowledge and Software Models. In: A. Aldini, J. Lopez, F. Martinelli (editors): Lecture Notes in Computer Science pp. 34-53 Foundations of Security Analysis and Design VII: FOSAD Tutorial Lectures, 2014
    @InCollection{fosad14, author = {J.~B{\"u}rger and J.~{J}{\"u}{r}jens and T.~Ruhroth and S.~G{\"a}rtner and K.~Schneider}, title = {Model-based Security Engineering: Managed Co-Evolution of Security Knowledge and Software Models}, booktitle = {Foundations of Security Analysis and Design VII: FOSAD Tutorial Lectures}, year = {2014}, editor = {A.~Aldini and J.~Lopez and F.~Martinelli}, volume = {8604}, series = {Lecture Notes in Computer Science}, pages = {34--53}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/fosad14.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-319-10082-1_2:URL}, keywords = {invitedBookChapters, softwareEvolution, secvolution}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens, K. Schneider: Beyond One-Shot Security. In: Verlagshaus Monsenstein und Vannerdat pp. 131-141 Modelling and Quality in Requirements Engineering (Essays Dedicated to Martin Glinz on the Occasion of His 60th Birthday), 2012
    @InCollection{JurSch12, author = {J.~{J}{\"u}{r}jens and K.~Schneider}, title = {Beyond One-Shot Security}, booktitle = {Modelling and Quality in Requirements Engineering (Essays Dedicated to Martin Glinz on the Occasion of His 60th Birthday)}, year = {2012}, pages = {131--141}, publisher = {Verlagshaus Monsenstein und Vannerdat}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/glinz12JS.pdf:URL}, keywords = {invitedBookChapters, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint 
  • J. Jürjens, Martín Ochoa, Holger Schmidt, Loïc Marchal, Siv Hilde Houmb, Shareeful Islam: Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications. In: Bertinoro (Italy) pp. 504-526 11th School on Formal Methods (SFM'11), 2011
    @InCollection{sfm11JOSMHI, author = {J.~{J}{\"u}{r}jens and Mart{\'i}n Ochoa and Holger Schmidt and Lo{\"i}c Marchal and Siv Hilde Houmb and Shareeful Islam}, title = {Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications}, booktitle = {11th School on Formal Methods (SFM'11)}, year = {2011}, volume = {6659}, pages = {504--526}, address = {Bertinoro (Italy)}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/sfm11JOSMHI.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-21455-4_15:URL}, keywords = {graduateSchoolLectures, invitedBookChapters, softwareEvolution}, }
     BibTeX   preprint   dblp   SpringerLink 
  • S. Höhn, J. Jürjens, L. Lowis, R. Accorsi: Identification of Vulnerabilities in Web Services using Model-based Security. In: C. Gutierrez, E. Fernandez-Medina, M. Piattini: (editors): IGI Global Web Services Security Development and Architecture: Theoretical and Practical Issues, 2010. Print ISBN-13: 978-1-60566-950-2.
    @InCollection{ivwsmbs10, author = {S.~H{\"o}hn and J.~{J}{\"u}{r}jens and L.~Lowis and R.~Accorsi}, title = {Identification of Vulnerabilities in Web Services using Model-based Security}, booktitle = {Web Services Security Development and Architecture: Theoretical and Practical Issues}, year = {2010}, editor = {C. Gutierrez and E. Fernandez-Medina and M. Piattini:}, publisher = {IGI Global}, note = {Print ISBN-13: 978-1-60566-950-2}, keywords = {invitedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Security and Dependability Engineering. In: Springer Lecture Notes in Computer Science pp. 21-36 Security and dependability for Ambient Intelligence, 2009. Invited chapter.
    @InCollection{sde09, author = {J.~{J}{\"u}{r}jens}, title = {Security and Dependability Engineering}, booktitle = {Security and dependability for Ambient Intelligence}, year = {2009}, number = {3655}, series = {Lecture Notes in Computer Science}, pages = {21--36}, publisher = {Springer}, note = {Invited chapter}, crossref = {DBLP:series/ais/45}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/jurjens2.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-0-387-88775-3_2:URL}, keywords = {invitedBookChapters, dependableSystems}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens, Eduardo Fernandez: Secure Database Development. In: Ling Liu, M. Tamer (editors): Springer pp. 2528-2534 Encyclopedia of Database Systems, 2009. Invited chapter, ISBN 978-0-387-35544-3.
    @InCollection{sdd09, author = {J.~{J}{\"u}{r}jens and Eduardo Fernandez}, title = {Secure Database Development}, booktitle = {Encyclopedia of Database Systems}, year = {2009}, editor = {Ling Liu and M. Tamer {\"O}zsu}, pages = {2528--2534}, publisher = {Springer}, note = {Invited chapter, ISBN 978-0-387-35544-3}, crossref = {DBLP:reference/db/2009}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/dbsec08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/referenceworkentry/10.1007/978-0-387-39940-9_329:URL}, keywords = {invitedBookChapters, databaseSecurity}, }
     BibTeX   preprint   dblp   SpringerLink 
  • S. H. Houmb, G. Georg, J. Jürjens, R. B. France: An Integrated Security Verification and Security Solution Design Trade-off Analysis Approach. In: H. Mouratidis (editors): Idea Group pp. 190-219 Integrating Security and Software Engineering: Advances and Future Vision, 2006. Invited chapter.
    @InCollection{HGJF06, author = {S. H.~Houmb and G.~Georg and J.~{J}{\"u}{r}jens and R. B.~France}, title = {An Integrated Security Verification and Security Solution Design Trade-off Analysis Approach}, booktitle = {Integrating Security and Software Engineering: Advances and Future Vision}, year = {2006}, editor = {H. Mouratidis}, pages = {190--219}, publisher = {Idea Group}, note = {Invited chapter}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.741}, file = {preprint:http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.124.741&rep=rep1&type=pdf:URL}, keywords = {invitedBookChapters, secureSoftwareEngineeringAspectOrientedSecurity}, }
     BibTeX   DOI   preprint 
  • J. Jürjens: Model-based Security Engineering with UML. In: A. Aldini, R. Gorrieri, F. Martinelli (editors): Lecture Notes in Computer Science pp. 42-77 Foundations of Security Analysis and Desing III: FOSAD 2004/2005 Tutorial Lectures, 2005
    @InCollection{fosad05, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering with {UML}}, booktitle = {Foundations of Security Analysis and Desing III: FOSAD 2004/2005 Tutorial Lectures}, year = {2005}, editor = {A. Aldini and R. Gorrieri and F. Martinelli}, volume = {3655}, series = {Lecture Notes in Computer Science}, pages = {42--77}, file = {slides (part 1/2):http\://rgse.uni-koblenz.de/jj/umlsec/fosad04handout1.pdf:URL;slides (part 2/2):http\://rgse.uni-koblenz.de/jj/umlsec/fosad04handout2.pdf:URL;book chapter:http\://rgse.uni-koblenz.de/jj/publications/papers/fosad04.pdf:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11554578_2:URL}, keywords = {graduateSchoolLectures, invitedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides (part 1/2)   slides (part 2/2)   book chapter   SpringerLink 

Beigetragene Buchkapitel

  • A. Nhlabatsi, A. Bandara, Shinpei Hayashi, C. B. Haley, J. Jürjens, Haruhiko Kaiya, Atsuto Kubo, R. Laney, H. Mouratidis, B. Nuseibeh, Yasuyuki Tahara, T. T. Tun, Hironori Washizaki, Nobukazu Yoshioka, Yijun Yu: Security Patterns: Comparing Modeling Approaches. In: H. Mouratidis (editors): IGI Global Software Engineering for Secure Systems: Industrial and Research Perspectives, 2010
    @InCollection{spcma10, author = {A.~Nhlabatsi and A.~Bandara and Shinpei Hayashi and C. B.~Haley and J.~{J}{\"u}{r}jens and Haruhiko Kaiya and Atsuto Kubo and R. Laney and H.~Mouratidis and B.~Nuseibeh and Yasuyuki Tahara and T. T.~Tun and Hironori Washizaki and Nobukazu Yoshioka and Yijun Yu}, title = {Security Patterns: Comparing Modeling Approaches}, booktitle = {Software Engineering for Secure Systems: Industrial and Research Perspectives}, year = {2010}, editor = {H. Mouratidis}, publisher = {IGI Global}, file = {preprint:https://books.google.de/books?id=RBTK7QfYquoC&pg=PA75&lpg=PA75&dq=%22Security+Patterns:+Comparing+Modeling+Approaches%22&source=bl&ots=ZhKGFa2fab&sig=maktkbR5rb0nVDmDjtx0KepP004&hl=de&sa=X&ei=6Ve5VN_3NYbqUoeIgig&ved=0CEsQ6AEwBA#v=onepage&q=%22Security%20Patterns%3A%20Comparing%20Modeling%20Approaches%22&f=false:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   preprint 
  • E. B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki, J. Jürjens, M. VanHilst, G. Pernul: Using security patterns to develop secure systems. In: H. Mouratidis (editors): IGI Global Software Engineering for Secure Systems: Industrial and Research Perspectives, 2010
    @InCollection{uspdss10, author = {E. B.~Fernandez and Nobukazu Yoshioka and Hironori Washizaki and J.~{J}{\"u}{r}jens and M.~VanHilst and G.~Pernul}, title = {Using security patterns to develop secure systems}, booktitle = {Software Engineering for Secure Systems: Industrial and Research Perspectives}, year = {2010}, editor = {H. Mouratidis}, publisher = {IGI Global}, file = {preprint:http\://epub.uni-regensburg.de/18787/1/Mouratidis2010Ch2.pdf:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   preprint 
  • J. Jürjens: Model-Based Security Engineering with UML: Introducing Security Aspects. In: Springer Lecture Notes in Computer Science pp. 64-87 International Symposium on Formal Methods for Components and Objects (FMCO 2005), 2006
    @InCollection{mbseuml06, author = {J.~{J}{\"u}{r}jens}, title = {Model-Based Security Engineering with {UML}: Introducing Security Aspects}, booktitle = {International Symposium on Formal Methods for Components and Objects (FMCO 2005)}, year = {2006}, volume = {4111}, series = {Lecture Notes in Computer Science}, pages = {64--87}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fmco05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11804192_4:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringAspectOrientedSecurity}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens, Stefan Wagner: Component-Based Development of Dependable Systems with UML. In: Springer pp. 320-344 Component-Based Software Development for Embedded Systems -- An Overview on Current Research Trends, 2005
    @InCollection{cbdds05, author = {J.~{J}{\"u}{r}jens and Stefan Wagner}, title = {Component-Based Development of Dependable Systems with {UML}}, booktitle = {Component-Based Software Development for Embedded Systems -- An Overview on Current Research Trends}, year = {2005}, volume = {3778}, pages = {320--344}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/cbsd05.pdf:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11591962_16:URL}, keywords = {contributedBookChapters, dependableSystems}, }
     BibTeX   preprint   SpringerLink 
  • J. Jürjens, P. Shabalin: Tool-support for Model-Driven Development of Security-Critical Systems with UML. In: Springer Model-driven Software Development -- Volume II of Research and Practice in Software Engineering, 2005
    @InCollection{tsmdd05, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tool-support for Model-Driven Development of Security-Critical Systems with {UML}}, booktitle = {Model-driven Software Development -- Volume II of Research and Practice in Software Engineering}, year = {2005}, publisher = {Springer}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.7379}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/mdsd05.pdf:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-28554-7_3:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   SpringerLink 
  • J. Jürjens, S. H. Houmb: Risk-Driven Development of Security-Critical Systems using UMLsec. In: klu pp. 21-53 IFIP International Federation for Information Processing, 2004
    @InCollection{rsdscs04, author = {J.~{J}{\"u}{r}jens and S. H.~Houmb}, title = {Risk-Driven Development of Security-Critical Systems using {UMLsec}}, booktitle = {IFIP International Federation for Information Processing}, year = {2004}, volume = {157}, pages = {21--53}, publisher = {klu}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/wcc04JH.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/1-4020-8159-6_2:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens, P. Shabalin: XML-based Analysis of UML Models for Critical Systems Development. In: IDEA Group Publishing Advances in UML and XML Based Software Evolution, 2004
    @InCollection{xmlba04, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {{XML}-based Analysis of {UML} Models for Critical Systems Development}, booktitle = {Advances in UML and XML Based Software Evolution}, year = {2004}, publisher = {IDEA Group Publishing}, DOI = {10.4018/978-1-59140-621-1.ch011}, file = {preprint:https://books.google.de/books?id=TS9bOJYS93oC&pg=PA259&lpg=PA259&dq=%22XML-based+Analysis+of+UML+Models+for+Critical+Systems+Development%22&source=bl&ots=v0kuJcpfY7&sig=BUd4sXIGEkczI0lktDKdWYS3ShY&hl=de&sa=X&ei=l1i5VK30AobkaICcgrAP&ved=0CDgQ6AEwAw#v=onepage&q=%22XML-based%20Analysis%20of%20UML%20Models%20for%20Critical%20Systems%20Development%22&f=false:URL}, keywords = {contributedBookChapters, umlModelAnalysis}, }
     BibTeX   DOI   preprint