Prof. Dr. Jan Jürjens - Publications (Chronologically)

Some recent papers may not be online yet; please ask me for a copy.

My publication list at the DBLP Bibliography Server.

Disclaimer


2019


  • Amir Shayan Ahmadian, Daniel Strüber, Jan Jürjens: Privacy-enhanced system design modeling based on privacy features. In: Chih-Cheng Hung, George A. Papadopoulos (editors): Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, April 8-12, 2019, ACM, pp. 1492-1499, 2019.
    @inproceedings{DBLP:conf/sac/Ahmadian0J19, author = {Amir Shayan Ahmadian and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {Privacy-enhanced system design modeling based on privacy features}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {1492--1499}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297431}, doi = {10.1145/3297280.3297431}, }
     BibTeX   DOI 
  • Qusai Ramadan, Amir Shayan Ahmadian, Jan Jürjens, Steffen Staab, Daniel Strüber: Explaining Algorithmic Decisions with respect to Fairness. In: Steffen Becker, Ivan Bogicevic, Georg Herzwurm, Stefan Wagner (editors): Software Engineering and Software Management, SE/SWM 2019, Stuttgart, Germany, February 18-22, 2019, GI, LNI, vol. P-292, pp. 161-162, 2019.
    @inproceedings{DBLP:conf/se/RamadanAJS019, author = {Qusai Ramadan and Amir Shayan Ahmadian and Jan J{\"{u}}rjens and Steffen Staab and Daniel Str{\"{u}}ber}, editor = {Steffen Becker and Ivan Bogicevic and Georg Herzwurm and Stefan Wagner}, title = {Explaining Algorithmic Decisions with respect to Fairness}, booktitle = {Software Engineering and Software Management, {SE/SWM} 2019, Stuttgart, Germany, February 18-22, 2019}, pages = {161--162}, series = {{LNI}}, volume = {{P-292}}, publisher = {{GI}}, year = {2019}, url = {https://doi.org/10.18420/se2019-50}, doi = {10.18420/se2019-50}, }
     BibTeX   DOI 
  • Jens Bürger, Daniel Strüber, Stefan Gärtner, Thomas Ruhroth, Jan Jürjens, Kurt Schneider: A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary). In: Steffen Becker, Ivan Bogicevic, Georg Herzwurm, Stefan Wagner (editors): Software Engineering and Software Management, SE/SWM 2019, Stuttgart, Germany, February 18-22, 2019, LNI, vol. P-292, pp. 179-180, 2019.
    @inproceedings{DBLP:conf/se/Burger00RJS19, author = {Jens B{\"{u}}rger and Daniel Str{\"{u}}ber and Stefan G{\"{a}}rtner and Thomas Ruhroth and Jan J{\"{u}}rjens and Kurt Schneider}, editor = {Steffen Becker and Ivan Bogicevic and Georg Herzwurm and Stefan Wagner}, title = {A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary)}, booktitle = {Software Engineering and Software Management, {SE/SWM} 2019, Stuttgart, Germany, February 18-22, 2019}, pages = {179--180}, series = {{LNI}}, volume = {{P-292}}, year = {2019}, url = {https://doi.org/10.18420/se2019-57}, doi = {10.18420/se2019-57}, }
     BibTeX   DOI 
  • S. Peldszus, K. Tuma, D. Strüber, J. Jürjens, R. Scandariato: Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings. In: ACM/IEEE 22th International Conference on Model Driven Engineering Languages and Systems (Models 2019), ACM, 2019.
    @InProceedings{models19, author = {S.~Peldszus and K.~Tuma and D.~Str\"uber and J.~{J}{\"{u}}{r}jens and R.~Scandariato}, title = {Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings}, booktitle = {ACM/IEEE 22th International Conference on Model Driven Engineering Languages and Systems (Models 2019)}, year = {2019}, organization = {ACM}, }
     BibTeX 
  • M. Lohr, J. Hund, J. Jürjens, S. Staab: Ensuring Genuineness for Selectively Disclosed Confidential Data using Distributed Ledgers: Applications to Rail Wayside Monitoring. In: IEEE Blockchain 2019, IEEE, 2019.
    @InProceedings{blockchain19, author = {M.~Lohr and J.~Hund and J.~{J}{\"{u}}{r}jens and S.~Staab}, title = {Ensuring Genuineness for Selectively Disclosed Confidential Data using Distributed Ledgers: Applications to Rail Wayside Monitoring}, booktitle ={IEEE Blockchain 2019}, year = {2019}, organization = {IEEE}, }
     BibTeX 
  • R. Afrin, M.S. Sadi, J. Jürjens: An Efficient Soft Error Tolerant Approach to Enhance Reliability of TCAM. In: 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT-2019), IEEE, 2019.
    @InProceedings{icasert19, author = {R.~Afrin and M.S.~Sadi and J.~{J}{\"{u}}{r}jens}, title = {An Efficient Soft Error Tolerant Approach to Enhance Reliability of TCAM}, booktitle ={1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT-2019)}, year = {2019}, organization = {IEEE}, }
     BibTeX 
  • J. Jürjens, K. Schneider, J. Bürger, F.P. Viertel, D. Strüber, M. Goedicke, R. Reussner, R. Heinrich, E. Taspolatoglu, M. Konersmann, A. Fay, W. Lamersdorf, J. Ladiges, C. Haubeck: Maintaining Security in Software Evolution. In: R. Reussner, M. Goedicke, W. Hasselbring, B. Vogel-Heuser, J. Keim, L. Märtin (eds.): \em Managed Software Evolution, Springer, pp. 207-253, 2019.
    @InProceedings{eds14, author = {J.~{J}{\"{u}}{r}jens and K.~Schneider and J.~B\"urger and F.P.~Viertel and D.~Str\"uber and M.~Goedicke and R.~Reussner and R.~Heinrich and E.~Taspolatoglu and M.~Konersmann and A.~Fay and W.~Lamersdorf and J.~Ladiges and C.~Haubeck}, title = {Maintaining Security in Software Evolution}, booktitle ={R.~Reussner, M.~Goedicke, W.~Hasselbring, B.~Vogel-Heuser, J.~Keim, L.~M\"artin (eds.): {\em Managed Software Evolution}}, year = {2019}, pages = {207--253}, publisher = {Springer}, }
     BibTeX 
  • J. Jürjens: Smart Data Analytics im Gesundheitswesen: Aber sicher ! (... und compliant). In: Zukunftskongress Gesundheit DiGital, Koblenz, 3.-4.9.2019, , 2019.
    @InProceedings{zirp19, author = {J.~{J}{\"{u}}{r}jens}, title = {Smart Data Analytics im Gesundheitswesen: Aber sicher ! (... und compliant)}, booktitle ={Zukunftskongress Gesundheit DiGital, Koblenz, 3.-4.9.2019}, year = {2019}, organization = {}, }
     BibTeX 
  • S. Wiederkehr, J. Stumpfe, J. Jürjens: Flagship Use Case of IDSA: IBM and thyssenkrupp. In: Industrial Data Space Association Summit, Bonn, 25.-26.6.2019, , 2019.
    @InProceedings{ids19, author = {S.~Wiederkehr and J.~Stumpfe and J.~{J}{\"{u}}{r}jens}, title = {Flagship Use Case of IDSA: IBM and thyssenkrupp}, booktitle ={Industrial Data Space Association Summit, Bonn, 25.-26.6.2019}, year = {2019}, organization = {}, }
     BibTeX 
  • J. Jürjens: Aktuelle Innovationen in Software Engineering, Data Analytics und IT-Sicherheit. In: Debeka Innovationswoche, Debeka Innovation Center (DICE), 22.5.2019, Debeka Innovation Center (DICE), 2019.
    @InProceedings{debeka19, author = {J.~{J}{\"{u}}{r}jens}, title = {Aktuelle Innovationen in Software Engineering, Data Analytics und IT-Sicherheit}, booktitle ={Debeka Innovationswoche, Debeka Innovation Center (DICE), 22.5.2019}, year = {2019}, organization = {Debeka Innovation Center (DICE)}, }
     BibTeX 
  • J. Jürjens: Erfahrungen mit Design Thinking: Design eines MVP für 3-D-Druck mittels Blockchain. In: Debeka Innovation Center (DICE), 17.5.2019, Debeka Innovation Center (DICE), 2019.
    @InProceedings{design19, author = {J.~{J}{\"{u}}{r}jens}, title = {Erfahrungen mit Design Thinking: Design eines MVP f\"ur 3-D-Druck mittels Blockchain}, booktitle ={Debeka Innovation Center (DICE), 17.5.2019}, year = {2019}, organization = {Debeka Innovation Center (DICE)}, }
     BibTeX 
  • J. Jürjens: Zukunftssichere Software: Evolutionsbasiertes Sicherheitstesten für Datenanalyse-Software. In: OOP 2019, München, 21.-25.1.2019, , 2019.
    @InProceedings{oop19, author = {J.~{J}{\"{u}}{r}jens}, title = {Zukunftssichere Software: Evolutionsbasiertes Sicherheitstesten f\"ur Datenanalyse-Software}, booktitle ={OOP 2019, M\"unchen, 21.-25.1.2019}, year = {2019}, organization = {}, }
     BibTeX 

2018


  • Harrison Stewart, Jan Jürjens: Data security and consumer trust in FinTech innovation in Germany. In: Inf. & Comput. Security, vol. 26, no. 1, pp. 109-128, 2018.
    @article{DBLP:journals/imcs/StewartJ18, author = {Harrison Stewart and Jan J{\"{u}}rjens}, title = {Data security and consumer trust in FinTech innovation in Germany}, journal = {Inf. {\&} Comput. Security}, volume = {26}, number = {1}, pages = {109--128}, year = {2018}, url = {https://doi.org/10.1108/ICS-06-2017-0039}, doi = {10.1108/ICS-06-2017-0039}, }
     BibTeX   DOI 
  • Jens Bürger, Daniel Strüber, Stefan Gärtner, Thomas Ruhroth, Jan Jürjens, Kurt Schneider: A framework for semi-automated co-evolution of security knowledge and system models. In: Journal of Systems and Software, vol. 139, pp. 142-160, 2018.
    @article{DBLP:journals/jss/BurgerSGRJS18, author = {Jens B{\"{u}}rger and Daniel Str{\"{u}}ber and Stefan G{\"{a}}rtner and Thomas Ruhroth and Jan J{\"{u}}rjens and Kurt Schneider}, title = {A framework for semi-automated co-evolution of security knowledge and system models}, journal = {Journal of Systems and Software}, volume = {139}, pages = {142--160}, year = {2018}, url = {https://doi.org/10.1016/j.jss.2018.02.003}, doi = {10.1016/j.jss.2018.02.003}, }
     BibTeX   DOI 
  • Jan Jürjens, Stefan Ruf, Nils Herda: Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen ins digitale Zeitalter?. In: Wirtschaftsinformatik & Management, vol. 10, no. 3, pp. 74-79, 2018.
    @article{DBLP:journals/wm/JurjensRH18, author = {Jan J{\"{u}}rjens and Stefan Ruf and Nils Herda}, title = {Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen ins digitale Zeitalter?}, journal = {Wirtschaftsinformatik {\&} Management}, volume = {10}, number = {3}, pages = {74--79}, year = {2018}, url = {https://doi.org/10.1007/s35764-018-0062-5}, doi = {10.1007/s35764-018-0062-5}, }
     BibTeX   DOI 
  • J. Jürjens: Security Testing. In: SymfonyLive Berlin, 25.-26.10.2018, , 2018.
    @InProceedings{symfony18, author = {J.~{J}{\"{u}}{r}jens}, title = {Security Testing}, booktitle ={SymfonyLive Berlin, 25.-26.10.2018}, year = {2018}, organization = {}, }
     BibTeX 
  • J. Jürjens: Security by Design for Web Applications. In: MCT Summit 2018, Brühl, 21.-26.10.2018, , 2018.
    @InProceedings{mct18web, author = {J.~{J}{\"{u}}{r}jens}, title = {Security by Design for Web Applications}, booktitle ={MCT Summit 2018, Br\"uhl, 21.-26.10.2018}, year = {2018}, organization = {}, }
     BibTeX 
  • J. Jürjens: Advanced Smart Data Analytics. In: MCT Summit 2018, Brühl, 21.-26.10.2018, , 2018.
    @InProceedings{mct18data, author = {J.~{J}{\"{u}}{r}jens}, title = {Advanced Smart Data Analytics}, booktitle ={MCT Summit 2018, Br\"uhl, 21.-26.10.2018}, year = {2018}, organization = {}, }
     BibTeX 
  • J. Jürjens: Smart Data Analytics in Automotive. In: TDWI 2018, München, 26.6.2018, , 2018.
    @InProceedings{tdwi18auto, author = {J.~{J}{\"{u}}{r}jens}, title = {Smart Data Analytics in Automotive}, booktitle ={TDWI 2018, M\"unchen, 26.6.2018}, year = {2018}, organization = {}, }
     BibTeX 
  • J. Jürjens: Versicherungswirtschaft digital: Quo vadis?. In: TDWI 2018, München, 26.6.2018, , 2018.
    @InProceedings{tdwi18vers, author = {J.~{J}{\"{u}}{r}jens}, title = {Versicherungswirtschaft digital: Quo vadis?}, booktitle ={TDWI 2018, M\"unchen, 26.6.2018}, year = {2018}, organization = {}, }
     BibTeX 
  • J. Jürjens: Blockchains für die Industrie 4.0 mit dem Industrial Data Space. In: Blockchain Summit 2018, Nürnberg, 19.6.2018, , 2018.
    @InProceedings{bcs18, author = {J.~{J}{\"{u}}{r}jens}, title = {Blockchains f\"ur die Industrie 4.0 mit dem Industrial Data Space}, booktitle ={Blockchain Summit 2018, N\"urnberg, 19.6.2018}, year = {2018}, organization = {}, }
     BibTeX 
  • J. Jürjens: I4.0-Datenanalyse, aber sicher. In: Deutscher Schneidkongress 2018, Essen, 18.4.2018, , 2018.
    @InProceedings{schneid18, author = {J.~{J}{\"{u}}{r}jens}, title = {I4.0-Datenanalyse, aber sicher}, booktitle ={Deutscher Schneidkongress 2018, Essen, 18.4.2018}, year = {2018}, organization = {}, }
     BibTeX 
  • J. Jürjens: AMable - IDS and Blockchain for Additive Manufacturing. In: 1st Industrial Data Space Association Summit, Frankfurt, 22.-23.3.2018, , 2018.
    @InProceedings{ids18, author = {J.~{J}{\"{u}}{r}jens}, title = {AMable -- IDS and Blockchain for Additive Manufacturing}, booktitle ={1st Industrial Data Space Association Summit, Frankfurt, 22.-23.3.2018}, year = {2018}, organization = {}, }
     BibTeX 
  • J. Jürjens: Technical Competencies (Invited Lecture). In: Digital @ Scale, Berlin, 4 May & 6 Dec. 2018, McKinsey & WHU Vallenda, McKinsey & WHU Vallenda, 2018.
    @InProceedings{mck18, author = {J.~{J}{\"{u}}{r}jens}, title = {Technical Competencies (Invited Lecture)}, booktitle ={Digital @ Scale, Berlin, 4 May \& 6 Dec.~2018, McKinsey \& WHU Vallenda}, year = {2018}, organization = {McKinsey \& WHU Vallenda}, }
     BibTeX 
  • J. Jürjens: Big Data und Datenanalyse für Versicherungsunternehmen: Technologischer Ausblick (Eingeladene Vorlesung). In: Big Data Werkstattreihe, Leipzig, 12 July 2018, Versicherungsforen Leipzig, 2018.
    @InProceedings{leipzig18, author = {J.~{J}{\"{u}}{r}jens}, title = {Big Data und Datenanalyse f\"ur Versicherungsunternehmen: Technologischer Ausblick (Eingeladene Vorlesung)}, booktitle ={Big Data Werkstattreihe, Leipzig, 12 July 2018}, year = {2018}, organization = {Versicherungsforen Leipzig}, }
     BibTeX 
  • Qusai Ramadan, Daniel Strüber, Mattia Salnitri, Volker Riediger, Jan Jürjens: Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models. In: Alfonso Pierantonio, Salvador Trujillo (editors): Modelling Foundations and Applications - 14th European Conference, ECMFA 2018, Held as Part of STAF 2018, Toulouse, France, June 26-28, 2018, Proceedings, Springer, Lecture Notes in Computer Science, vol. 10890, pp. 179-198, 2018.
    @inproceedings{DBLP:conf/ecmdafa/Ramadan0SRJ18, author = {Qusai Ramadan and Daniel Str{\"{u}}ber and Mattia Salnitri and Volker Riediger and Jan J{\"{u}}rjens}, editor = {Alfonso Pierantonio and Salvador Trujillo}, title = {Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models}, booktitle = {Modelling Foundations and Applications - 14th European Conference, {ECMFA} 2018, Held as Part of {STAF} 2018, Toulouse, France, June 26-28, 2018, Proceedings}, pages = {179--198}, series = {Lecture Notes in Computer Science}, volume = {10890}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-92997-2\_12}, doi = {10.1007/978-3-319-92997-2\_12}, }
     BibTeX   DOI 
  • C. Vargas Martinez, J. Bürger, F. Viertel, B. Vogel-Heuser, J. Jürjens: System Evolution through Semi-Automatic Elicitation of Security Requirements. In: IFAC Conference on Embedded Systems, Computational Intelligence and Telematics in Control (CESCIT 2018), Faro, Portugal, June 6 to 8, 2018, , 2018.
    @InProceedings{cescit18, author = {C.~Vargas Martinez and J.~B\"urger and F.~Viertel and B.~Vogel-Heuser and J.~{J}{\"{u}}{r}jens}, title = {System Evolution through Semi-Automatic Elicitation of Security Requirements}, booktitle ={IFAC Conference on Embedded Systems, Computational Intelligence and Telematics in Control (CESCIT 2018), Faro, Portugal, June 6 to 8, 2018}, year = {2018}, organization = {}, }
     BibTeX 
  • Q. Ramadan, A.S. Ahmadian, D. Strüber, J. Jürjens, S. Staab: Model-based Analysis For Discrimination-aware Systems. In: IEEE/ACM International Workshop on Software Fairness (FairWare 2018), May 29, 2018, Gothenburg, Sweden (co-located with ICSE), IEEE, ACM, 2018.
    @InProceedings{fairware18, author = {Q.~Ramadan and A.S.~Ahmadian and D.~Str\"uber and J.~{J}{\"u}{r}jens and S.~Staab}, title = {Model-based Analysis For Discrimination-aware Systems}, booktitle ={IEEE/ACM International Workshop on Software Fairness (FairWare 2018), May 29, 2018, Gothenburg, Sweden (co-located with ICSE)}, year = {2018}, organization = {IEEE, ACM}, }
     BibTeX 
  • Daniel Strüber, Sven Peldszus, Jan Jürjens: Taming Multi-Variability of Software Product Line Transformations. In: Alessandra Russo, Andy Schürr (editors): Fundamental Approaches to Software Engineering, 21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings., Springer, Lecture Notes in Computer Science, vol. 10802, pp. 337-355, 2018.
    @inproceedings{DBLP:conf/fase/0001PJ18, author = {Daniel Str{\"{u}}ber and Sven Peldszus and Jan J{\"{u}}rjens}, editor = {Alessandra Russo and Andy Sch{\"{u}}rr}, title = {Taming Multi-Variability of Software Product Line Transformations}, booktitle = {Fundamental Approaches to Software Engineering, 21st International Conference, {FASE} 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings.}, pages = {337--355}, series = {Lecture Notes in Computer Science}, volume = {10802}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89363-1\_19}, doi = {10.1007/978-3-319-89363-1\_19}, }
     BibTeX   DOI 
  • Sven Peldszus, Daniel Strüber, Jan Jürjens: Model-based security analysis of feature-oriented software product lines. In: Eric Van Wyk, Tiark Rompf (editors): Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, GPCE 2018, Boston, MA, USA, November 5-6, 2018, ACM, pp. 93-106, 2018.
    @inproceedings{DBLP:conf/gpce/Peldszus0J18, author = {Sven Peldszus and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens}, editor = {Eric Van Wyk and Tiark Rompf}, title = {Model-based security analysis of feature-oriented software product lines}, booktitle = {Proceedings of the 17th {ACM} {SIGPLAN} International Conference on Generative Programming: Concepts and Experiences, {GPCE} 2018, Boston, MA, USA, November 5-6, 2018}, pages = {93--106}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3278122.3278126}, doi = {10.1145/3278122.3278126}, }
     BibTeX   DOI 
  • Qusai Ramadan, Amir Shayan Ahmadian, Daniel Strüber, Jan Jürjens, Steffen Staab: Model-based discrimination analysis: a position paper. In: Yuriy Brun, Brittany Johnson, Alexandra Meliou (editors): Proceedings of the International Workshop on Software Fairness, FairWare@ICSE 2018, Gothenburg, Sweden, May 29, 2018, ACM, pp. 22-28, 2018.
    @inproceedings{DBLP:conf/icse/RamadanA0JS18, author = {Qusai Ramadan and Amir Shayan Ahmadian and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens and Steffen Staab}, editor = {Yuriy Brun and Brittany Johnson and Alexandra Meliou}, title = {Model-based discrimination analysis: a position paper}, booktitle = {Proceedings of the International Workshop on Software Fairness, FairWare@ICSE 2018, Gothenburg, Sweden, May 29, 2018}, pages = {22--28}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194770.3194775}, doi = {10.1145/3194770.3194775}, }
     BibTeX   DOI 
  • Amir Shayan Ahmadian, Jan Jürjens, Daniel Strüber: Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements. In: Hisham M. Haddad, Roger L. Wainwright, Richard Chbeir (editors): Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, Pau, France, April 09-13, 2018, pp. 1142-1149, 2018.
    @inproceedings{DBLP:conf/sac/AhmadianJ018, author = {Amir Shayan Ahmadian and Jan J{\"{u}}rjens and Daniel Str{\"{u}}ber}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {1142--1149}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167256}, doi = {10.1145/3167132.3167256}, }
     BibTeX   DOI 
  • Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, Jan Jürjens: Supporting privacy impact assessment by model-based privacy analysis. In: Hisham M. Haddad, Roger L. Wainwright, Richard Chbeir (editors): Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, Pau, France, April 09-13, 2018, ACM, pp. 1467-1474, 2018.
    @inproceedings{DBLP:conf/sac/Ahmadian0RJ18, author = {Amir Shayan Ahmadian and Daniel Str{\"{u}}ber and Volker Riediger and Jan J{\"{u}}rjens}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Supporting privacy impact assessment by model-based privacy analysis}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {1467--1474}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167288}, doi = {10.1145/3167132.3167288}, }
     BibTeX   DOI 
  • Qusai Ramadan, Mattia Salnitri, Daniel Strüber, Jan Jürjens, Paolo Giorgini: Integrating BPMN- and UML-based Security Engineering via Model Transformation. In: Matthias Tichy, Eric Bodden, Marco Kuhrmann, Stefan Wagner, Jan-Philipp Steghöfer (editors): Software Engineering und Software Management 2018, Fachtagung des GI-Fachbereichs Softwaretechnik, SE 2018, 5.-9. März 2018, Ulm, Germany., Gesellschaft für Informatik, LNI, vol. P-279, pp. 63-64, 2018.
    @inproceedings{DBLP:conf/se/RamadanS0JG18, author = {Qusai Ramadan and Mattia Salnitri and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens and Paolo Giorgini}, editor = {Matthias Tichy and Eric Bodden and Marco Kuhrmann and Stefan Wagner and Jan{-}Philipp Stegh{\"{o}}fer}, title = {Integrating {BPMN-} and UML-based Security Engineering via Model Transformation}, booktitle = {Software Engineering und Software Management 2018, Fachtagung des GI-Fachbereichs Softwaretechnik, {SE} 2018, 5.-9. M{\"{a}}rz 2018, Ulm, Germany.}, pages = {63--64}, series = {{LNI}}, volume = {{P-279}}, publisher = {Gesellschaft f{\"{u}}r Informatik}, year = {2018}, url = {https://dl.gi.de/20.500.12116/16320}, }
     BibTeX   URL 

2017


  • J. Jürjens, J. Rehof: Industrial Data Space: enabling B2B data access (Invited Talk). In: OECD Expert Workshop ``Enhanced Access to Data: Reconciling the Risks and Benefits'', Copenhagen (Denmark, , 2017.
    @InProceedings{oecd17, author = {J.~{J}{\"{u}}{r}jens and J.~Rehof}, title = {Industrial Data Space: enabling B2B data access (Invited Talk)}, booktitle ={OECD Expert Workshop ``Enhanced Access to Data: Reconciling the Risks and Benefits'', Copenhagen (Denmark}, year = {2017}, organization = {}, }
     BibTeX 
  • J. Jürjens, S. Ruf, N. Herda: Versicherungswirtschaft digital: Wohin geht die Reise ?. In: Zeitschrift für Versicherungswesen, Allg. Fachverl. Mathern, Vol. 68, No. 21 (2017), p. 676--680, , 2017.
    @InProceedings{versich07, author = {J.~{J}{\"{u}}{r}jens and S.~Ruf and N.~Herda}, title = {Versicherungswirtschaft digital: Wohin geht die Reise ?}, booktitle ={Zeitschrift f\"ur Versicherungswesen, Allg.~Fachverl.~Mathern, Vol.~68, No.~21 (2017), p.~676--680}, year = {2017}, organization = {}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: enabling B2B data access (Invited Talk). In: EC workshop on Industrial Data Spaces as an enabler of B2B data access, Brussels, 8 June 2017, , 2017.
    @InProceedings{eu17a, author = {J.~{J}{\"{u}}{r}jens}, title = {Industrial Data Space: enabling B2B data access (Invited Talk)}, booktitle ={EC workshop on Industrial Data Spaces as an enabler of B2B data access, Brussels, 8 June 2017}, year = {2017}, organization = {}, }
     BibTeX 
  • M. Bartsch, T. Ernst, T. Fedkenhauer, M. Ipekcioglu, J. Jürjens, S. Kistler, N. Menz, A. Resetko, R.-P. Simon, G. Stöhr, S. Wessel: Strategy Paper Certification: Framework for the Industrial Data Space Certification Scheme. In: White Paper, IDS e.V. 2017, , 2017.
    @InProceedings{idscert17, author = {M.~Bartsch and T.~Ernst and T.~Fedkenhauer and M.~Ipekcioglu and J.~{J}{\"{u}}{r}jens and S.~Kistler and N.~Menz and A.~Resetko and R.-P.~Simon and G.~St\"ohr and S.~Wessel}, title = {Strategy Paper Certification: Framework for the Industrial Data Space Certification Scheme}, booktitle ={White Paper, IDS e.V.\ 2017}, year = {2017}, organization = {}, }
     BibTeX 
  • S. Auer, J. Jürjens, B. Otto, G. Brost, C. Lange, C. Quix, J. Cirullies, S. Lohmann, J. Schon, A. Eitel, C. Mader, D. Schulz, T. Ernst, N. Menz, J. Schütte, C. Haas, R. Nagel, M. Spiekermann, M. Huber, H. Pettenpohl, S. Wenzel, C. Jung, J. Pullmann: Reference Architecture Model for the Industrial Data Space. In: White Paper, Fraunhofer 2017, Fraunhofer, 2017.
    @InProceedings{idsarch17, author = {S.~Auer and J.~{J}{\"{u}}{r}jens and B.~Otto and G.~Brost and C.~Lange and C.~Quix and J.~Cirullies and S.~Lohmann and J.~Schon and A.~Eitel and C.~Mader and D.~Schulz and T.~Ernst and N.~Menz and J.~Sch\"utte and C.~Haas and R.~Nagel and M.~Spiekermann and M.~Huber and H.~Pettenpohl and S.~Wenzel and C.~Jung and J.~Pullmann}, title = {Reference Architecture Model for the Industrial Data Space}, booktitle ={White Paper, Fraunhofer 2017}, year = {2017}, organization = {Fraunhofer}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Digital Industrial Platform across Value Chains in all Sectors of the Economy (Invited Talk). In: Third workshop of the EC Working Group on Digital Industrial Platforms (WG2), Brussels, 4 May 2017, , 2017.
    @InProceedings{eu17, author = {J.~{J}{\"{u}}{r}jens}, title = {Industrial Data Space: Digital Industrial Platform across Value Chains in all Sectors of the Economy (Invited Talk)}, booktitle ={Third workshop of the EC Working Group on Digital Industrial Platforms (WG2), Brussels, 4 May 2017}, year = {2017}, organization = {}, }
     BibTeX 
  • Sakib Ahammed, Muhammad Sheikh Sadi, Md Shamimur Rahman, Jan Jürjens: Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method). In: Comput. Syst. Sci. Eng., vol. 32, no. 1, 2017.
    @article{DBLP:journals/csse/AhammedSRJ17, author = {Sakib Ahammed and Muhammad Sheikh Sadi and Md Shamimur Rahman and Jan J{\"{u}}rjens}, title = {Soft error tolerance using {HVDQ} (Horizontal-Vertical-Diagonal-Queen parity method)}, journal = {Comput. Syst. Sci. Eng.}, volume = {32}, number = {1}, year = {2017}, }
     BibTeX 
  • Harrison Stewart, Jan Jürjens: Information security management and the human aspect in organizations. In: Inf. & Comput. Security, vol. 25, no. 5, pp. 494-534, 2017.
    @article{DBLP:journals/imcs/StewartJ17, author = {Harrison Stewart and Jan J{\"{u}}rjens}, title = {Information security management and the human aspect in organizations}, journal = {Inf. {\&} Comput. Security}, volume = {25}, number = {5}, pages = {494--534}, year = {2017}, url = {https://doi.org/10.1108/ICS-07-2016-0054}, doi = {10.1108/ICS-07-2016-0054}, }
     BibTeX   DOI 
  • J. Jürjens: IT-Sicherheit in der Industrie 4.0: Datenanalyse, aber sicher !. In: Nacht der Technik 2017, Koblenz, 4.11.2017, , 2017.
    @InProceedings{ndt17, author = {J.~{J}{\"{u}}{r}jens}, title = {IT-Sicherheit in der Industrie 4.0: Datenanalyse, aber sicher !}, booktitle ={Nacht der Technik 2017, Koblenz, 4.11.2017}, year = {2017}, organization = {}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Predictive Maintenance to Enhance Safety of NRMM. In: NRMM Functional Safety Conference, Mainz, 25.10.2017, , 2017.
    @InProceedings{nrmm17, author = {J.~{J}{\"{u}}{r}jens}, title = {Industrial Data Space: Predictive Maintenance to Enhance Safety of NRMM}, booktitle ={NRMM Functional Safety Conference, Mainz, 25.10.2017}, year = {2017}, organization = {}, }
     BibTeX 
  • S. Peldszus, J. Cirullie, J. Jürjens: Sicherheitszertifizierung für die Digitale Transformation: Anwendung auf den Industrial Data Space. In: Software-QS-Tag 2017, Frankfurt, 19.10.2017 (Best Paper Award), , 2017.
    @InProceedings{qstag17, author = {S.~Peldszus and J.~Cirullie and J.~{J}{\"{u}}{r}jens}, title = {Sicherheitszertifizierung f\"ur die Digitale Transformation: Anwendung auf den Industrial Data Space}, booktitle ={Software-QS-Tag 2017, Frankfurt, 19.10.2017 (Best Paper Award)}, year = {2017}, organization = {}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Plattform für Unternehmensübergreifende Data Analytics in Versicherungen. In: Big Data & Data Analytics 2017, Leipzig, 16.-17.10.2017, , 2017.
    @InProceedings{leipzig17, author = {J.~{J}{\"{u}}{r}jens}, title = {Industrial Data Space: Plattform f\"ur Unternehmens\"ubergreifende Data Analytics in Versicherungen}, booktitle ={Big Data \& Data Analytics 2017, Leipzig, 16.-17.10.2017}, year = {2017}, organization = {}, }
     BibTeX 
  • J. Jürjens: Security by Design für Cloud-basierte Datenaustauschplattformen: Der Industrial Data Space. In: Internet Security Days 2017, Brühl, 29.09.2017, , 2017.
    @InProceedings{isd17, author = {J.~{J}{\"{u}}{r}jens}, title = {Security by Design f\"ur Cloud-basierte Datenaustauschplattformen: Der Industrial Data Space}, booktitle ={Internet Security Days 2017, Br\"uhl, 29.09.2017}, year = {2017}, organization = {}, }
     BibTeX 
  • J. Jürjens: Security Certification in the Industrial Data Space. In: 14. Jahrestreffen der GI-FG "Formale Methoden und Software Engineering für Sichere Systeme (FoMSESS), Darmstadt, 7.-8.9.2017, , 2017.
    @InProceedings{fomsess17, author = {J.~{J}{\"{u}}{r}jens}, title = {Security Certification in the Industrial Data Space}, booktitle ={14.\ Jahrestreffen der GI-FG "Formale Methoden und Software Engineering f\"ur Sichere Systeme (FoMSESS), Darmstadt, 7.-8.9.2017}, year = {2017}, organization = {}, }
     BibTeX 
  • Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Julian Flake, Andrea Praitano, José F., Jan Jürjens, Michalis Pavlidis, Dimitri Bonutto, Andrès Castillo, Haralambos Mouratidis, Javier Garcia-Robles, Alberto Eugenio Tozzi: Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain. In: Erich Schweighofer, Herbert Leitold, Andreas Mitrakas, Kai Rannenberg (editors): Privacy Technologies and Policy - 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers, Springer, Lecture Notes in Computer Science, vol. 10518, pp. 192-209, 2017.
    @inproceedings{DBLP:conf/apf/DiamantopoulouA17, author = {Vasiliki Diamantopoulou and Konstantinos Angelopoulos and Julian Flake and Andrea Praitano and Jos{\'{e}} F. Ruiz and Jan J{\"{u}}rjens and Michalis Pavlidis and Dimitri Bonutto and Andr{\`{e}}s Castillo Sanz and Haralambos Mouratidis and Javier Garcia{-}Robles and Alberto Eugenio Tozzi}, editor = {Erich Schweighofer and Herbert Leitold and Andreas Mitrakas and Kai Rannenberg}, editor = {Erich Schweighofer and Herbert Leitold and Andreas Mitrakas and Kai Rannenberg}, title = {Privacy Data Management and Awareness for Public Administrations: {A} Case Study from the Healthcare Domain}, booktitle = {Privacy Technologies and Policy - 5th Annual Privacy Forum, {APF} 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers}, pages = {192--209}, series = {Lecture Notes in Computer Science}, volume = {10518}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67280-9\_11}, doi = {10.1007/978-3-319-67280-9\_11}, }
     BibTeX   DOI 
  • Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, Jan Jürjens: Model-Based Privacy Analysis in Industrial Ecosystems. In: Anthony Anjorin, Huáscar Espinoza (editors): Modelling Foundations and Applications - 13th European Conference, ECMFA 2017, Held as Part of STAF 2017, Marburg, Germany, July 19-20, 2017, Proceedings, Springer, Lecture Notes in Computer Science, vol. 10376, pp. 215-231, 2017.
    @inproceedings{DBLP:conf/ecmdafa/AhmadianSRJ17, author = {Amir Shayan Ahmadian and Daniel Str{\"{u}}ber and Volker Riediger and Jan J{\"{u}}rjens}, editor = {Anthony Anjorin and Hu{\'{a}}scar Espinoza}, title = {Model-Based Privacy Analysis in Industrial Ecosystems}, booktitle = {Modelling Foundations and Applications - 13th European Conference, {ECMFA} 2017, Held as Part of {STAF} 2017, Marburg, Germany, July 19-20, 2017, Proceedings}, pages = {215--231}, series = {Lecture Notes in Computer Science}, volume = {10376}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61482-3\_13}, doi = {10.1007/978-3-319-61482-3\_13}, }
     BibTeX   DOI 
  • Qusai Ramadan, Mattia Salnitri, Daniel Strüber, Jan Jürjens, Paolo Giorgini: From Secure Business Process Modeling to Design-Level Security Verification. In: 20th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2017, Austin, TX, USA, September 17-22, 2017, IEEE Computer Society, pp. 123-133, 2017.
    @inproceedings{DBLP:conf/models/RamadanS0JG17, author = {Qusai Ramadan and Mattia Salnitri and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens and Paolo Giorgini}, title = {From Secure Business Process Modeling to Design-Level Security Verification}, booktitle = {20th {ACM/IEEE} International Conference on Model Driven Engineering Languages and Systems, {MODELS} 2017, Austin, TX, USA, September 17-22, 2017}, pages = {123--133}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MODELS.2017.10}, doi = {10.1109/MODELS.2017.10}, }
     BibTeX   DOI 
  • Amir Shayan Ahmadian, Sven Peldszus, Qusai Ramadan, Jan Jürjens: Model-based privacy and security analysis with CARiSMA. In: Eric Bodden, Wilhelm Schäfer, Arie van Deursen, Andrea Zisman (editors): Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2017, Paderborn, Germany, September 4-8, 2017, ACM, pp. 989-993, 2017.
    @inproceedings{DBLP:conf/sigsoft/AhmadianPRJ17, author = {Amir Shayan Ahmadian and Sven Peldszus and Qusai Ramadan and Jan J{\"{u}}rjens}, editor = {Eric Bodden and Wilhelm Sch{\"{a}}fer and Arie van Deursen and Andrea Zisman}, title = {Model-based privacy and security analysis with CARiSMA}, booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017}, pages = {989--993}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3106237.3122823}, doi = {10.1145/3106237.3122823}, }
     BibTeX   DOI 
  • J. Jürjens: Industrial Data Space: Platform for Applications in the Industry 4.0 (Invited Talk). In: Industry 4.0 opportunities from an international perspective, Vigo (Spain), , 2017.
    @InProceedings{vigo17, author = {J.~{J}{\"{u}}{r}jens}, title = {Industrial Data Space: Platform for Applications in the Industry 4.0 (Invited Talk)}, booktitle ={Industry 4.0 opportunities from an international perspective, Vigo (Spain)}, year = {2017}, organization = {}, }
     BibTeX 
  • J. Jürjens: The Industrial Data Space initiative (Invited Talk). In: Digital Challenges in Europe, Brussels 29 June 2017, EC, Brussels 29 June 2017, 2017.
    @InProceedings{clora17, author = {J.~{J}{\"{u}}{r}jens}, title = {The Industrial Data Space initiative (Invited Talk)}, booktitle ={Digital Challenges in Europe, Brussels 29 June 2017}, year = {2017}, organization = {EC, Brussels 29 June 2017}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Platform for Cross-Border Exchange of Data and Data Analysis (Invited Talk). In: Wayside Monitoring Forum, Leoben (Austria), 22 June 2017, , 2017.
    @InProceedings{leoben17, author = {J.~{J}{\"{u}}{r}jens}, title = {Industrial Data Space: Platform for Cross-Border Exchange of Data and Data Analysis (Invited Talk)}, booktitle ={Wayside Monitoring Forum, Leoben (Austria), 22 June 2017}, year = {2017}, organization = {}, }
     BibTeX 
  • J. Jürjens: Datensouveränität in der Industrieautomatisierung. In: Hannover Messe 2017, Hannover, 24.-28.4.2017, , 2017.
    @InProceedings{hmi17, author = {J.~{J}{\"{u}}{r}jens}, title = {Datensouver\"anit\"at in der Industrieautomatisierung}, booktitle ={Hannover Messe 2017, Hannover, 24.-28.4.2017}, year = {2017}, organization = {}, }
     BibTeX 
  • J. Jürjens, A. Resetko: Industrial Data Space: Plattform für unternehmensübergreifende Daten-Marktplätze und Big-Data-Analysen. In: Big Data Summit 2017, BITKOM, Hanau, 16.2.2017, , 2017.
    @InProceedings{bigdata17, author = {J.~{J}{\"{u}}{r}jens and A.~Resetko}, title = {Industrial Data Space: Plattform f\"ur unternehmens\"ubergreifende Daten-Marktpl\"atze und Big-Data-Analysen}, booktitle ={ Big Data Summit 2017, BITKOM, Hanau, 16.2.2017}, year = {2017}, organization = {}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Plattform für die digitale Transformation von Unternehmen. In: OOP 2017, München, 30.1.-3.2.2017, , 2017.
    @InProceedings{oop17, author = {J.~{J}{\"{u}}{r}jens}, title = {Industrial Data Space: Plattform f\"ur die digitale Transformation von Unternehmen}, booktitle ={OOP 2017, M\"unchen, 30.1.-3.2.2017}, year = {2017}, organization = {}, }
     BibTeX 
  • Jan Jürjens, Kurt Schneider (editors): Software Engineering 2017, Fachtagung des GI-Fachbereichs Softwaretechnik, 21.-24. Februar 2017, Hannover, Deutschland, GI, LNI, vol. P-267, 2017.
    @proceedings{DBLP:conf/se/2017, editor = {Jan J{\"{u}}rjens and Kurt Schneider}, title = {Software Engineering 2017, Fachtagung des GI-Fachbereichs Softwaretechnik, 21.-24. Februar 2017, Hannover, Deutschland}, series = {{LNI}}, volume = {{P-267}}, publisher = {{GI}}, year = {2017}, url = {https://dl.gi.de/handle/20.500.12116/612}, isbn = {978-3-88579-661-9}, }
     BibTeX   URL 
  • Stefan Wagner, Jan Jürjens, Claudia Koller, Peter Trischberger: Comparing Bug Finding Tools with Reviews and Tests. In: CoRR, vol. abs/1711.05019, 2017.
    @article{DBLP:journals/corr/abs-1711-05019, author = {Stefan Wagner and Jan J{\"{u}}rjens and Claudia Koller and Peter Trischberger}, title = {Comparing Bug Finding Tools with Reviews and Tests}, journal = {CoRR}, volume = {abs/1711.05019}, year = {2017}, url = {http://arxiv.org/abs/1711.05019}, archivePrefix = {arXiv}, eprint = {1711.05019}, }
     BibTeX   URL 
  • S. Peldszus, J. Jürjens: Werkzeuggestützte Sicherheitszertifizierung: Anwendung auf den Industrial Data Space. In: Software Quality Days 2017, Wien, 17.-20.01.2017, , 2017.
    @InProceedings{sqd17, author = {S.~Peldszus and J.~{J}{\"{u}}{r}jens}, title = {Werkzeuggest\"utzte Sicherheitszertifizierung: Anwendung auf den Industrial Data Space}, booktitle ={Software Quality Days 2017, Wien, 17.-20.01.2017}, year = {2017}, organization = {}, }
     BibTeX 
  • J. Jürjens: Barriers and opportunities of use of data across sectors and borders (Invited Panel Contribution). In: High Level Conference on Building the European Data Economy, 17 Oct 2016, Brussel, , 2017.
    @InProceedings{ec16, author = {J.~{J}{\"{u}}{r}jens}, title = {Barriers and opportunities of use of data across sectors and borders (Invited Panel Contribution)}, booktitle ={High Level Conference on Building the European Data Economy, 17 Oct 2016, Brussel}, year = {2017}, organization = {}, }
     BibTeX 

2016


  • S. Pape, J. Flake, A. Beckmann, J. Jürjens: STAGE - A Software Tool for Automatic Grading of Testing Exercises. In: 38th International Conference on Software Engineering (ICSE 2016), Software Engineering Education and Training (SEET), pp. 10, 2016.
    @InProceedings{icse16seet, author = {S.~Pape and J.~Flake and A.~Beckmann and J.~{J}{\"u}{r}jens}, title = {{STAGE} -- A Software Tool for Automatic Grading of Testing Exercises}, booktitle = {38th International Conference on Software Engineering (ICSE 2016), Software Engineering Education and Training (SEET)}, year = {2016}, pages = {10}, keywords = {internationalConferences, codeAnalysis}, }
     BibTeX 
  • D. Zaitsev, J. Jürjens: Programming in Sleptsov Net Language for Systems Control. In: Advances in Mechanical Engineering, 2016.
    @InProceedings{ame16, author = {D.~Zaitsev and J.~{J}{\"u}{r}jens}, title = {Programming in Sleptsov Net Language for Systems Control}, booktitle = {Advances in Mechanical Engineering}, year = {2016}, keywords = {dependability, dependableSystems}, }
     BibTeX 
  • S. Ahmadian, J. Jürjens: Supporting Model-based Privacy Analysis by Exploiting Privacy Level Agreements. In: 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016), 2016.
    @InProceedings{cloudcom16, author = {S.~Ahmadian and J.~{J}{\"u}{r}jens}, title = {Supporting Model-based Privacy Analysis by Exploiting Privacy Level Agreements}, booktitle = {8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016)}, year = {2016}, keywords = {internationalConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, }
     BibTeX 
  • S. Ahmadian, F. Coerschulte, J. Jürjens: Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds (Invited Paper). In: Selected Papers of the Fifth International Symposium on Business Modeling and Software Design (BMSD), pp. 80-95, 2016.
    @InProceedings{bmsd15selected, author = {S.~Ahmadian and F.~Coerschulte and J.~{J}{\"u}{r}jens}, title = {Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds (Invited Paper)}, booktitle = {Selected Papers of the Fifth International Symposium on Business Modeling and Software Design (BMSD)}, year = {2016}, volume = {257}, pages = {80--95}, keywords = {conferences, secureSoftwareEngineeringSecureService/CloudBasedSystems}, }
     BibTeX 
  • B. Otto, J. Jürjens, J. Schon, S. Auer, N. Menz, S. Wenzel, J. Cirullies: Industrial Data Space: Digital Sovereignity over Data 2016 (Technical Report)
    @techreport{ids, author = {B.~Otto and J.~{J}{\"u}{r}jens and J.~Schon and S.~Auer and N.~Menz and S.~Wenzel and J.~Cirullies}, title = {Industrial Data Space: Digital Sovereignity over Data}, booktitle = {Fraunhofer 2016}, year = {2016}, keywords = {dataanalysis}, }
     BibTeX 
  • J. Jürjens: Big Data: Aber sicher ! (... und compliant) (Eingeladener Vortrag). In: Fraunhofer-Alumni-Summit, 2016.
    @InProceedings{fhgalumni16, author = {J.~{J}{\"u}{r}jens}, title = {Big Data: Aber sicher ! (... und compliant) (Eingeladener Vortrag)}, booktitle = {Fraunhofer-Alumni-Summit}, year = {2016}, keywords = {conferences, secureSoftwareEngineeringCompliance}, }
     BibTeX 
  • T. Humberg, J. Jürjens: Compliance in Clouds. In: Encyclopedia of Cloud Computing, 2016
    @InCollection{clouds16, author = {T.~Humberg and J.~{J}{\"u}{r}jens}, title = {Compliance in Clouds}, booktitle = {Encyclopedia of Cloud Computing}, year = {2016}, keywords = {invitedBookChapters,secureSoftwareEngineeringSecureService/CloudBasedSystems}, }
     BibTeX 
  • J. Jürjens: The Industrial Data Space: Platform for Digitization in the Manufacturing and Process Industry (Invited Talk). In: Industrial Technologies 2016, 2016.
    @InProceedings{it16, author = {J.~{J}{\"u}{r}jens}, title = {The Industrial Data Space: Platform for Digitization in the Manufacturing and Process Industry (Invited Talk)}, booktitle = {Industrial Technologies 2016}, year = {2016}, keywords = {conferences, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space and European Data Space. In: BITKOM Germany - Excellence in Big Data, 2016
    @InCollection{bitkom16, author = {J.~{J}{\"u}{r}jens}, title = {Industrial Data Space and European Data Space}, booktitle = {Germany - Excellence in Big Data}, publisher = {BITKOM}, year = {2016}, keywords = {invitedBookChapters, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Möglichkeiten für assoziierte F&E-Projekte. In: 13. Jahrestreffen der GI-FG "Formale Methoden und Software Engineering für Sichere Systeme (FoMSESS), 2016.
    @InProceedings{fomsess16, author = {J.~{J}{\"u}{r}jens}, title = {Industrial Data Space: M\"oglichkeiten f\"ur assoziierte F\&E-Projekte}, booktitle = {13.\ Jahrestreffen der GI-FG "Formale Methoden und Software Engineering f\"ur Sichere Systeme (FoMSESS)}, year = {2016}, keywords = {nonEnglish, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Datenbasierte Wertschöpfung für die Medizin und Life Sciences. In: Data Warehouse (DW 2016), Zürich, 21.-22.11.2016, , 2016.
    @InProceedings{dw16, author = {J.~{J}{\"{u}}{r}jens}, title = {Industrial Data Space: Datenbasierte Wertsch\"opfung f\"ur die Medizin und Life Sciences}, booktitle ={Data Warehouse (DW 2016), Z\"urich, 21.-22.11.2016}, year = {2016}, organization = {}, }
     BibTeX 
  • J. Jürjens: Sicherheitszertifizierung für Daten- und Software-Services in Industrie 4.0. In: Hannover Messe 2016, Hannover, 25.-29.4.2016, , 2016.
    @InProceedings{hmi16, author = {J.~{J}{\"{u}}{r}jens}, title = {Sicherheitszertifizierung f\"ur Daten- und Software-Services in Industrie 4.0}, booktitle ={Hannover Messe 2016, Hannover, 25.-29.4.2016}, year = {2016}, organization = {}, }
     BibTeX 
  • S. Wenzel, D. Warzecha, J. Jürjens, M. Ochoa: Umlchange - specifying model changes to support security verification of potential evolution. In: Jens Knoop, Uwe Zdun (editors): Software Engineering 2016, Fachtagung des GI-Fachbereichs Softwaretechnik, 23.-26. Februar 2016, Wien, Österreich, GI, LNI, vol. 252, pp. 91-92, 2016.
    @InProceedings{se16WWJO, author = {S.~Wenzel and D.~Warzecha and J.~{J}{\"u}{r}jens and M.~Ochoa}, editor = {Jens Knoop and Uwe Zdun}, title = {Umlchange - specifying model changes to support security verification of potential evolution}, booktitle = {Software Engineering 2016, Fachtagung des GI-Fachbereichs Softwaretechnik, 23.-26. Februar 2016, Wien, {\"{O}}sterreich}, pages = {91--92}, series = {{LNI}}, volume = {252}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/20.500.12116/738}, keywords = {workshop, industrialConferences, softwareEvolution}, }
     BibTeX   URL 
  • J. Jürjens: Industrial Data Space - Modellbasierte Entwicklung einer Plattform für unternehmensübergreifende Datenanalyse-Services. In: Modellierung 2016 (Praxisforum), 2016.
    @InProceedings{modellierung16, author = {J.~{J}{\"u}{r}jens}, title = {Industrial Data Space - Modellbasierte Entwicklung einer Plattform f\"ur unternehmens\"ubergreifende Datenanalyse-Services}, booktitle = {Modellierung 2016 (Praxisforum)}, year = {2016}, keywords = {nonEnglish, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Der Industrial Data Space: Datenanalyse für die mittelständige Wirtschaft und Industrie des 4.0 Zeitalters. In: IT & Wirtschaftsmesse IT2KO, 2016.
    @InProceedings{it2ko16, author = {J.~{J}{\"u}{r}jens}, title = {Der Industrial Data Space: Datenanalyse f\"ur die mittelst\"andige Wirtschaft und Industrie des 4.0 Zeitalters}, booktitle = {IT \& Wirtschaftsmesse IT2KO}, year = {2016}, keywords = {nonEnglish, dataanalysis}, }
     BibTeX 
  • N. Menz, J. Jürjens: Sicherheitszertifizierung für Daten- und Software-Services in Industrie 4.0: Aspekte der Zertifizierung im Industrial Data Space. In: Automation 2016, 2016.
    @InProceedings{automation16, author = {N.~Menz and J.~{J}{\"u}{r}jens}, title = {Sicherheitszertifizierung f\"ur Daten- und Software-Services in Industrie 4.0: Aspekte der Zertifizierung im Industrial Data Space}, booktitle = {Automation 2016}, year = {2016}, keywords = {workshop, industrialConferences, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Eine Plattform für unternehmensübergreifende Business Intelligence Analysen. In: TDWI 2016, 2016.
    @InProceedings{tdwi16, author = {J.~{J}{\"u}{r}jens}, title = {Industrial Data Space: Eine Plattform f\"ur unternehmens\"ubergreifende Business Intelligence Analysen}, booktitle = {TDWI 2016}, year = {2016}, keywords = {nonEnglish, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Plattform für Datenanalysen in der Industrie 4.0. In: Nacht der Technik 2016, 2016.
    @InProceedings{ndt16, author = {J.~{J}{\"u}{r}jens}, title = {Industrial Data Space: Plattform f\"ur Datenanalysen in der Industrie 4.0}, booktitle = {Nacht der Technik 2016}, year = {2016}, keywords = {nonEnglish, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Infrastructure for Secure Data Exchange in a Commercial Context. In: EC Round Table: A legal regime fit for an efficient and fair access to and usage and exchange of data, 2016.
    @InProceedings{eu16, author = {J.~{J}{\"u}{r}jens}, title = {Industrial Data Space: Infrastructure for Secure Data Exchange in a Commercial Context}, booktitle = {EC Round Table: A legal regime fit for an efficient and fair access to and usage and exchange of data}, year = {2016}, keywords = {invitedTalk, invitedWorkshop, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Platform for the Standardisation of Data Exchange in a Smart Industry (Invited Talk). In: Industrial Technologies 2016, Workshop on Standardisation for Smart Industry, 2016.
    @InProceedings{it16ws, author = {J.~{J}{\"u}{r}jens}, title = {Industrial Data Space: Platform for the Standardisation of Data Exchange in a Smart Industry (Invited Talk)}, booktitle = {Industrial Technologies 2016, Workshop on Standardisation for Smart Industry}, year = {2016}, keywords = {invitedTalk, invitedWorkshop, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Developing a Business Application Scenario in the context of the Industrial Data Space. In: Web Science 2016 Summer School, 2016.
    @InProceedings{webscience16, author = {J.~{J}{\"u}{r}jens}, title = {Developing a Business Application Scenario in the context of the Industrial Data Space}, booktitle = {Web Science 2016 Summer School}, year = {2016}, keywords = {workshop, industrialConferences, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Security Certification in the Industrial Data Space. In: Summer School of the Joint Master in Software Engineering, 2016.
    @InProceedings{jmse16, author = {J.~{J}{\"u}{r}jens}, title = {Security Certification in the Industrial Data Space}, booktitle = {Summer School of the Joint Master in Software Engineering}, year = {2016}, keywords = {workshop, industrialConferences, dataanalysis}, }
     BibTeX 
  • J. Jürjens: IT Security Risks. In: Summer School of the Trinational Graduate Academy Security-Risk-Orientation, 2016.
    @InProceedings{trifels16, author = {J.~{J}{\"u}{r}jens}, title = {IT Security Risks}, booktitle = {Summer School of the Trinational Graduate Academy Security-Risk-Orientation}, year = {2016}, keywords = {conferences, secureSoftwareEngineeringGeneral}, }
     BibTeX 
  • J. Jürjens: Sicherheitszertifizierung für den Industrial Data Space (Eingeladener Vortrag). In: Kontraktlogistik-Forum - Industrie 4.0, 2016.
    @InProceedings{bvl16, author = {J.~{J}{\"u}{r}jens}, title = {Sicherheitszertifizierung f\"ur den Industrial Data Space (Eingeladener Vortrag)}, booktitle = {Kontraktlogistik-Forum - Industrie 4.0}, year = {2016}, keywords = {nonEnglish, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Sicherheitszertifizierung für den Industrial Data Space (Eingeladener Vortrag). In: 3. Forschungstag IT-Sicherheit NRW, 2016.
    @InProceedings{itsnrw16, author = {J.~{J}{\"u}{r}jens}, title = {Sicherheitszertifizierung f\"ur den Industrial Data Space (Eingeladener Vortrag)}, booktitle = {3. Forschungstag IT-Sicherheit NRW}, year = {2016}, keywords = {nonEnglish, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Sharing Health Data Securely (Invited Talk). In: 2nd European Summit on Digital Innovation for Active and Healthy Ageing, Brussels, 5--8 Dec 2016, , 2016.
    @InProceedings{ec16a, author = {J.~{J}{\"{u}}{r}jens}, title = {Industrial Data Space: Sharing Health Data Securely (Invited Talk)}, booktitle ={2nd European Summit on Digital Innovation for Active and Healthy Ageing, Brussels, 5--8 Dec 2016}, year = {2016}, organization = {}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Applications in the Medical Domain (Invited Talk). In: International Conference on Business Informatics and Modelling (IC-BIM 2016), 2016.
    @InProceedings{icbim16, author = {J.~{J}{\"u}{r}jens}, title = {Industrial Data Space: Applications in the Medical Domain (Invited Talk)}, booktitle = {International Conference on Business Informatics and Modelling (IC-BIM 2016)}, year = {2016}, keywords = {conferences, dataanalysis}, }
     BibTeX 
  • J. Jürjens: European Data Space: Enabling Collaborative Data Analysis Services compliant to the GDPR (Invited Talk). In: ISC GDPR Seminar on The Impact of the General Data Protection Regulation on collaborative science in Europe and the European Cloud Initiative, 18 Oct 2016, Brussels, , 2016.
    @InProceedings{iscgdpr16, author = {J.~{J}{\"{u}}{r}jens}, title = {European Data Space: Enabling Collaborative Data Analysis Services compliant to the GDPR (Invited Talk)}, booktitle ={ISC GDPR Seminar on The Impact of the General Data Protection Regulation on collaborative science in Europe and the European Cloud Initiative, 18 Oct 2016, Brussels}, year = {2016}, organization = {}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Enabling Data Analysis Services in the Context of IoT and Industry 4.0 (Invited Talk). In: CEATEC 2016, 5 Oct 2016, Japan, , 2016.
    @InProceedings{ceatec16, author = {J.~{J}{\"{u}}{r}jens}, title = {Industrial Data Space: Enabling Data Analysis Services in the Context of IoT and Industry 4.0 (Invited Talk)}, booktitle ={CEATEC 2016, 5 Oct 2016, Japan}, year = {2016}, organization = {}, }
     BibTeX 
  • J. Jürjens: 15 Years of Model-based Security Engineering with UML: Supporting Secure Evolution (Keynote). In: Sixth International Symposium on Business Modeling and Software Design (BMSD 2016), 2016.
    @InProceedings{bmsd16, author = {J.~{J}{\"u}{r}jens}, title = {15 Years of Model-based Security Engineering with {UML}: Supporting Secure Evolution (Keynote)}, booktitle = {Sixth International Symposium on Business Modeling and Software Design (BMSD 2016)}, year = {2016}, keywords = {overviewPub,conferences, secureSoftwareEngineeringGeneral}, }
     BibTeX 

2015


  • R. Heinrich, S. Gärtner, T.-M. Hesse, T. Ruhroth, R. Reussner, K. Schneider, B. Paech, J. Jürjens: The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution. In: International Journal of Software Engineering and Knowledge Engineering (IJSEKE), 2015.
    @Article{ijseke16, author = {R.~Heinrich and S.~G\"artner and T.-M.~Hesse and T.~Ruhroth and R.~Reussner and K.~Schneider and B.~Paech and J.~{J}{\"u}{r}jens}, title = {The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution}, journal = {International Journal of Software Engineering and Knowledge Engineering (IJSEKE)}, year = {2015}, keywords = {modelbasedSecurityEngineering, softwareEvolution, secvolution}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space - The next step: Integration of Industrie 4.0, Smart data, Smart services (Invited Talk). In: From Industrie 4.0 to Digitising Manufacturing: An End User perspective, 2015.
    @InProceedings{mtc15, author = {J.~{J}{\"u}{r}jens}, title = {Industrial Data Space -- The next step: Integration of Industrie 4.0, Smart data, Smart services (Invited Talk)}, booktitle = {From Industrie 4.0 to Digitising Manufacturing: An End User perspective}, year = {2015}, keywords = {conferences, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Industrial Data Space: Eine Plattform für Smart Services und Industrial Analytics (eingeladener Vortrag). In: Mitgliederversammlung des SOA Innovation Lab, 2015.
    @InProceedings{soalab15, author = {J.~{J}{\"u}{r}jens}, title = {Industrial Data Space: Eine Plattform f\"ur Smart Services und Industrial Analytics (eingeladener Vortrag)}, booktitle = {Mitgliederversammlung des SOA Innovation Lab}, year = {2015}, keywords = {nonEnglish, dataanalysis}, }
     BibTeX 
  • J. Jürjens: Der Industrial Data Space: Eine unternehmensübergreifende Plattform für Big-Data-Analysen (eingeladener Vortrag). In: Zukunftsworkshop Big Data, 2015.
    @InProceedings{bigdata15, author = {J.~{J}{\"u}{r}jens}, title = {Der Industrial Data Space: Eine unternehmens\"ubergreifende Plattform f\"ur Big-Data-Analysen (eingeladener Vortrag)}, booktitle = {Zukunftsworkshop Big Data}, year = {2015}, keywords = {nonEnglish, dataanalysis}, }
     BibTeX 
  • J. Jürjens, S. Wenzel: Werkzeug für Wirtschaftlichkeit und Effektivität zum Erstellen von Sicherheitskonzepten. In: Zeitschrift für die Sicherheit der Wirtschaft (WIK), vol. 5, 2015.
    @Article{wik15, author = {J.~J\"urjens and S.~Wenzel}, title = {Werkzeug f\"ur Wirtschaftlichkeit und Effektivit\"at zum Erstellen von Sicherheitskonzepten}, journal = {Zeitschrift f\"ur die Sicherheit der Wirtschaft (WIK)}, volume = {5}, year = {2015}, keywords = {nonEnglish, securityEconomics}, }
     BibTeX 
  • J. Bürger, J. Jürjens, S. Wenzel: Restoring Security of Evolving Software Models using Graph-Transformation. In: International Journal on Software Tools for Technology Transfer (STTT), vol. 17, no. 3, pp. 267-289, 2015.
    @Article{BJW15, author = {J.~B\"urger and J.~J\"urjens and S.~Wenzel}, title = {Restoring Security of Evolving Software Models using Graph-Transformation}, journal = {International Journal on Software Tools for Technology Transfer (STTT)}, year = {2015}, volume = {17}, number = {3}, pages = {267--289}, doi = {10.1007/s1000901403648}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/bjw15.pdf:URL}, keywords = {modelbasedSecurityEngineering, softwareEvolution, secvolution}, }
     BibTeX   DOI   preprint 
  • C. Apfelbeck, M. Fritz, J. Jürjens, J. Zweihoff: Preserving Validity of Batch-job Nets under Change at Runtime. In: 39th Annual IEEE Computer Software and Applications Conference (COMPSAC 2015), IEEE, 2015. 10 pp.
    @InProceedings{compsac15A, author = {C.~Apfelbeck and M.~Fritz and J.~{J}{\"u}{r}jens and J.~Zweihoff}, title = {Preserving Validity of Batch-job Nets under Change at Runtime}, booktitle = {39th Annual IEEE Computer Software and Applications Conference (COMPSAC 2015)}, OPTpages = {}, note = {10 pp.}, year = {2015}, organization = {IEEE}, keywords = {internationalConferences, softwareEvolution, secvolution}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/compsac15A.pdf:URL}, }
     BibTeX   preprint 
  • J. Bürger, S. Gärtner, T. Ruhroth, J. Zweihoff, J. Jürjens, K. Schneider: Restoring Security of Long-Living Systems by Co-Evolution. In: 39th Annual IEEE Computer Software and Applications Conference (COMPSAC 2015), IEEE, 2015.
    @InProceedings{compsac15B, author = {J.~B{\"u}rger and S.~G{\"a}rtner and T.~Ruhroth and J.~Zweihoff and J.~{J}{\"u}{r}jens and K.~Schneider}, title = {Restoring Security of Long-Living Systems by Co-Evolution}, booktitle = {39th Annual IEEE Computer Software and Applications Conference (COMPSAC 2015)}, OPTpages = {}, year = {2015}, organization = {IEEE}, keywords = {internationalConferences, softwareEvolution, secvolution}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/compsac15B.pdf:URL}, }
     BibTeX   preprint 
  • R. Heinrich, S. Gärtner, T.-M. Hesse, T. Ruhroth, R. Reussner, B. Paech, K. Schneider, J. Jürjens: A Platform for Empirical Research on Information System Evolution. In: 27th International Conference on Software Engineering and Knowledge Engineering (SEKE 2015), IEEE, 2015. Regular paper.
    @InProceedings{seke15HGH, author = {R.~Heinrich and S.~G{\"a}rtner and T.-M.~Hesse and T.~Ruhroth and R.~Reussner and B.~Paech and K.~Schneider and J.~{J}{\"u}{r}jens}, title = {A Platform for Empirical Research on Information System Evolution}, booktitle = {27th International Conference on Software Engineering and Knowledge Engineering (SEKE 2015)}, OPTpages = {}, note = {Regular paper}, year = {2015}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, organization = {IEEE}, keywords = {internationalConferences, softwareEvolution}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/seke15HGH:URL}, }
     BibTeX   preprint 
  • S. Ahmadian, F. Coerschulte, J. Jürjens: Supporting the Security Certification of Cloud-Computing-Infrastructures (Invited Paper). In: Fifth International Symposium on Business Modeling and Software Design (BMSD 2015), 2015.
    @InProceedings{bmsd15, author = {S.~Ahmadian and F.~Coerschulte and J.~{J}{\"u}{r}jens}, title = {Supporting the Security Certification of Cloud-Computing-Infrastructures (Invited Paper)}, booktitle = {Fifth International Symposium on Business Modeling and Software Design (BMSD 2015)}, year = {2015}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/bmsd15.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/bmsd15.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/bmsd15.wav:URL}, keywords = {conferences,secureSoftwareEngineeringSecureService/CloudBasedSystems}, }
     BibTeX   preprint   slides   audio 
  • J. Jürjens: Towards Security of Adaptable Information Systems - Current Views and Future Perspectives (Invited Panel Participation). In: Fifth International Symposium on Business Modeling and Software Design (BMSD 2015), 2015.
    @InProceedings{bmsd15J, author = {J.~{J}{\"u}{r}jens}, title = {Towards Security of Adaptable Information Systems -- Current Views and Future Perspectives (Invited Panel Participation)}, booktitle = {Fifth International Symposium on Business Modeling and Software Design (BMSD 2015)}, year = {2015}, keywords = {conferences,softwareEvolution}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/bmsd15panel.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/bmsd15panel.wav:URL}, }
     BibTeX   slides   audio 
  • M. S. Rahman, M. S. Sadi, S. Ahammed, J. Jürjens: Soft Error Tolerance using HVDD: Horizontal-Vertical-Double-Bit Diagonal Parity Method. In: International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), IEEE, 2015.
    @InProceedings{iceeict15RSAJ, author = {M. S.~Rahman and M. S.~Sadi and S.~Ahammed and J.~{J}{\"u}{r}jens}, title = {Soft Error Tolerance using {HVDD}: Horizontal-Vertical-Double-Bit Diagonal Parity Method}, booktitle = {International Conference on Electrical Engineering and Information Communication Technology (ICEEICT)}, OPTpages = {}, year = {2015}, organization = {IEEE}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/iceeict15RSAJ.pdf:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   preprint 
  • J. Jürjens: Security Certification in the Presence of Evolution: Models vs. Code (Invited talk). In: Software Engineering and Formal Methods - SEFM 2014 Collocated Workshops, Revised Selected Papers, LNCS, vol. 8938, pp. XIX-XX, 2015.
    @InProceedings{safome14J, author = {J.~{J}{\"u}{r}jens}, title = {Security Certification in the Presence of Evolution: Models vs. Code (Invited talk)}, booktitle = {Software Engineering and Formal Methods - {SEFM} 2014 Collocated Workshops, Revised Selected Papers}, pages = {XIX--XX}, year = {2015}, volume = {8938}, series = {LNCS}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/safome14.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/safome14.wav:URL}, keywords = {invitedTalk, invitedWorkshop, softwareEvolution}, doi = {10.1007/978-3-319-15201-1}, }
     BibTeX   DOI   slides   audio 
  • J. Jürjens, A. S. Ahmadian: Model-based Security Analysis and Applications to Security Economics (Invited Talk). In: International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015), 2015. Special Session on Security and Privacy in Model Based Engineering.
    @InProceedings{modelsward15, author = {J.~{J}{\"u}{r}jens and A. S.~Ahmadian}, title = {Model-based Security Analysis and Applications to Security Economics (Invited Talk)}, booktitle = {International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015)}, note = {Special Session on Security and Privacy in Model Based Engineering.}, OPTpages = {}, year = {2015}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, OPTseries = {}, OPTorganization = {}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/spie_15.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/spie15.pdf:URL}, keywords = {conferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   preprint   slides 
  • J. Stocker, S. Wenzel, J. Jürjens: IT-Risiko-Check: Das Wissen um geschäftskritische IT-Risiken. In: D-A-CH Security 2015, 2015.
    @InProceedings{StoWenJur15, author = {J.~Stocker and S.~Wenzel and J.~J\"urjens}, title = {{IT-Risiko-Check: Das Wissen um gesch\"aftskritische IT-Risiken}}, booktitle = {D-A-CH Security 2015}, OPTpages = {}, year = {2015}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/stowenjur15.pdf:URL}, keywords = {nonEnglish, secureSoftwareEngineeringITSecurityRiskAssessment}, }
     BibTeX   preprint 
  • J. Jürjens: Digitalisierung - Chancen für den Mittelstand (Podiumsdiskussion) 15. Sparkassen-Forum Deutscher Mittelstand 2015
    @Misc{sfdm15, author = {J.~{J}{\"u}{r}jens}, title = {Digitalisierung -- Chancen f{\"u}r den Mittelstand (Podiumsdiskussion)}, howpublished = {15.\ Sparkassen-Forum Deutscher Mittelstand}, year = {2015}, URL = {http://mittelstandsforum.sparkasseblog.de}, file = {audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/sparkasse-mittelstand_15cut.wav:URL}, keywords = {conferences}, }
     BibTeX   URL   audio 
  • S. Gärtner, T. Ruhroth, J. Bürger, K. Schneider, J. Jürjens: Towards Maintaining Long-Living Information Systems by Incorporating Evolving Security Knowledge. In: Software Engineering (SE 2015), Lecture Notes in Informatics, GI, 2015.
    @InProceedings{se15GRBSJ, author = {S.~G{\"a}rtner and T.~Ruhroth and J.~B{\"u}rger and K.~Schneider and J.~{J}{\"u}{r}jens}, title = {Towards Maintaining Long-Living Information Systems by Incorporating Evolving Security Knowledge}, booktitle = {Software Engineering (SE 2015)}, OPTpages = {}, year = {2015}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, series = {Lecture Notes in Informatics}, organization = {GI}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/se15.pdf:URL}, keywords = {workshop, industrialConferences, softwareEvolution}, }
     BibTeX   preprint 
  • D. G. Rosado, N. Lammari, J. Jürjens: Special Issue on Secure Information Systems Engineering. In: Computer Journal, vol. TBD, no. TBD, pp. TBD, 2015. Editorial, accepted for publication.
    @Article{CJ15si, author = {D. G.~Rosado and N.~Lammari and J.~J{\"u}rjens}, title = {Special Issue on Secure Information Systems Engineering}, journal = {Computer Journal}, year = {2015}, volume = {TBD}, number = {TBD}, pages = {TBD}, note = {Editorial, accepted for publication}, keywords = {specialIssuesOfJournals, secureSoftwareEngineeringGeneral}, file = {TBD}, }
     BibTeX 
  • J. Jürjens: Big Data mit Compliance: Konzepte für den Umgang mit Compliance beim Einsatz von Big Data in der Finanzbranche. In: TDWI 2015, 2015.
    @InProceedings{tdwi15, author = {J.~{J}{\"u}{r}jens}, title = {{Big Data mit Compliance: Konzepte f\"ur den Umgang mit Compliance beim Einsatz von Big Data in der Finanzbranche}}, booktitle = {TDWI 2015}, year = {2015}, keywords = {nonEnglish, secureSoftwareEngineeringCompliance}, URL = {http://www.tdwi-konferenz.de/tdwi2015.html}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/tdwi15.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/tdwi15.wav:URL}, }
     BibTeX   URL   slides   audio 
  • J. Jürjens: Modellbasiertes Sicherheits-Testen für Cloud-basierte Prozesse. In: iqnite 2015, 2015.
    @InProceedings{iqnite15, author = {J.~{J}{\"u}{r}jens}, title = {{Modellbasiertes Sicherheits-Testen f\"ur Cloud-basierte Prozesse}}, booktitle = {iqnite 2015}, year = {2015}, keywords = {nonEnglish, secureSoftwareEngineeringSecurityTesting}, URL = {http://www.iqnite-conferences.com/de}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/iqnite15.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/iqnite15.wav:URL}, }
     BibTeX   URL   slides   audio 
  • J. Jürjens: Compliance Warehouse: Ansätze für die Integration von Compliance-Analysen mit Data Warehousing in der Finanzbranche mittels Process-Mining. In: DW 2015, 2015.
    @InProceedings{dw15, author = {J.~{J}{\"u}{r}jens}, title = {{Compliance Warehouse: Ans\"atze f\"ur die Integration von Compliance-Analysen mit Data Warehousing in der Finanzbranche mittels Process-Mining}}, booktitle = {DW 2015}, year = {2015}, keywords = {nonEnglish, secureSoftwareEngineeringCompliance}, }
     BibTeX 
  • J. Jürjens: Modellbasiertes Sicherheits-Testen für Cloud-basierte Prozesse. In: Software-QS-Tag 2015, 2015.
    @InProceedings{qs15, author = {J.~{J}{\"u}{r}jens}, title = {{Modellbasiertes Sicherheits-Testen f\"ur Cloud-basierte Prozesse}}, booktitle = {Software-QS-Tag 2015}, year = {2015}, keywords = {nonEnglish, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX 
  • J. Jürjens: Der Industrial Data Space: Datenanalyse für Industrie- und Geschäftsprozesse im Mittelstand. In: IHK Technologieforum Rheinland-Pfalz 2015, 2015.
    @InProceedings{ihkrp15, author = {J.~{J}{\"u}{r}jens}, title = {{Der Industrial Data Space: Datenanalyse f\"ur Industrie- und Gesch\"aftsprozesse im Mittelstand}}, booktitle = {IHK Technologieforum Rheinland-Pfalz 2015}, year = {2015}, keywords = {nonEnglish, secureSoftwareEngineeringSecureService/CloudBasedSystems}, }
     BibTeX 
  • J. Jürjens, Eduardo Fernandez: Secure Database Development. In: Springer pp. TBD Encyclopedia of Database Systems, 2015. Invited chapter, to be published.
    @InCollection{eds14, author = {J.~{J}{\"u}{r}jens and Eduardo Fernandez}, title = {Secure Database Development}, booktitle = {Encyclopedia of Database Systems}, year = {2015}, pages = {TBD}, publisher = {Springer}, note = {Invited chapter, to be published}, keywords = {invitedBookChapters, databaseSecurity}, }
     BibTeX 
  • J. Jürjens: Transparenz und Sicherheit in der Lieferkette (Eingeladener Vortrag). In: Arbeitstreffen des Bundesverband Deutscher Postdienstleister, 2015.
    @InProceedings{bvdp15, author = {J.~{J}{\"u}{r}jens}, title = {{Transparenz und Sicherheit in der Lieferkette (Eingeladener Vortrag)}}, booktitle = {Arbeitstreffen des Bundesverband Deutscher Postdienstleister}, year = {2015}, keywords = {nonEnglish, secureSoftwareEngineeringCompliance}, }
     BibTeX 
  • J. Jürjens: Ökonomische Analyse von Sicherheitsmaßnahmen (Eingeladener Vortrag). In: Arbeitstreffen der Allianz für Sicherheit in der Wirtschaft e.V., 2015.
    @InProceedings{asw15, author = {J.~{J}{\"u}{r}jens}, title = {{\"Okonomische Analyse von Sicherheitsma{\ss}nahmen (Eingeladener Vortrag)}}, booktitle = {Arbeitstreffen der Allianz f{\"u}r Sicherheit in der Wirtschaft e.V.}, year = {2015}, keywords = {nonEnglish, securityEconomics}, }
     BibTeX 
  • J. Jürjens: Beyond One-Shot Security: Keeping Software Secure during Evolution. In: 12. Jahrestreffen der GI-FG "Formale Methoden und Software Engineering für Sichere Systeme (FoMSESS), Bremen, 2015.
    @InProceedings{fomsess15, author = {J.~{J}{\"u}{r}jens}, title = {Beyond One-Shot Security: Keeping Software Secure during Evolution}, booktitle = {{12.\ Jahrestreffen der GI-FG "Formale Methoden und Software Engineering f\"ur Sichere Systeme (FoMSESS)}}, year = {2015}, address = {Bremen}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/fomsess15.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/fomsess15.wav:URL}, keywords = {nonEnglish, softwareEvolution}, }
     BibTeX   slides   audio 

2014


  • J. Jürjens: Security Certification in the Presence of Evolution: Models vs. Code (Keynote). In: International Workshop on Safety and Formal Methods (SaFoMe@SEFM 2014), 2014.
    @InProceedings{safome14talkJ, author = {J.~J{\"u}rjens}, title = {Security Certification in the Presence of Evolution: Models vs.~Code (Keynote)}, booktitle = {International Workshop on Safety and Formal Methods (SaFoMe@SEFM 2014)}, year = {2014}, keywords = {conferences, softwareEvolution}, }
     BibTeX 
  • F. Dupressoir, A. D. Gordon, J. Jürjens, D. Naumann: Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. In: Journal of Computer Security, vol. 22, no. 5, pp. 823-866, 2014. Special issue with best papers from the 24th IEEE Computer Security Foundations Symposium (CSF).
    @Article{DGJN14, author = {F.~Dupressoir and A. D.~Gordon and J.~J{\"u}rjens and D.~Naumann}, title = {Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols}, journal = {Journal of Computer Security}, volume = {22}, number = {5}, pages = {823--866}, year = {2014}, note = {Special issue with best papers from the 24th IEEE Computer Security Foundations Symposium (CSF)}, file = {preprint:http\://arxiv.org/abs/1312.6532:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {10.3233/JCS-140508}, keywords = {selectedPub,modelbasedSecurityEngineering,secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • S. Wenzel, D. Warzecha, J. Jürjens, M. Ochoa: UMLchange - Specifying Model Changes to Support Security Verification of Potential Evolution. In: Journal of Computer Standards & Interfaces, vol. 36, pp. 776-791, 2014. Special Issue on Security in Information Systems.
    @Article{CSI14wwjo, author = {S.~Wenzel and D.~Warzecha and J.~J{\"u}rjens and M.~Ochoa}, title = {{UMLchange} -- Specifying Model Changes to Support Security Verification of Potential Evolution}, journal = {Journal of Computer Standards \& Interfaces}, year = {2014}, volume = {36}, issue = {4}, pages = {776--791}, note = {Special Issue on Security in Information Systems.}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/csi14wwjo.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {http://doi.org/10.1016/j.csi.2013.12.011}, keywords = {selectedPub,modelbasedSecurityEngineering,softwareEvolution, secvolution}, }
     BibTeX   DOI   preprint   dblp 
  • S. Gärtner, T. Ruhroth, J. Bürger, K. Schneider, J. Jürjens: Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge. In: 22nd IEEE International Requirements Engineering Conference, pp. 103-112, IEEE, 2014.
    @InProceedings{re14GRBSJ, author = {S.~G{\"a}rtner and T.~Ruhroth and J.~B{\"u}rger and K.~Schneider and J.~J{\"u}rjens}, title = {Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge}, booktitle = {22nd IEEE International Requirements Engineering Conference}, pages = {103--112}, year = {2014}, organization = {IEEE}, DOI = {10.1109/RE.2014.6912252}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/re14grbsj.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/Presentation-RE-2014-Gaertner.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering, secvolution}, }
     BibTeX   DOI   preprint   slides   dblp 
  • T. Ruhroth, S. Gärtner, J. Bürger, J. Jürjens, K. Schneider: Towards Adaptation and Evolution of Domain-specific Knowledge for Maintaining Secure Systems. In: 15th International Conference of Product Focused Software Development and Process Improvement (Profes'14), Springer-Verlag, LNCS, vol. 8892, pp. 239-253, 2014.
    @InProceedings{profes14, author = {T.~Ruhroth and S.~G{\"a}rtner and J.~B{\"u}rger and J.~J{\"u}rjens and K.~Schneider}, title = {Towards Adaptation and Evolution of Domain-specific Knowledge for Maintaining Secure Systems}, booktitle = {15th International Conference of Product Focused Software Development and Process Improvement (Profes'14)}, pages = {239--253}, year = {2014}, volume = {8892}, series = {LNCS}, publisher = {Springer-Verlag}, DOI = {10.1007/978-3-319-13835-0_17}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/profes14.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-319-13835-0_17:URL}, keywords = {internationalConferences, softwareEvolution, secvolution}, }
     BibTeX   DOI   preprint   dblp   SpringerLink 
  • J. Jürjens, F. Piessens, N. Bielova (editors): 6th International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Springer, LNCS, vol. 8364, 2014.
    @Proceedings{JurPieBie14, title = {6th International Symposium on Engineering Secure Software and Systems (ESSoS 2014)}, year = {2014}, editor = {J.~{J}{\"u}{r}jens and F.~Piessens and N.~Bielova}, volume = {8364}, series = {LNCS}, publisher = {Springer}, file = {electronic:http\://www.springer.com/computer/communication+networks/book/978-3-319-04896-3:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/book/10.1007/978-3-319-04897-0:URL}, keywords = {procs, book, secureSoftwareEngineeringGeneral}, }
     BibTeX   electronic   dblp   SpringerLink 
  • J. Bürger, J. Jürjens, T. Ruhroth, S. Gärtner, K. Schneider: Model-based Security Engineering: Managed Co-Evolution of Security Knowledge and Software Models. In: A. Aldini, J. Lopez, F. Martinelli (editors): Lecture Notes in Computer Science pp. 34-53 Foundations of Security Analysis and Design VII: FOSAD Tutorial Lectures, 2014
    @InCollection{fosad14, author = {J.~B{\"u}rger and J.~{J}{\"u}{r}jens and T.~Ruhroth and S.~G{\"a}rtner and K.~Schneider}, title = {Model-based Security Engineering: Managed Co-Evolution of Security Knowledge and Software Models}, booktitle = {Foundations of Security Analysis and Design VII: FOSAD Tutorial Lectures}, year = {2014}, editor = {A.~Aldini and J.~Lopez and F.~Martinelli}, volume = {8604}, series = {Lecture Notes in Computer Science}, pages = {34--53}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/fosad14.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-319-10082-1_2:URL}, keywords = {invitedBookChapters, softwareEvolution, secvolution}, }
     BibTeX   preprint   dblp   SpringerLink 
  • M. Felderer, B. Katt, P. Kalb, J. Jürjens, M. Ochoa, F. Paci, L. M. S. Tran, T. T. Tun, K. Yskout, R. Scandariato, F. Piessens, D. Vanoverberghe, E. Fourneret, M. Gander, B. Solhaug, R. Breu: Evolution of Security Engineering Artifacts: A State of the Art Survey. In: International Journal of Secure Software Engineering (IJSSE), vol. 5, no. 4, pp. 48-98, 2014.
    @Article{ijsse14, author = {M.~Felderer and B.~Katt and P.~Kalb and J.~J{\"u}rjens and M.~Ochoa and F.~Paci and L. M. S.~Tran and T. T.~Tun and K.~Yskout and R.~Scandariato and F.~Piessens and D.~Vanoverberghe and E.~Fourneret and M.~Gander and B.~Solhaug and R.~Breu}, title = {Evolution of Security Engineering Artifacts: A State of the Art Survey}, journal = {International Journal of Secure Software Engineering (IJSSE)}, year = {2014}, volume = {5}, number = {4}, pages = {48--98}, file = {preprint:http://www.researchgate.net/profile/Michael_Felderer/publication/271213941_Evolution_of_Security_Engineering_Artifacts_A_State_of_the_Art_Survey/links/54c28b210cf2911c7a492759.pdf?ev=pub_ext_doc_dl&origin=publication_detail&inViewer=true:URL}, keywords = {modelbasedSecurityEngineering, softwareEvolution}, }
     BibTeX   preprint 
  • T. Humberg, C. Wessel, D. Poggenpohl, S. Wenzel, T. Ruhroth, J. Jürjens: Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes. In: Cloud Computing and Services Science (selected best papers), Springer, Communications in Computer and Information Science, vol. 453, pp. 1-16, 2014.
    @InProceedings{closer13selected, author = {T.~Humberg and C.~Wessel and D.~Poggenpohl and S.~Wenzel and T.~Ruhroth and J.~J{\"u}rjens}, title = {Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes}, booktitle = {Cloud Computing and Services Science (selected best papers)}, year = {2014}, volume = {453}, series = {Communications in Computer and Information Science}, publisher = {Springer}, keywords = {internationalConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems, secvolution, secureSoftwareEngineeringCompliance}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/closer13selected.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-319-11561-0_3:URL}, pages = {1--16}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens, K. Schneider: The SecReq approach: From Security Requirements to Secure Design while Managing Software Evolution. In: Software Engineering (SE 2014), Lecture Notes in Informatics, GI, 2014.
    @InProceedings{se14JS, author = {J.~{J}{\"u}{r}jens and K.~Schneider}, title = {The SecReq approach: From Security Requirements to Secure Design while Managing Software Evolution}, booktitle = {Software Engineering (SE 2014)}, OPTpages = {}, year = {2014}, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, series = {Lecture Notes in Informatics}, organization = {GI}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/se14JS.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {workshop, industrialConferences, softwareEvolution}, }
     BibTeX   preprint   dblp 
  • C. Blanco, D. G. Rosado, L. E., J. Jürjens: Security in Information Systems: Advances and New Challenges. In: Computer Standards & Interfaces, vol. 36, no. 4, pp. 687-688, 2014. Editorial for a special issue.
    @Article{CSI14, author = {C.~Blanco and D. G.~Rosado and L. E.~S\'{a}nchez and J.~J{\"u}rjens}, title = {Security in Information Systems: Advances and New Challenges}, journal = {Computer Standards \& Interfaces}, year = {2014}, volume = {36}, number = {4}, pages = {687--688}, note = {Editorial for a special issue}, keywords = {specialIssuesOfJournals, secureSoftwareEngineeringSecureInformationSystems}, file = {preprint:http://www.researchgate.net/profile/David_Rosado2/publication/259517138_Security_in_Information_Systems_Advances_and_new_Challenges/links/02e7e530732a31fb60000000.pdf;DOI:http\://doi.org/10.1016/j.csi.2013.12.003:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, }
     BibTeX   DOI   dblp 
  • D. G. Rosado, C. Blanco, D. Mellado, J. Jürjens, L. E. Sanchez (editors): Proceedings of the 11th International Workshop on Security in Information Systems (WOSIS 2014), SciTePress, 2014.
    @Proceedings{wosis14, title = {Proceedings of the 11th International Workshop on Security in Information Systems (WOSIS 2014)}, year = {2014}, editor = {D. G.~Rosado and C.~Blanco and D.~Mellado and J.~J{\"u}rjens and L. E.~Sanchez}, publisher = {SciTePress}, keywords = {procs, secureSoftwareEngineeringSecureInformationSystems}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, }
     BibTeX   dblp 
  • Jan Jürjens, Eduardo B., Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer: Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). In: CoRR, vol. abs/1409.6608, 2014.
    @article{DBLP:journals/corr/JurjensFFRH14, author = {Jan J{\"{u}}rjens and Eduardo B. Fern{\'{a}}ndez and Robert B. France and Bernhard Rumpe and Constance L. Heitmeyer}, title = {Critical Systems Development Using Modeling Languages. {(CSDUML-04):} Current Developments and Future Challenges (Report on the Third International Workshop)}, journal = {CoRR}, volume = {abs/1409.6608}, year = {2014}, url = {http://arxiv.org/abs/1409.6608}, archivePrefix = {arXiv}, eprint = {1409.6608}, }
     BibTeX   URL 
  • J. Jürjens: Geschäftsprozesse in der Cloud - aber sicher ! (... und compliant). In: Software Engineering + Architecture (SEACON 2014), 2014.
    @InProceedings{seacon14J, author = {J.~{J}{\"u}{r}jens}, title = {Gesch{\"a}ftsprozesse in der Cloud -- aber sicher ! (... und compliant)}, booktitle = {Software Engineering + Architecture (SEACON 2014)}, year = {2014}, keywords = {nonEnglish, secureSoftwareEngineeringSecureService/CloudBasedSystems}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/seacon_14.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/seacon14.wav:URL}, URL = {http://www.sea-con.de}, }
     BibTeX   URL   slides   audio 
  • T. Ruhroth, S. Gärtner, J. Bürger, J. Jürjens, K. Schneider: Versioning and Evolution Requirements for Model-Based System Development. In: International Workshop on Comparison and Versioning of Software Models (CVSM 2014), Softwaretechnik-Trends, vol. 34/2, pp. 20-24, 2014.
    @InProceedings{cvsm14RGBJS, author = {T.~Ruhroth and S.~G{\"a}rtner and J.~B{\"u}rger and J.~{J}{\"u}{r}jens and K.~Schneider}, title = {Versioning and Evolution Requirements for Model-Based System Development}, booktitle = {International Workshop on Comparison and Versioning of Software Models (CVSM 2014)}, year = {2014}, keywords = {workshop, industrialConferences, softwareEvolution}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/cvsm14.pdf:URL}, pages = {20--24}, volume = {34/2}, series = {Softwaretechnik-Trends}, }
     BibTeX   preprint 
  • S. Gärtner, J. Bürger, K. Schneider, J. Jürjens: Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen. In: 1st Collaborative Workshop on Evolution and Maintenance of Long-Living Systems (EMLS14), 2014.
    @InProceedings{emls14GBSJ, author = {S.~G{\"a}rtner and J.~B{\"u}rger and K.~Schneider and J.~{J}{\"u}{r}jens}, title = {Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen}, booktitle = {1st Collaborative Workshop on Evolution and Maintenance of Long-Living Systems (EMLS14)}, OPTpages = {}, year = {2014}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/emls14GBSJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {nonEnglish, softwareEvolution}, }
     BibTeX   preprint   dblp 

2013


  • S. Taubenberger, J. Jürjens, Y. Yu, B. Nuseibeh: Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models. In: Journal on Information Management and Computer Security (IMCS), vol. 21, no. 3, pp. 202-223, 2013.
    @Article{TauJurYuNus13, author = {S.~Taubenberger and J.~{J}{\"u}{r}jens and Y.~Yu and B.~Nuseibeh}, title = {Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models}, journal = {Journal on Information Management and Computer Security (IMCS)}, year = {2013}, volume = {21}, number = {3}, pages = {202--223}, DOI = {http://doi.org/10.1108/IMCS-09-2012-0054}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/imcs13TJYN.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering,secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • T. Humberg, C. Wessel, D. Poggenpohl, S. Wenzel, T. Ruhroth, J. Jürjens: Ontology-Based Analysis of Compliance and Regulatory Requirements of Business Processes. In: F. Desprez, D. Ferguson, E. Hadar, F. Leymann, M. Jarke, M. Helfert (editors): 3rd International Conference on Cloud Computing and Services Science (Closer 2013), SciTePress, pp. 553-561, 2013.
    @InProceedings{closer13WHWPRJ, author = {T.~Humberg and C.~Wessel and D.~Poggenpohl and S.~Wenzel and T.~Ruhroth and J.~J{\"u}rjens}, title = {Ontology-Based Analysis of Compliance and Regulatory Requirements of Business Processes}, booktitle = {3rd International Conference on Cloud Computing and Services Science (Closer 2013)}, year = {2013}, editor = {F.~Desprez and D.~Ferguson and E.~Hadar and F.~Leymann and M.~Jarke and M.~Helfert}, publisher = {SciTePress}, keywords = {internationalConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/cloudsecgov13HWPWRJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, pages = {553--561}, }
     BibTeX   preprint   dblp 
  • J. Jürjens, B. Livshits, R. Scandariato (editors): 5th International Symposium on Engineering Secure Software and Systems (ESSoS 2013), Springer, LNCS, vol. 7781, 2013.
    @Proceedings{JurLivSca13, title = {5th International Symposium on Engineering Secure Software and Systems (ESSoS 2013)}, year = {2013}, editor = {J.~{J}{\"u}{r}jens and B.~Livshits and R.~Scandariato}, volume = {7781}, series = {LNCS}, publisher = {Springer}, file = {SpringerLink:http://link.springer.com/book/10.1007%2F978-3-642-36563-8:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {procs, book, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   SpringerLink   dblp 
  • J. Jürjens: IT-Architekturen für auditierbare Geschäftsprozessanwendungen (Eingeladener Vortrag). In: Fraunhofer-Symposium "Netzwert" 2013, München, 2013.
    @InProceedings{netzwert13J, author = {J.~{J}{\"u}{r}jens}, title = {IT-Architekturen f{\"u}r auditierbare Gesch{\"a}ftsprozessanwendungen (Eingeladener Vortrag)}, booktitle = {Fraunhofer-Symposium {"}Netzwert{"} 2013}, year = {2013}, address = {M{\"u}nchen}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/netzwert_13_final.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/netzwert13.wav:URL}, keywords = {conferences, secureSoftwareEngineeringCompliance}, }
     BibTeX   slides   audio 
  • J. Jürjens: Security for Changing Software and Systems (Invited Talk). In: tubs.CITY Symposium 2013, Braunschweig, 2013.
    @InProceedings{tubscity13J, author = {J.~{J}{\"u}{r}jens}, title = {Security for Changing Software and Systems (Invited Talk)}, booktitle = {tubs.CITY Symposium 2013}, year = {2013}, address = {Braunschweig}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/tubs13.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/tubs13.wav:URL}, keywords = {conferences, softwareEvolution}, }
     BibTeX   slides   audio 
  • J. Jürjens: Model-centric Security Verification subject to Evolution (Invited Talk) Eternals Workshop @ ESSOS'13, Paris 2013
    @Misc{eternals13J, author = {J.~{J}{\"u}{r}jens}, title = {Model-centric Security Verification subject to Evolution (Invited Talk)}, howpublished = {Eternals Workshop @ ESSOS'13, Paris}, year = {2013}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/eternals13.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/eternals13.WAV:URL}, keywords = {invitedTalk, invitedWorkshop, softwareEvolution}, }
     BibTeX   slides   audio 
  • J. Jürjens: Hot Topics in Model-based Security (Invited Panel Contribution) Eternals Workshop @ ESSOS'13, Paris 2013
    @Misc{eternals13Jpanel, author = {J.~{J}{\"u}{r}jens}, title = {Hot Topics in Model-based Security (Invited Panel Contribution)}, howpublished = {Eternals Workshop @ ESSOS'13, Paris}, year = {2013}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/eternals13panel.pdf:URL}, keywords = {invitedTalk, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides 
  • J. Jürjens: Sicherheit und Compliance in der Cloud (Eingeladener Vortrag). In: microfin Jahresempfang 2013, Frankfurt, 2013.
    @InProceedings{microfin13J, author = {J.~{J}{\"u}{r}jens}, title = {Sicherheit und Compliance in der Cloud (Eingeladener Vortrag)}, booktitle = {microfin Jahresempfang 2013}, year = {2013}, address = {Frankfurt}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/microfin13.pdf:URL}, keywords = {nonEnglish, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, }
     BibTeX   slides 
  • J. Jürjens: Zertifizierung für sichere Cyber-Physikalische Systeme. In: Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2013), Paderborn (Germany), 2013.
    @InProceedings{iuknrw13j, author = {J.~{J}{\"u}{r}jens}, title = {{Zertifizierung f\"ur sichere Cyber-Physikalische Systeme}}, booktitle = {Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2013)}, year = {2013}, address = {Paderborn (Germany)}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/iuk13.pdf:URL}, keywords = {nonEnglish, cyberphysicalSystemsSecurity}, URL = {http://iuk-tag-nrw.de/}, }
     BibTeX   URL   slides 
  • J. Jürjens: Evolution vs. semantische Konsistenz Workshop des GI-AK Traceability, Dortmund 2013
    @Misc{giak13, author = {J.~{J}{\"u}{r}jens}, title = {Evolution vs. semantische Konsistenz}, howpublished = {Workshop des GI-AK Traceability, Dortmund}, year = {2013}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/ak-traceability13_kurz.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/ak-traceability13.wav:URL}, keywords = {nonEnglish, softwareEvolution}, }
     BibTeX   slides   audio 
  • J. Jürjens: Modellbasiertes Sicherheits- und Compliance-Management Jahrestreffen der GI-FG Formale Methoden und Software Engineering für Sichere Systeme (FoMSESS), Dortmund 2013
    @Misc{foMSESS13, author = {J.~{J}{\"u}{r}jens}, title = {Modellbasiertes Sicherheits- und Compliance-Management}, howpublished = {Jahrestreffen der GI-FG Formale Methoden und Software Engineering f{\"u}r Sichere Systeme (FoMSESS), Dortmund}, year = {2013}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/fomsess_13.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/fomsess_13.wav:URL}, keywords = {nonEnglish, secureSoftwareEngineeringCompliance}, }
     BibTeX   slides   audio 
  • J. Jürjens: Sicherheit und Compliance in der Cloud 3. Cyber-Sicherheits-Tag für Teilnehmer der Allianz für Cyber-Sicherheit 2013
    @Misc{cybersicherheit13, author = {J.~{J}{\"u}{r}jens}, title = {Sicherheit und Compliance in der Cloud}, howpublished = {3. Cyber-Sicherheits-Tag f{\"u}r Teilnehmer der Allianz f{\"u}r Cyber-Sicherheit}, year = {2013}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/cybersicherheit_13.pdf:URL}, keywords = {nonEnglish, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, }
     BibTeX   slides 

2012


  • M. Aizatulin, A. D. Gordon, J. Jürjens: Computational Verification of C Protocol Implementations by Symbolic Execution. In: 19th ACM Conference on Computer and Communications Security (CCS 2012), ACM, pp. 712-723, 2012.
    @InProceedings{ccs12AGJ, author = {M.~Aizatulin and A. D.~Gordon and J.~J{\"u}rjens}, title = {Computational Verification of C Protocol Implementations by Symbolic Execution}, booktitle = {19th ACM Conference on Computer and Communications Security (CCS 2012)}, year = {2012}, pages = {712--723}, DOI = {http://doi.acm.org/10.1145/2382196.2382271}, publisher = {ACM}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/ccs12AGJslides.pdf:URL;preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ccs12AGJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {selectedPub,internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis,vorsecurestreams}, }
     BibTeX   DOI   slides   preprint   dblp 
  • K. Schneider, E. Knauss, S. Houmb, S. Islam, J. Jürjens: Enhancing Security Requirements Engineering by Organisational Learning. In: Requirements Engineering Journal (REJ), vol. 17, no. 1, pp. 35-56, 2012.
    @Article{rej11SKHIJ, author = {K.~Schneider and E.~Knauss and S.~Houmb and S.~Islam and J.~J{\"u}rjens}, title = {Enhancing Security Requirements Engineering by Organisational Learning}, journal = {Requirements Engineering Journal (REJ)}, year = {2012}, volume = {17}, number = {1}, pages = {35--56}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/rej12SKHIJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s00766-011-0141-0:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 
  • M. Ochoa, J. Jürjens, J. Cuellar: Non-interference on UML State-charts. In: 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), Springer, Lecture Notes in Computer Science, vol. 7304, pp. 219-235, 2012.
    @InProceedings{tools12OJC, author = {M.~Ochoa and J.~{J}{\"u}{r}jens and J.~Cuellar}, title = {Non-interference on {UML} State-charts}, booktitle = {50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012)}, year = {2012}, series = {Lecture Notes in Computer Science}, pages = {219--235}, volume = {7304}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/tools12OJC.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-30561-0_16:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • M. Ochoa, J. Jürjens, D. Warzecha: A Sound Decision Procedure for the Compositionality of Secrecy. In: 4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012), Springer, Lecture Notes in Computer Science, vol. 7159, pp. 97-105, 2012.
    @InProceedings{essos12OJW, author = {M.~Ochoa and J.~{J}{\"u}{r}jens and D.~Warzecha}, title = {A Sound Decision Procedure for the Compositionality of Secrecy}, booktitle = {4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012)}, year = {2012}, series = {Lecture Notes in Computer Science}, pages = {97--105}, volume = {7159}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/essos12OJW.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-28166-2_10:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • S. Wenzel, C. Wessel, T. Humberg, J. Jürjens: Securing Processes for Outsourcing into the Cloud. In: F. Leymann, I. Ivanov, M. van Sinderen, T. Shan (editors): 2nd International Conference on Cloud Computing and Services Science (Closer 2012), pp. 675-680, 2012.
    @InProceedings{spoc12, author = {S.~Wenzel and C.~Wessel and T.~Humberg and J.~{J}{\"u}{r}jens}, title = {Securing Processes for Outsourcing into the Cloud}, booktitle = {2nd International Conference on Cloud Computing and Services Science (Closer 2012)}, year = {2012}, editor = {F.~Leymann and I.~Ivanov and M.~van Sinderen and T.~Shan}, pages = {675--680}, DOI = {10.5220/0003979306750680}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/slides/closer12_secureclouds.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/cloudsecgov.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems}, }
     BibTeX   DOI   slides   preprint   dblp 
  • T. Ruhroth, J. Jürjens: Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec. In: International Symposium on High Assurance Systems Engineering (HASE), IEEE, pp. 177-184, 2012.
    @InProceedings{hase12RJ, author = {T.~Ruhroth and J.~{J}{\"u}{r}jens}, title = {Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with {UMLsec}}, booktitle = {International Symposium on High Assurance Systems Engineering (HASE)}, year = {2012}, pages = {177--184}, publisher = {IEEE}, DOI = {http://doi.ieeecomputersociety.org/10.1109/HASE.2012.35}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/hase12RJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, softwareEvolution, secvolution}, }
     BibTeX   DOI   preprint   dblp 
  • David G. Rosado, Luís Enrique, Eduardo Fernández-Medina, J. Jürjens: Security in Information Systems: New Challenges and Opportunities. In: Journal of Universal Computer Science, vol. 18, no. 6, pp. 728-731, 2012. Editorial for special issue.
    @Article{DBLP:journals/jucs/RosadoSFJ12, author = {David G. Rosado and Lu{\'i}s Enrique Sanchez and Eduardo Fern{\'a}ndez-Medina and J.~J{\"u}rjens}, title = {Security in Information Systems: New Challenges and Opportunities}, journal = {Journal of Universal Computer Science}, year = {2012}, volume = {18}, pages = {728--731}, number = {6}, note = {Editorial for special issue}, bibsource = {DBLP, http://dblp.uni-trier.de}, ee = {http://www.jucs.org/jucs_18_6/security_in_information_systems}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/jucs_18_06_0728_0731_editorial.pdf:URL;URL:http://www.jucs.org/jucs_18_6/security_in_information_systems/abstract.html:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {specialIssuesOfJournals, secureSoftwareEngineeringSecureInformationSystems}, }
     BibTeX   preprint   URL   dblp 
  • J. Jürjens: Den Nebel lichten: Von Compliance-Regularien zu testbaren Sicherheitsanforderungen. In: iqnite 2012, 2012.
    @InProceedings{iqnite12, author = {J.~{J}{\"u}{r}jens}, title = {Den Nebel lichten: Von Compliance-Regularien zu testbaren Sicherheitsanforderungen}, booktitle = {iqnite 2012}, year = {2012}, keywords = {nonEnglish, secureSoftwareEngineeringCompliance}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/iqnite12.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/iqnite12.wma:URL}, URL = {http://www.iqnite-conferences.com/de}, }
     BibTeX   URL   slides   audio 
  • C. Wessel, T. Humberg, S. Wenzel, J. Jürjens: Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen. In: Workshop "Zertifizierung und modellgetriebene Entwicklung sicherer Software (ZeMoSS'12)", 2012.
    @InProceedings{zemoss12WHWJ, author = {C.~Wessel and T.~Humberg and S.~Wenzel and J.~{J}{\"u}{r}jens}, title = {Fr{\"u}hzeitige modellbasierte Risikoanalyse f{\"u}r mobile, verteilte Anwendungen}, booktitle = {Workshop {"}Zertifizierung und modellgetriebene Entwicklung sicherer Software (ZeMoSS'12){"}}, year = {2012}, keywords = {nonEnglish, secureSoftwareEngineeringITSecurityRiskAssessment}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/zemoss12WHWJ.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/zemoss12WHWJtalk.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, URL = {http://zemoss.in.tu-clausthal.de/}, }
     BibTeX   URL   preprint   slides   dblp 
  • J. Jürjens: Model-based Security Engineering. In: 12th International School on Foundations of Security Analysis and Design (FOSAD 2012), Bertinoro (Italy), 2012.
    @InProceedings{fosad12J, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering}, booktitle = {12th International School on Foundations of Security Analysis and Design (FOSAD 2012)}, year = {2012}, address = {Bertinoro (Italy)}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/fosad12talk.pdf:URL;audio-pt-1:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/fosad12_1.wma:URL;audio-pt-2:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/fosad12_2.spx:URL}, keywords = {graduateSchoolLectures, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides   audio-pt-1   audio-pt-2 
  • J. Jürjens: Informationssicherheit im Cloud Computing. In: Web-Konferenz des Anwenderkreis Informationstechnik und Telekommunikation (AKIT), 2012.
    @InProceedings{akit12, author = {J.~{J}{\"u}{r}jens}, title = {Informationssicherheit im Cloud Computing}, booktitle = {Web-Konferenz des Anwenderkreis Informationstechnik und Telekommunikation (AKIT)}, year = {2012}, keywords = {nonEnglish, secureSoftwareEngineeringSecureService/CloudBasedSystems}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/akit12talk.pdf:URL;audio:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/audio/akit12.spx:URL}, URL = {http://www.akit.de/view/content.jsf?channel=Web-Conferencing}, }
     BibTeX   URL   slides   audio 
  • J. Jürjens, K. Schneider: Beyond One-Shot Security. In: Verlagshaus Monsenstein und Vannerdat pp. 131-141 Modelling and Quality in Requirements Engineering (Essays Dedicated to Martin Glinz on the Occasion of His 60th Birthday), 2012
    @InCollection{JurSch12, author = {J.~{J}{\"u}{r}jens and K.~Schneider}, title = {Beyond One-Shot Security}, booktitle = {Modelling and Quality in Requirements Engineering (Essays Dedicated to Martin Glinz on the Occasion of His 60th Birthday)}, year = {2012}, pages = {131--141}, publisher = {Verlagshaus Monsenstein und Vannerdat}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/glinz12JS.pdf:URL}, keywords = {invitedBookChapters, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint 
  • C. Blanco Bueno, E. Fernandez-Medina, J. Trujillo, J. Jürjens: Modelado Seguro de Consultas OLAP y su Evolucion. In: Jornadas de Ingenieria del Software y Bases de Datos (JISBD 2012), Almeria, 2012.
    @InProceedings{ssae12, author = {C.~Blanco Bueno and E.~Fernandez-Medina and J.~Trujillo and J.~{J}{\"u}{r}jens}, title = {Modelado Seguro de Consultas OLAP y su Evolucion}, booktitle = {Jornadas de Ingenieria del Software y Bases de Datos (JISBD 2012)}, year = {2012}, address = {Almeria}, keywords = {nonEnglish, softwareEvolution}, URL = {http://sistedes2012.ual.es/}, }
     BibTeX   URL 
  • E. Fourneret, F. Bouquet, M. Ochoa, J. Jürjens, S. Wenzel: Vérification et Test pour des systémes évolutifs. In: AFADL 2012, Grenoble, 2012.
    @InProceedings{vtse12, author = {E.~Fourneret and F.~Bouquet and M.~Ochoa and J.~{J}{\"u}{r}jens and S.~Wenzel}, title = {V\'{e}rification et Test pour des syst\'{e}mes \'{e}volutifs}, booktitle = {AFADL 2012}, year = {2012}, address = {Grenoble}, keywords = {nonEnglish, secureSoftwareEngineeringSecurityTesting}, URL = {http://membres-liglab.imag.fr/idani/AFADL2012/}, }
     BibTeX   URL 

2011


  • J. Jürjens: Automated Security Hardening for Evolving UML Models. In: 33rd International Conference on Software Engineering (ICSE 2011), ACM, 2011.
    @InProceedings{icse11J, author = {J.~{J}{\"u}{r}jens}, title = {Automated Security Hardening for Evolving {UML} Models}, booktitle = {33rd International Conference on Software Engineering (ICSE 2011)}, year = {2011}, publisher = {ACM}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, softwareEvolution}, }
     BibTeX   dblp 
  • Seok-Won Lee, Mattia Monga, Jan Jürjens: Seventh international workshop on software engineering for secure systems: (SESS 2011). In: Jan Jürjens, Seok-Won Lee, Mattia Monga (editors): Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011, ACM, pp. 1200-1201, 2011.
    @inproceedings{DBLP:conf/icse/LeeMJ11, author = {Seok{-}Won Lee and Mattia Monga and Jan J{\"{u}}rjens}, editor = {Jan J{\"{u}}rjens and Seok{-}Won Lee and Mattia Monga}, title = {Seventh international workshop on software engineering for secure systems: {(SESS} 2011)}, booktitle = {Proceedings of the 33rd International Conference on Software Engineering, {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011}, pages = {1200--1201}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1985793.1986045}, doi = {10.1145/1985793.1986045}, }
     BibTeX   DOI 
  • Holger Schmidt, J. Jürjens: Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec. In: 23rd International Conference on Advanced Information System Engineering (CAiSE), Springer, London, Lecture Notes in Computer Science, vol. 6741, pp. 367-382, 2011.
    @InProceedings{caise11SJ, author = {Holger Schmidt and J.~{J}{\"u}{r}jens}, title = {Connecting Security Requirements Analysis and Secure Design Using Patterns and {UMLsec}}, booktitle = {23rd International Conference on Advanced Information System Engineering (CAiSE)}, year = {2011}, series = {Lecture Notes in Computer Science}, pages = {367--382}, volume = {6741}, address = {London}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/caise11SJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-21640-4_28:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering}, URL = {http://www.caise2011.com/}, }
     BibTeX   URL   preprint   dblp   SpringerLink 
  • M. Aizatulin, A. D. Gordon, J. Jürjens: Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution. In: 18th ACM Conference on Computer and Communications Security (CCS 2011), pp. 331-340, 2011.
    @InProceedings{ccs11AGJ, author = {M.~Aizatulin and A. D.~Gordon and J.~{J}{\"u}{r}jens}, title = {Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution}, booktitle = {18th ACM Conference on Computer and Communications Security (CCS 2011)}, year = {2011}, pages = {331--340}, crossref = {DBLP:conf/ccs/2011}, DOI = {http://doi.acm.org/10.1145/2046707.2046745}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ccs11AGJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/ccs11AGJslides.pdf:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis,vorsecurestreams}, }
     BibTeX   DOI   preprint   dblp   slides 
  • Muhammad Sheikh Sadi, Md. Mizanur Rahman Khan, Md. Nazim Uddin, Jan Jürjens: An Efficient Approach towards Mitigating Soft Errors Risks. In: CoRR, vol. abs/1110.3969, 2011.
    @article{DBLP:journals/corr/abs-1110-3969, author = {Muhammad Sheikh Sadi and Md. Mizanur Rahman Khan and Md. Nazim Uddin and Jan J{\"{u}}rjens}, title = {An Efficient Approach towards Mitigating Soft Errors Risks}, journal = {CoRR}, volume = {abs/1110.3969}, year = {2011}, url = {http://arxiv.org/abs/1110.3969}, archivePrefix = {arXiv}, eprint = {1110.3969}, }
     BibTeX   URL 
  • E. Fourneret, M. Ochoa, F. Bouquet, J. Botella, J. Jürjens, P. Yousefi: Model-Based Security Verification and Testing for Smart-cards. In: Sixth International Conference on Availability, Reliability and Security (AReS 2011), Vienna, pp. 272-279, 2011.
    @InProceedings{ares11FOBBJY, author = {E.~Fourneret and M.~Ochoa and F.~Bouquet and J.~Botella and J.~{J}{\"u}{r}jens and P.~Yousefi}, title = {Model-Based Security Verification and Testing for Smart-cards}, booktitle = {Sixth International Conference on Availability, Reliability and Security (AReS 2011)}, year = {2011}, pages = {272--279}, address = {Vienna}, DOI = {10.1109/ARES.2011.46}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ares11FOBBJY.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/ares11FOBBJYtalk.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityTesting, secureSoftwareEngineeringSecureEmbeddedSystems}, URL = {http://www.ares-conference.eu/}, }
     BibTeX   DOI   URL   preprint   slides   dblp 
  • F. Massacci, F. Bouquet, E. Fourneret, J. Jürjens, M. S. Lund, S. Madelénat, J. Muehlberg, F. Paci, S. Paul, F. Piessens, B. Solhaug, S. Wenzel: Orchestrating Security and System Engineering for Evolving Systems (Invited Paper). In: 4th European Conference ServiceWave, Springer, Lecture Notes in Computer Science, vol. 6994, pp. 134-143, 2011.
    @InProceedings{servicewave11, author = {F.~Massacci and F.~Bouquet and E.~Fourneret and J.~{J}{\"u}{r}jens and M. S.~Lund and S.~Madel{\'e}nat and J.~Muehlberg and F.~Paci and S.~Paul and F.~Piessens and B.~Solhaug and S.~Wenzel}, title = {Orchestrating Security and System Engineering for Evolving Systems (Invited Paper)}, booktitle = {4th European Conference ServiceWave}, year = {2011}, series = {Lecture Notes in Computer Science}, pages = {134--143}, volume = {6994}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/servicewave11.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-24755-2_12:URL}, keywords = {conferences, softwareEvolution}, }
     BibTeX   preprint   dblp   SpringerLink 
  • S. Taubenberger, J. Jürjens, B. Nuseibeh, Yijun Yu: Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain. In: 26th IFIP International Information Security Conference, Lucerne, pp. 259-270, 2011.
    @InProceedings{ifipsec11TJNY, author = {S.~Taubenberger and J.~{J}{\"u}{r}jens and B.~Nuseibeh and Yijun Yu}, title = {Problem Analysis of Traditional IT-Security Risk Assessment Methods -- An Experience Report from the Insurance and Auditing Domain}, booktitle = {26th IFIP International Information Security Conference}, year = {2011}, volume = {354}, pages = {259--270}, address = {Lucerne}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ifipsec11TJNY.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/ifipsec11TJNYtalk.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-21424-0_21:URL}, keywords = {internationalConferences, secureSoftwareEngineeringITSecurityRiskAssessment}, URL = {http://www.sec2011.org/}, }
     BibTeX   URL   preprint   slides   dblp   SpringerLink 
  • Denis Hatebur, Maritta Heisel, J. Jürjens, Holger Schmidt: Systematic Development of UMLsec Design Models Based on Security Requirements. In: Dimitra Giannakopoulou, Fernando Orejas (editors): Fundamental Approaches to Software Engineering - 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26-April 3, 2011. Proceedings, Springer, Saarbrücken (Germany), Lecture Notes in Computer Science, vol. 6603, pp. 232-246, 2011.
    @InProceedings{fase11HHJS, author = {Denis Hatebur and Maritta Heisel and J.~{J}{\"u}{r}jens and Holger Schmidt}, editor = {Dimitra Giannakopoulou and Fernando Orejas}, title = {Systematic Development of UMLsec Design Models Based on Security Requirements}, booktitle = {Fundamental Approaches to Software Engineering - 14th International Conference, {FASE} 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2011, Saarbr{\"{u}}cken, Germany, March 26-April 3, 2011. Proceedings}, year = {2011}, series = {Lecture Notes in Computer Science}, pages = {232--246}, volume = {6603}, address = {Saarbr{\"u}cken (Germany)}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/fase11HHJS.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-19811-3_17:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering}, URL = {http://www.lsi.upc.edu/~orejas/FASE.html}, }
     BibTeX   URL   preprint   dblp   SpringerLink 
  • Eric Knauss, Siv Hilde Houmb, Kurt Schneider, Shareeful Islam, J. Jürjens: Supporting Requirements Engineers in Recognising Security Issues. In: 17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Springer, Essen (Germany), Lecture Notes in Computer Science, vol. 6606, pp. 4-18, 2011.
    @InProceedings{refsq11KHSIJ, author = {Eric Knauss and Siv Hilde Houmb and Kurt Schneider and Shareeful Islam and J.~{J}{\"u}{r}jens}, title = {Supporting Requirements Engineers in Recognising Security Issues}, booktitle = {17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011)}, year = {2011}, series = {Lecture Notes in Computer Science}, pages = {4--18}, volume = {6606}, address = {Essen (Germany)}, publisher = {Springer}, crossref = {DBLP:conf/refsq/2011}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/refsq11KHSIJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-19858-8_2:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 
  • M. Aizatulin, F. Dupressoir, A. D. Gordon, J. Jürjens: Verifying Cryptographic Code in C: Some Experience and the Csec Challenge. In: 8th International Workshop on Formal Aspects of Security & Trust (FAST2011), pp. 1-20, 2011.
    @Conference{fast11ADGJ, author = {M.~Aizatulin and F.~Dupressoir and A. D.~Gordon and J.~{J}{\"u}{r}jens}, title = {Verifying Cryptographic Code in C: Some Experience and the Csec Challenge}, booktitle = {8th International Workshop on Formal Aspects of Security \& Trust (FAST2011)}, year = {2011}, pages = {1--20}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/fast11ADGJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-29420-4_1:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis, invitedWorkshop}, }
     BibTeX   preprint   dblp   SpringerLink 
  • Mihhail Aizatulin, Andrew D. Gordon, J. Jürjens: Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution. In: CoRR, vol. abs/1107.1017, pp. 331-340, 2011.
    @Article{evcm11a, author = {Mihhail Aizatulin and Andrew D. Gordon and J.~{J}{\"u}{r}jens}, title = {Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution}, journal = {CoRR}, year = {2011}, volume = {abs/1107.1017}, pages = {331--340}, DOI = {http://arxiv.org/abs/1107.1017}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   dblp 
  • S. Islam, H. Mouratidis, J. Jürjens: A Framework to Support Alignment of Secure Software Engineering with Legal Regulations. In: 8th International Workshop on Security in Information Systems (WOSIS 2011), 13th International Conference on Enterprise Information Systems (ICEIS 2011), Beijing, 2011.
    @InProceedings{iceis11IMJ, author = {S.~Islam and H.~Mouratidis and J.~{J}{\"u}{r}jens}, title = {A Framework to Support Alignment of Secure Software Engineering with Legal Regulations}, booktitle = {8th International Workshop on Security in Information Systems (WOSIS 2011), 13th International Conference on Enterprise Information Systems (ICEIS 2011)}, year = {2011}, address = {Beijing}, journal = {8th International Workshop on Security in Information Systems (WOSIS 2011), 13th International Conference on Enterprise Information Systems (ICEIS 2011)}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringSecurityRequirementsEngineering, secureSoftwareEngineeringCompliance}, }
     BibTeX 
  • S. Islam, H. Mouratidis, J. Jürjens: A Framework to Support Alignment of Secure Software Engineering with Legal Regulations. In: Journal of Software and Systems Modeling (SoSyM), Springer-Verlag, vol. 10, no. 3, pp. 369-394, 2011.
    @Article{sosym11IMJ, author = {S.~Islam and H.~Mouratidis and J.~{J}{\"u}{r}jens}, title = {A Framework to Support Alignment of Secure Software Engineering with Legal Regulations}, journal = {Journal of Software and Systems Modeling (SoSyM), Springer-Verlag}, year = {2011}, volume = {10}, pages = {369--394}, number = {3}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/sosym10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s10270-010-0154-z:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering, secureSoftwareEngineeringCompliance}, }
     BibTeX   preprint   dblp   SpringerLink 
  • F. Dupressoir, A. D. Gordon, J. Jürjens, D. A. Naumann: Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. In: 24th IEEE Computer Security Foundations Symposium (CSF), pp. 3-17, 2011.
    @InProceedings{csf11DGJN, author = {F.~Dupressoir and A. D.~Gordon and J.~{J}{\"u}{r}jens and D. A.~Naumann}, title = {Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols}, booktitle = {24th IEEE Computer Security Foundations Symposium (CSF)}, year = {2011}, pages = {3--17}, DOI = {http://doi.ieeecomputersociety.org/10.1109/CSF.2011.8}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/csf11DGJN.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/csf11DGJNtalk.pdf:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis,vorsecurestreams}, URL = {http://research.microsoft.com/apps/pubs/?id=147704}, }
     BibTeX   DOI   URL   preprint   dblp   slides 
  • J. Jürjens, Loïc Marchal, Martín Ochoa, Holger Schmidt: Incremental Security Verification for Evolving UMLsec models. In: Seventh European Conference on Modelling Foundations and Applications (ECMFA 2011), Springer, Lecture Notes in Computer Science, vol. 6698, pp. 52-68, 2011.
    @InProceedings{ecmfa11JMOS, author = {J.~{J}{\"u}{r}jens and Lo{\"i}c Marchal and Mart{\'i}n Ochoa and Holger Schmidt}, title = {Incremental Security Verification for Evolving {UMLsec} models}, booktitle = {Seventh European Conference on Modelling Foundations and Applications (ECMFA 2011)}, year = {2011}, series = {Lecture Notes in Computer Science}, volume = {6698}, publisher = {Springer}, pages = {52--68}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ecmfa11JMOS.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-21470-7_5:URL}, keywords = {internationalConferences, softwareEvolution}, }
     BibTeX   preprint   dblp   SpringerLink 
  • M. S. Sadi, M. N. Uddin, M. M. R. Khan, J. Jürjens: Mitigating Soft Error Risks through Protecting Critical Variables and Blocks. In: International Conference on Computer Science, Engineering & Applications (ICCSEA'11), Springer, Communications in Computer and Information Science, vol. 154, pp. 137-145, 2011.
    @InProceedings{iccsea11SUKJ, author = {M. S.~Sadi and M. N.~Uddin and M. M. R.~Khan and J.~{J}{\"u}{r}jens}, title = {Mitigating Soft Error Risks through Protecting Critical Variables and Blocks}, booktitle = {International Conference on Computer Science, Engineering \& Applications (ICCSEA'11)}, year = {2011}, pages = {137--145}, volume = {154}, series = {Communications in Computer and Information Science}, publisher = {Springer}, DOI = {http://arxiv.org/abs/1110.3969}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/iccsea11SUKJ.pdf:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-21153-9_13:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   preprint   SpringerLink 
  • J. Jürjens, Martín Ochoa, Holger Schmidt, Loïc Marchal, Siv Hilde Houmb, Shareeful Islam: Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications. In: Bertinoro (Italy) pp. 504-526 11th School on Formal Methods (SFM'11), 2011
    @InCollection{sfm11JOSMHI, author = {J.~{J}{\"u}{r}jens and Mart{\'i}n Ochoa and Holger Schmidt and Lo{\"i}c Marchal and Siv Hilde Houmb and Shareeful Islam}, title = {Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications}, booktitle = {11th School on Formal Methods (SFM'11)}, year = {2011}, volume = {6659}, pages = {504--526}, address = {Bertinoro (Italy)}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/sfm11JOSMHI.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-21455-4_15:URL}, keywords = {graduateSchoolLectures, invitedBookChapters, softwareEvolution}, }
     BibTeX   preprint   dblp   SpringerLink 
  • Jan Jürjens, Seok-Won Lee, Mattia Monga (editors): Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011, ACM, 2011.
    @proceedings{DBLP:conf/icse/2011sess, editor = {Jan J{\"{u}}rjens and Seok{-}Won Lee and Mattia Monga}, title = {Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, {SESS} 2011, Waikiki, Honolulu, HI, USA, May 22, 2011}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=1988630}, isbn = {978-1-4503-0581-5}, }
     BibTeX   URL 
  • David G. Rosado, Lu\'\is Enrique, Jan Jürjens (editors): WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, SciTePress, 2011.
    @proceedings{DBLP:conf/sis/2011, editor = {David G. Rosado and Lu{\'{\i}}s Enrique Sanchez and Jan J{\"{u}}rjens}, title = {{WOSIS} 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with {ICEIS} 2011, Beijing, China, 8-9 June, 2011}, publisher = {SciTePress}, year = {2011}, isbn = {978-989-8425-61-4}, }
     BibTeX 
  • A. Bauer, J. Jürjens, Y. Yu: Run-Time Security Traceability for Evolving Systems. In: The Computer Journal, vol. 54, no. 1, pp. 58-87, 2011.
    @Article{cj11BJY, author = {A.~Bauer and J.~{J}{\"u}{r}jens and Y.~Yu}, title = {Run-Time Security Traceability for Evolving Systems}, journal = {The Computer Journal}, year = {2011}, volume = {54}, pages = {58--87}, number = {1}, DOI = {http://doi.org/10.1093/comjnl/bxq042}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/compjour10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {selectedPub,modelbasedSecurityEngineering,vorsecurestreams, softwareEvolution}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Security and Compliance in Clouds. In: CloudConf 2011, Munich, 2011.
    @Conference{cloudconf11J, author = {J.~{J}{\"u}{r}jens}, title = {Security and Compliance in Clouds}, booktitle = {CloudConf 2011}, year = {2011}, address = {Munich}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/cloudconf11.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/slides/cloudconf11.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, }
     BibTeX   audio   slides 
  • J. Jürjens: Security and Compliance in Clouds. In: CloudDays2011, Stuttgart and Cologne (Germany), 2011.
    @Conference{scc11b, author = {J.~{J}{\"u}{r}jens}, title = {Security and Compliance in Clouds}, booktitle = {CloudDays2011}, year = {2011}, address = {Stuttgart and Cologne (Germany)}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/clouddays11.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/slides/clouddays11.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, URL = {http://www.heise-medien.de/presse/CloudDays-2011-Strategien-unter-der-Lupe-1609909.html}, }
     BibTeX   URL   audio   slides 
  • J. Jürjens: Security and Compliance in Clouds. In: IT-Compliance 2011, Berlin (Germany), 2011. 4th Pan-European Conference.
    @Conference{scc11c, author = {J.~{J}{\"u}{r}jens}, title = {Security and Compliance in Clouds}, booktitle = {IT-Compliance 2011}, year = {2011}, address = {Berlin (Germany)}, note = {4th Pan-European Conference.}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/it-compliance.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, URL = {http://www.marcusevansde.com/itc-2011}, }
     BibTeX   URL   slides 
  • J. Jürjens, B. Nuseibeh: Software Engineering for Secure Systems. In: 33rd International Conference on Software Engineering (ICSE 2011), 2011. Technical Briefing. ACM 2011.
    @InProceedings{icse11JN, author = {J.~{J}{\"u}{r}jens and B.~Nuseibeh}, title = {Software Engineering for Secure Systems}, booktitle = {33rd International Conference on Software Engineering (ICSE 2011)}, year = {2011}, note = {Technical Briefing. ACM 2011.}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/icse11brief_talk.pdf:URL}, keywords = {overviewPub,internationalConferences, secureSoftwareEngineeringGeneral}, }
     BibTeX   slides 
  • S. Taubenberger, J. Jürjens, S. Braun: Studie zu IT-Risikobewertungen in der Praxis. In: D-A-CH Security 2011, Oldenburg, 2011. Gemeinsame Arbeitskonferenz der GI, OCG, BITKOM, SI, TeleTrusT.
    @InProceedings{dachsec11TJ, author = {S.~Taubenberger and J.~{J}{\"u}{r}jens and S.~Braun}, title = {Studie zu IT-Risikobewertungen in der Praxis}, booktitle = {D-A-CH Security 2011}, year = {2011}, address = {Oldenburg}, note = {Gemeinsame Arbeitskonferenz der GI, OCG, BITKOM, SI, TeleTrusT}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/dach11-stefan.pdf:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/slides/dach11-stefan.pdf:URL;audio:http\://rgse.uni-koblenz.de/jj/publications/audio/dach11-stefan.wav:URL}, keywords = {nonEnglish, secureSoftwareEngineeringITSecurityRiskAssessment}, URL = {http://www.syssec.at/dachsecurity2011}, }
     BibTeX   URL   preprint   slides   audio 
  • M. Peschke, M. Hirsch, J. Jürjens, S. Braun: Werkzeuggestützte Identifikation von IT-Sicherheitsrisiken. In: D-A-CH Security 2011, Oldenburg, 2011. Gemeinsame Arbeitskonferenz der GI, OCG, BITKOM, SI, TeleTrusT.
    @InProceedings{dachsec11PHJB, author = {M.~Peschke and M.~Hirsch and J.~{J}{\"u}{r}jens and S.~Braun}, title = {Werkzeuggest{\"u}tzte Identifikation von IT-Sicherheitsrisiken}, booktitle = {D-A-CH Security 2011}, year = {2011}, address = {Oldenburg}, note = {Gemeinsame Arbeitskonferenz der GI, OCG, BITKOM, SI, TeleTrusT}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/dach11-marc.pdf:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/slides/dach11-marc.pdf:URL;audio:http\://rgse.uni-koblenz.de/jj/publications/audio/dach11-marc.wav:URL}, keywords = {nonEnglish, secureSoftwareEngineeringITSecurityRiskAssessment}, URL = {http://www.syssec.at/dachsecurity2011}, }
     BibTeX   URL   preprint   slides   audio 
  • J. Jürjens, M. Hirsch, J.-C. Küster: Security and Compliance in Clouds: Pattern-Based Compliance and Security Requirements Engineering. In: iqnite 2011, Düsseldorf, 2011.
    @Conference{iqnite11, author = {J.~{J}{\"u}{r}jens and M.~Hirsch and J.-C.~K{\"u}ster}, title = {Security and Compliance in Clouds: Pattern-Based Compliance and Security Requirements Engineering}, booktitle = {iqnite 2011}, year = {2011}, address = {D{\"u}sseldorf}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/Vortrag-iqnite.pdf:URL}, keywords = {industrialConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, URL = {http://www.iqnite-conferences.com/de}, }
     BibTeX   URL   slides 

2010


  • J. Jürjens, K. Beckers: Security and Compliance in Clouds. In: Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider (editors): ISSE 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010, Vieweg+Teubner, Munich (Germany), pp. 91-100, 2010.
    @Conference{scc11d, author = {J.~{J}{\"u}{r}jens and K. Beckers}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Security and Compliance in Clouds}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {91--100}, publisher = {Vieweg+Teubner}, year = {2010}, address = {Munich (Germany)}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/oop11.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/slides/oop11.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, URL = {http://www.sigs-datacom.de/oop2011/oop2011-eng/conference.html}, }
     BibTeX   URL   audio   slides 
  • J. Jürjens: Security und Compliance in Clouds. In: 5. COMPARC Fokustag, Fraunhofer ISST, 20 May 2010, Dortmund, Germany, Fraunhofer ISST, Dortmund, 2010.
    @InProceedings{comparc10bJ, author = {J.~{J}{\"{u}}{r}jens}, title = {Security und Compliance in Clouds}, booktitle ={5.\ COMPARC Fokustag, Fraunhofer ISST, 20 May 2010, Dortmund, Germany}, year = {2010}, organization = {Fraunhofer ISST, Dortmund}, }
     BibTeX 
  • J. Jürjens: Modell-basierte Analyse von Geschäftsprozessen und Architekturen. In: 4. COMPARC Fokustag, Fraunhofer ISST, 20 Jan. 2010, Dortmund, Germany, Fraunhofer ISST, Dortmund, 2010.
    @InProceedings{comparc10aJ, author = {J.~{J}{\"{u}}{r}jens}, title = {Modell-basierte Analyse von Gesch\"aftsprozessen und Architekturen}, booktitle ={4.\ COMPARC Fokustag, Fraunhofer ISST, 20 Jan. 2010, Dortmund, Germany}, year = {2010}, organization = {Fraunhofer ISST, Dortmund}, }
     BibTeX 
  • A. Pironti, J. Jürjens: Formally-Based Black-Box Monitoring of Security Protocols. In: International Symposium on Engineering Secure Software and Systems (ESSOS 2010), Springer Verlag, Lecture Notes in Computer Science, vol. 5965, pp. 79-95, 2010.
    @InProceedings{fbbbmsp10, author = {A.~Pironti and J.~{J}{\"u}{r}jens}, title = {Formally-Based Black-Box Monitoring of Security Protocols}, booktitle = {International Symposium on Engineering Secure Software and Systems (ESSOS 2010)}, year = {2010}, series = {Lecture Notes in Computer Science}, pages = {79--95}, volume = {5965}, publisher = {Springer Verlag}, crossref = {DBLP:conf/essos/2010}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/paper_4.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-11747-3_7:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityMonitoring,vorsecurestreams}, }
     BibTeX   preprint   dblp   SpringerLink 
  • Seok-Won Lee, Mattia Monga, Jan Jürjens: The 6\(^\mboxth\) International Workshop on Software Engineering for Secure Systems (SESS'10). In: Jeff Kramer, Judith Bishop, Premkumar T. Devanbu, Sebastián Uchitel (editors): Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, ICSE 2010, Cape Town, South Africa, 1-8 May 2010, ACM, pp. 433-434, 2010.
    @inproceedings{DBLP:conf/icse/LeeMJ10, author = {Seok{-}Won Lee and Mattia Monga and Jan J{\"{u}}rjens}, editor = {Jeff Kramer and Judith Bishop and Premkumar T. Devanbu and Sebasti{\'{a}}n Uchitel}, title = {The 6\({}^{\mbox{th}}\) International Workshop on Software Engineering for Secure Systems (SESS'10)}, booktitle = {Proceedings of the 32nd {ACM/IEEE} International Conference on Software Engineering - Volume 2, {ICSE} 2010, Cape Town, South Africa, 1-8 May 2010}, pages = {433--434}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1810295.1810415}, doi = {10.1145/1810295.1810415}, }
     BibTeX   DOI 
  • L. Montrieux, J. Jürjens, C. B. Haley, Yijun Yu, P.-Y. Schobbens, H. Toussaint: Tool Support for Code Generation from a UMLsec Property. In: 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
    @InProceedings{tscg10, author = {L.~Montrieux and J.~{J}{\"u}{r}jens and C. B.~Haley and Yijun Yu and P.-Y.~Schobbens and H.~Toussaint}, title = {Tool Support for Code Generation from a {UMLsec} Property}, booktitle = {25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10)}, year = {2010}, DOI = {http://doi.acm.org/10.1145/1858996.1859074}, file = {preprint:http://oro.open.ac.uk/22231/1:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • C. Blanco, E. Fernandez-Medina, J. Trujillo, J. Jürjens: Towards the Secure Modelling of OLAP Users Behaviour. In: 7th Workshop on Secure Data Management (SDM @ VLDB 2010), Springer Verlag, Lecture Notes in Computer Science, vol. 6358, pp. 101-112, 2010.
    @InProceedings{tsmoub10, author = {C.~Blanco and E.~Fernandez-Medina and J.~Trujillo and J.~{J}{\"u}{r}jens}, title = {Towards the Secure Modelling of OLAP Users Behaviour}, booktitle = {7th Workshop on Secure Data Management (SDM @ VLDB 2010)}, year = {2010}, series = {Lecture Notes in Computer Science}, pages = {101--112}, volume = {6358}, publisher = {Springer Verlag}, crossref = {DBLP:conf/sdmw/2010}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/sdm10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-15546-8_8:URL}, keywords = {workshop,internationalConferences, secureSoftwareEngineeringSecureInformationSystems}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens: Model-based Security Engineering with UML: The last decade and towards the future (Keynote). In: 26th IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010), pp. 4, 2010.
    @InProceedings{vlhcc10, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering with {UML}: The last decade and towards the future (Keynote)}, booktitle = {26th IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010)}, year = {2010}, pages = {4}, DOI = {http://doi.org/10.1109/VLHCC.2010.10}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/slides/vlhcc10talk.pdf:URL;audio:http\://rgse.uni-koblenz.de/jj/publications/audio/vlhcc10rec.wav:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/vlhcc10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {overviewPub,conferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   slides   audio   preprint   dblp 
  • Seok-Won Lee, Mattia Monga, Jan Jürjens (editors): ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa, ACM, 2010.
    @proceedings{DBLP:conf/icse/2010sess, editor = {Seok{-}Won Lee and Mattia Monga and Jan J{\"{u}}rjens}, title = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS} 2010, May 2, 2010, Cape Town, South Africa}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1809100}, isbn = {978-1-60558-965-7}, }
     BibTeX   URL 
  • M. S. Sadi, D. G. Myers, C. O. Sanchez, J. Jürjens: Component criticality analysis to minimize soft errors risk. In: International Journal of Computer Systems Science & Engineering, vol. 25, no. 5, pp. 23-37, 2010.
    @Article{ijcsse10SMSJ, author = {M. S.~Sadi and D. G.~Myers and C. O.~Sanchez and J.~{J}{\"u}{r}jens}, title = {Component criticality analysis to minimize soft errors risk}, journal = {International Journal of Computer Systems Science \& Engineering}, year = {2010}, volume = {25}, number = {5}, pages = {23--37}, file = {preprint:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/ijcsse10SMSJ.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {dependability, dependableSystems}, }
     BibTeX   preprint   dblp 
  • K. Beckers, M. Hirsch, J. Jürjens: Compliance in Clouds: A cloud computing security perspective. In: GI SECMGT-Workshop, Frankfurt (Germany), 2010.
    @InProceedings{cicaccsp10, author = {K.~Beckers and M.~Hirsch and J.~{J}{\"u}{r}jens}, title = {Compliance in Clouds: A cloud computing security perspective}, booktitle = {GI SECMGT-Workshop}, year = {2010}, address = {Frankfurt (Germany)}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/slides/Comparc_Compliance%20in%20Clouds_eng.pdf:URL}, keywords = {workshop, industrialConferences,secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, }
     BibTeX   slides 
  • M. Aizatulin, A. D. Gordon, J. Jürjens: Cryptographic Security Verification for C by Symbolic Execution. In: Computer Security Foundations Symposium (CSF), 2010. 5-minute presentation.
    @InProceedings{csvc10, author = {M.~Aizatulin and A. D.~Gordon and J.~{J}{\"u}{r}jens}, title = {Cryptographic Security Verification for C by Symbolic Execution}, booktitle = {Computer Security Foundations Symposium (CSF)}, year = {2010}, note = {5-minute presentation}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/csf10.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   preprint 
  • H. Mouratidis, J. Jürjens: From Goal-Driven Security Requirements Engineering to Secure Design. In: International Journal of Intelligent Systems (IJIS) (Wiley Interscience), International Journal of Intelligent Systems, vol. 25, no. 8, pp. 813-840, 2010. Special issue on "Goal-Driven Requirements Engineering".
    @InProceedings{fgdsresd10, author = {H.~Mouratidis and J.~{J}{\"u}{r}jens}, title = {From Goal-Driven Security Requirements Engineering to Secure Design}, booktitle = {International Journal of Intelligent Systems (IJIS) (Wiley Interscience)}, year = {2010}, volume = {25}, number = {8}, series = {International Journal of Intelligent Systems}, pages = {813--840}, note = {Special issue on {"}Goal-Driven Requirements Engineering{"}}, DOI = {http://doi.org/10.1002/int.20432}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ijis10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • S. H. Houmb, S. Islam, E. Knauss, J. Jürjens, K. Schneider: Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec. In: Requirements Engineering Journal (REJ), Springer-Verlag, vol. 15, no. 1, pp. 63-93, 2010. Special issue on Security Requirements Engineering.
    @Article{rej10HIKJS, author = {S. H.~Houmb and S.~Islam and E.~Knauss and J.~{J}{\"u}{r}jens and K.~Schneider}, title = {Eliciting Security Requirements and Tracing them to Design: An Integration of {Common Criteria, Heuristics, and UMLsec}}, journal = {Requirements Engineering Journal (REJ), Springer-Verlag}, year = {2010}, volume = {15}, pages = {63--93}, number = {1}, note = {Special issue on Security Requirements Engineering}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/JRE_SR_Elicitation.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s00766-009-0093-9:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 
  • S. Höhn, J. Jürjens, L. Lowis, R. Accorsi: Identification of Vulnerabilities in Web Services using Model-based Security. In: C. Gutierrez, E. Fernandez-Medina, M. Piattini: (editors): IGI Global Web Services Security Development and Architecture: Theoretical and Practical Issues, 2010. Print ISBN-13: 978-1-60566-950-2.
    @InCollection{ivwsmbs10, author = {S.~H{\"o}hn and J.~{J}{\"u}{r}jens and L.~Lowis and R.~Accorsi}, title = {Identification of Vulnerabilities in Web Services using Model-based Security}, booktitle = {Web Services Security Development and Architecture: Theoretical and Practical Issues}, year = {2010}, editor = {C. Gutierrez and E. Fernandez-Medina and M. Piattini:}, publisher = {IGI Global}, note = {Print ISBN-13: 978-1-60566-950-2}, keywords = {invitedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Outsourcing, SaaS & Clouds: Aber sicher ! (... und compliant). In: Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2010), Wuppertal (Germany), 2010.
    @InProceedings{iuknrw10j, author = {J.~{J}{\"u}{r}jens}, title = {{Outsourcing, SaaS \& Clouds: Aber sicher ! (... und compliant)}}, booktitle = {Tag der Informations- und Kommunikationswirtschaft Nordrhein-Westfalen (IuK-Tag NRW 2010)}, year = {2010}, address = {Wuppertal (Germany)}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/slides/iuk10.pdf:URL}, keywords = {nonEnglish, secureSoftwareEngineeringSecureService/CloudBasedSystems}, URL = {http://iuk-tag-nrw.de/}, }
     BibTeX   URL   slides 
  • A. Bauer, J. Jürjens: Runtime Verification of Cryptographic Protocols. In: Computers and Security, Computers and Security, vol. 29, no. 3, pp. 315-330, 2010.
    @InProceedings{cs10BJ, author = {A.~Bauer and J.~{J}{\"u}{r}jens}, title = {Runtime Verification of Cryptographic Protocols}, booktitle = {Computers and Security}, year = {2010}, volume = {29}, number = {3}, series = {Computers and Security}, pages = {315--330}, DOI = {10.1016/j.cose.2009.09.003}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/comsec10.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   preprint   dblp 
  • K. Beckers, J. Jürjens: Security and Compliance in Clouds. In: Information Security Solutions Europe (ISSE 2010), Berlin (Germany), 2010.
    @InProceedings{scc10, author = {K.~Beckers and J.~{J}{\"u}{r}jens}, title = {Security and Compliance in Clouds}, booktitle = {Information Security Solutions Europe (ISSE 2010)}, year = {2010}, address = {Berlin (Germany)}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/slides/isse10talk_nobackup.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/isse10.pdf:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-8348-9788-6_9:URL}, keywords = {industrialConferences, workshop, secureSoftwareEngineeringSecureService/CloudBasedSystems, secureSoftwareEngineeringCompliance}, URL = {http://www.isse.eu.com/}, }
     BibTeX   URL   slides   preprint   SpringerLink 
  • A. Nhlabatsi, A. Bandara, Shinpei Hayashi, C. B. Haley, J. Jürjens, Haruhiko Kaiya, Atsuto Kubo, R. Laney, H. Mouratidis, B. Nuseibeh, Yasuyuki Tahara, T. T. Tun, Hironori Washizaki, Nobukazu Yoshioka, Yijun Yu: Security Patterns: Comparing Modeling Approaches. In: H. Mouratidis (editors): IGI Global Software Engineering for Secure Systems: Industrial and Research Perspectives, 2010
    @InCollection{spcma10, author = {A.~Nhlabatsi and A.~Bandara and Shinpei Hayashi and C. B.~Haley and J.~{J}{\"u}{r}jens and Haruhiko Kaiya and Atsuto Kubo and R. Laney and H.~Mouratidis and B.~Nuseibeh and Yasuyuki Tahara and T. T.~Tun and Hironori Washizaki and Nobukazu Yoshioka and Yijun Yu}, title = {Security Patterns: Comparing Modeling Approaches}, booktitle = {Software Engineering for Secure Systems: Industrial and Research Perspectives}, year = {2010}, editor = {H. Mouratidis}, publisher = {IGI Global}, file = {preprint:https://books.google.de/books?id=RBTK7QfYquoC&pg=PA75&lpg=PA75&dq=%22Security+Patterns:+Comparing+Modeling+Approaches%22&source=bl&ots=ZhKGFa2fab&sig=maktkbR5rb0nVDmDjtx0KepP004&hl=de&sa=X&ei=6Ve5VN_3NYbqUoeIgig&ved=0CEsQ6AEwBA#v=onepage&q=%22Security%20Patterns%3A%20Comparing%20Modeling%20Approaches%22&f=false:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   preprint 
  • E. B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki, J. Jürjens, M. VanHilst, G. Pernul: Using security patterns to develop secure systems. In: H. Mouratidis (editors): IGI Global Software Engineering for Secure Systems: Industrial and Research Perspectives, 2010
    @InCollection{uspdss10, author = {E. B.~Fernandez and Nobukazu Yoshioka and Hironori Washizaki and J.~{J}{\"u}{r}jens and M.~VanHilst and G.~Pernul}, title = {Using security patterns to develop secure systems}, booktitle = {Software Engineering for Secure Systems: Industrial and Research Perspectives}, year = {2010}, editor = {H. Mouratidis}, publisher = {IGI Global}, file = {preprint:http\://epub.uni-regensburg.de/18787/1/Mouratidis2010Ch2.pdf:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   preprint 
  • F. Dupressoir, A. D. Gordon, J. Jürjens: Verifying authentication properties of C security protocol code using general verifiers. In: Fourth International Workshop on Analysis of Security APIs,, 2010.
    @InProceedings{vapc10, author = {F.~Dupressoir and A. D.~Gordon and J.~{J}{\"u}{r}jens}, title = {Verifying authentication properties of C security protocol code using general verifiers}, booktitle = {Fourth International Workshop on Analysis of Security APIs,}, year = {2010}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/asa4.pdf:URL;slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/5-dupressoir.pdf:URL}, keywords = {industrialConferences, workshop, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   preprint   slides 

2009


  • J. Jürjens: A domain-specific language for cryptographic protocols based on streams. In: Journal of Logic and Algebraic Programming, vol. 78, no. 2, pp. 54-73, 2009.
    @Article{jlap09J, author = {J.~{J}{\"u}{r}jens}, title = {A domain-specific language for cryptographic protocols based on streams}, journal = {Journal of Logic and Algebraic Programming}, year = {2009}, volume = {78}, pages = {54--73}, number = {2}, DOI = {http://doi.org/10.1016/j.jlap.2008.08.006}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/jlap07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • M. Woodside, D. C. Petriu, D. B. Petriu, J. Xu, T. Israr, G. Georg, R. France, J. M. Bieman, S. H. Houmb, Jan Jürjens: Performance Analysis of Security Aspects by Weaving Scenarios from UML Models. In: Journal of Systems and Software, vol. 82, no. 1, pp. 56-74, 2009.
    @Article{WPP+09, author = {M.~Woodside and D. C.~Petriu and D. B.~Petriu and J.~Xu and T.~Israr and G.~Georg and R.~France and J. M.~Bieman and S. H.~Houmb and Jan {J}{\"u}{r}jens}, title = {Performance Analysis of Security Aspects by Weaving Scenarios from {UML} Models}, journal = {Journal of Systems and Software}, year = {2009}, volume = {82}, pages = {56--74}, number = {1}, DOI = {10.1016/j.jss.2008.03.067}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/JSS-WOSP07-accepted.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {modelbasedSecurityEngineering, securityPerformance}, }
     BibTeX   DOI   preprint   dblp 
  • H. Mouratidis, A. Sunyaev, J. Jürjens: Secure Information Systems Engineering: Experiences and Lessons Learned from two Health Care Projects. In: Computer Aided Information Systems Engineering (CAiSE 2009), Springer, Lecture Notes in Computer Science, vol. 5565, pp. 231-245, 2009.
    @InProceedings{sise09, author = {H.~Mouratidis and A.~Sunyaev and J.~{J}{\"u}{r}jens}, title = {Secure Information Systems Engineering: Experiences and Lessons Learned from two Health Care Projects}, booktitle = {Computer Aided Information Systems Engineering (CAiSE 2009)}, year = {2009}, pages = {231--245}, volume = {5565}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/caise09.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-02144-2_21:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Lloyd, J. Jürjens: Security Analysis of a Biometric Authentication System using UMLsec and JML. In: Model Driven Engineering Languages and Systems, 12th International Conference, MODELS 2009, Denver, CO, USA, October 4-9, 2009. Proceedings, Springer, Lecture Notes in Computer Science, vol. 5795, pp. 77-91, 2009.
    @InProceedings{sabas09, author = {J.~Lloyd and J.~{J}{\"u}{r}jens}, title = {Security Analysis of a Biometric Authentication System using {UMLsec} and {JML}}, booktitle = {Model Driven Engineering Languages and Systems, 12th International Conference, {MODELS} 2009, Denver, CO, USA, October 4-9, 2009. Proceedings}, year = {2009}, volume = {5795}, series = {Lecture Notes in Computer Science}, pages = {77--91}, publisher = {Springer}, crossref = {DBLP:conf/models/2009}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/models09.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-04425-0_7:URL}, keywords = {internationalConferences, secureSoftwareEngineeringIndustrialApplications}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_9}, doi = {10.1007/978-3-8348-9788-6\_9}, }
     BibTeX   DOI   preprint   dblp   SpringerLink 
  • Hironori Washizaki, Nobukazu Yoshioka, Eduardo B., Jan Jürjens: Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). In: Shail Arora, Gary T. Leavens (editors): Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009, October 25-29, 2009, Orlando, Florida, USA, ACM, pp. 713-714, 2009.
    @inproceedings{DBLP:conf/oopsla/WashizakiYFJ09, author = {Hironori Washizaki and Nobukazu Yoshioka and Eduardo B. Fern{\'{a}}ndez and Jan J{\"{u}}rjens}, editor = {Shail Arora and Gary T. Leavens}, title = {Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09)}, booktitle = {Companion to the 24th Annual {ACM} {SIGPLAN} Conference on Object-Oriented Programming, Systems, Languages, and Applications, {OOPSLA} 2009, October 25-29, 2009, Orlando, Florida, {USA}}, pages = {713--714}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1639950.1639978}, doi = {10.1145/1639950.1639978}, }
     BibTeX   DOI 
  • D. Ratiu, R. Marinescu, J. Jürjens: The Logical Modularity of Programs. In: Working Conference for Reverse Engineering (WCRE 2009), pp. 123-127, 2009.
    @InProceedings{lmp09, author = {D.~Ratiu and R.~Marinescu and J.~{J}{\"u}{r}jens}, title = {The Logical Modularity of Programs}, booktitle = {Working Conference for Reverse Engineering (WCRE 2009)}, year = {2009}, pages = {123--127}, crossref = {DBLP:conf/wcre/2009}, DOI = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.29}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/wcre09.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, programComprehension}, url = {https://doi.org/10.1007/978-3-642-04425-0\_7}, doi = {10.1007/978-3-642-04425-0\_7}, }
     BibTeX   DOI   preprint   dblp 
  • M.S. Sadi, D.G. Myers, C. Ortega, J. Jürjens: A Model-Based Soft Errors Risks Minimization Approach. In: 4th IEEE International Conference on, Embedded and Multimedia Computing (EM-Com 2009), IEEE, 2009.
    @InProceedings{emcon09SMOJ, author = {M.S.~Sadi and D.G.~Myers and C.~Ortega and J.~J\"urjens}, title = {A Model-Based Soft Errors Risks Minimization Approach}, booktitle ={4th IEEE International Conference on, Embedded and Multimedia Computing (EM-Com 2009)}, year = {2009}, organization = {IEEE}, }
     BibTeX 
  • J. Jürjens: Security and Dependability Engineering. In: Springer Lecture Notes in Computer Science pp. 21-36 Security and dependability for Ambient Intelligence, 2009. Invited chapter.
    @InCollection{sde09, author = {J.~{J}{\"u}{r}jens}, title = {Security and Dependability Engineering}, booktitle = {Security and dependability for Ambient Intelligence}, year = {2009}, number = {3655}, series = {Lecture Notes in Computer Science}, pages = {21--36}, publisher = {Springer}, note = {Invited chapter}, crossref = {DBLP:series/ais/45}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/jurjens2.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-0-387-88775-3_2:URL}, keywords = {invitedBookChapters, dependableSystems}, }
     BibTeX   preprint   dblp   SpringerLink 
  • M. S. Sadi, D. G. Myers, C. Ortega, J. Jürjens: A Novel Approach to Minimizing the Risks of Soft Errors in Mobile and Ubiquitous Systems. In: IEEE TENCON, Institute of Electrical and Electronics Engineers, 2009.
    @InProceedings{anamr09, author = {M. S.~Sadi and D. G.~Myers and C.~Ortega and J.~{J}{\"u}{r}jens}, title = {A Novel Approach to Minimizing the Risks of Soft Errors in Mobile and Ubiquitous Systems}, booktitle = {IEEE TENCON}, year = {2009}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {http://doi.org/10.1109/TENCON.2009.5395903}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/tencon09.pdf:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   preprint 
  • J. Jürjens, T. Weber: Finite Models in FOL-based Crypto-Protocol Verification. In: ARSPA-WITS 2009, Springer Verlag, Lecture Notes in Computer Science, vol. 5511, pp. 155-172, 2009.
    @InProceedings{fmfol09, author = {J.~{J}{\"u}{r}jens and T.~Weber}, title = {Finite Models in FOL-based Crypto-Protocol Verification}, booktitle = {ARSPA-WITS 2009}, year = {2009}, series = {Lecture Notes in Computer Science}, pages = {155--172}, volume = {5511}, publisher = {Springer Verlag}, crossref = {DBLP:conf/ifip1-7/2009wits}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/wits09.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-642-03459-6_11:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens: Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project. In: Electr. Notes Theor. Comput. Sci., vol. 250, no. 1, pp. 123-136, 2009.
    @Article{DBLP:journals/entcs/Jurjens09, author = {J.~{J}{\"u}{r}jens}, title = {Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project}, journal = {Electr. Notes Theor. Comput. Sci.}, year = {2009}, volume = {250}, pages = {123--136}, number = {1}, bibsource = {DBLP, http://dblp.uni-trier.de}, booktitle = {Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems (AVOCS 2007)}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {http://doi.org/10.1016/j.entcs.2009.08.009}, keywords = {electronicJournals, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   dblp 
  • J. Jürjens, Eduardo Fernandez: Secure Database Development. In: Ling Liu, M. Tamer (editors): Springer pp. 2528-2534 Encyclopedia of Database Systems, 2009. Invited chapter, ISBN 978-0-387-35544-3.
    @InCollection{sdd09, author = {J.~{J}{\"u}{r}jens and Eduardo Fernandez}, title = {Secure Database Development}, booktitle = {Encyclopedia of Database Systems}, year = {2009}, editor = {Ling Liu and M. Tamer {\"O}zsu}, pages = {2528--2534}, publisher = {Springer}, note = {Invited chapter, ISBN 978-0-387-35544-3}, crossref = {DBLP:reference/db/2009}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/dbsec08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/referenceworkentry/10.1007/978-0-387-39940-9_329:URL}, keywords = {invitedBookChapters, databaseSecurity}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens: Model-based Security Engineering for Evolving Systems. In: Workshop on Security in Model Driven Architecture (SEC-MDA`09), Fifth European Conference on Model Driven Architecture Foundations and Applications (ECMDA 2009), University of Twente, 2009.
    @InProceedings{mbsees, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering for Evolving Systems}, booktitle = {Workshop on Security in Model Driven Architecture (SEC-MDA`09), Fifth European Conference on Model Driven Architecture Foundations and Applications (ECMDA 2009)}, year = {2009}, address = {University of Twente}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/mdasec09.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering, softwareEvolution}, }
     BibTeX   slides 
  • J. Jürjens: Model-based Security Engineering with UMLsec. In: Serenity Day: Establishing IT Security as a full engineering discipline, Brussels, 2009.
    @InProceedings{mbseumlsec09, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering with {UMLsec}}, booktitle = {Serenity Day: Establishing IT Security as a full engineering discipline}, year = {2009}, address = {Brussels}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX 
  • J. Jürjens: Model-based Security Testing Supporting Evolution. In: 14th Software & Systems Quality Conferences (SQC'09), Congress Center Düsseldorf (Germany), 2009.
    @InProceedings{mbstse09, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Testing Supporting Evolution}, booktitle = {14th Software \& Systems Quality Conferences (SQC'09)}, year = {2009}, address = {Congress Center D{\"u}sseldorf (Germany)}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/sqc09.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sqc09.pdf:URL}, keywords = {workshop, industrialConferences, softwareEvolution, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX   audio   slides 
  • J. Jürjens: Formal Foundations for Verifying Security-Critical Software. In: 12th European Joint Conferences on Theory and Practice of Software (ETAPS 2009), 2009. Tutorial.
    @InProceedings{ffvscs09, author = {J.~{J}{\"u}{r}jens}, title = {Formal Foundations for Verifying Security-Critical Software}, booktitle = {12th European Joint Conferences on Theory and Practice of Software (ETAPS 2009)}, year = {2009}, note = {Tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • Eduardo Fernández-Medina, Jan Jürjens, Juan Trujillo, Sushil Jajodia: Model-Driven Development for secure information systems. In: Information & Software Technology, vol. 51, no. 5, pp. 809-814, 2009.
    @Article{ist09FJTJ, author = {Eduardo Fern{\'{a}}ndez{-}Medina and Jan J{\"{u}}rjens and Juan Trujillo and Sushil Jajodia}, title = {Model-Driven Development for secure information systems}, journal = {Information {\&} Software Technology}, volume = {51}, number = {5}, pages = {809--814}, year = {2009}, keywords = {specialIssuesOfJournals, secureSoftwareEngineeringGeneral}, }
     BibTeX 

2008


  • Yijun Yu, J. Jürjens, J. Mylopoulos: Traceability for the Maintenance of Secure Software. In: 24th International Conference on Software Maintenance (ICSM), pp. 297-306, IEEE, 2008.
    @InProceedings{icsm08YJM, author = {Yijun Yu and J.~{J}{\"u}{r}jens and J.~Mylopoulos}, title = {Traceability for the Maintenance of Secure Software}, booktitle = {24th International Conference on Software Maintenance (ICSM)}, year = {2008}, pages = {297--306}, organization = {IEEE}, DOI = {http://doi.org/10.1109/ICSM.2008.4658078}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsm08.pdf:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/yu08icsm-v4.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, softwareEvolution}, }
     BibTeX   DOI   preprint   slides   dblp 
  • D. Ratiu, M. Feilkas, J. Jürjens: Extracting Domain Ontologies from Domain Specific APIs. In: 12th European Conference on Software Maintenance and Reengineering (CSMR 08), pp. 203-212, IEEE, 2008.
    @InProceedings{csmr08RFJ, author = {D.~Ratiu and M.~Feilkas and J.~{J}{\"u}{r}jens}, title = {Extracting Domain Ontologies from Domain Specific APIs}, booktitle = {12th European Conference on Software Maintenance and Reengineering (CSMR 08)}, year = {2008}, pages = {203--212}, organization = {IEEE}, DOI = {http://doi.org/10.1109/CSMR.2008.4493315}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ExtractingDomainOntologiesFromAPIs.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/csmr075-ratiu.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, programComprehension}, }
     BibTeX   DOI   slides   preprint   dblp 
  • D. Ratiu, J. Jürjens: Evaluating the Reference and Representation of Domain Concepts in APIs. In: 16th IEEE International Conference on Program Comprehension (ICPC 2008), pp. 242-247, Institute of Electrical and Electronics Engineers, 2008.
    @InProceedings{errdc08, author = {D.~Ratiu and J.~{J}{\"u}{r}jens}, title = {Evaluating the Reference and Representation of Domain Concepts in APIs}, booktitle = {16th IEEE International Conference on Program Comprehension (ICPC 2008)}, year = {2008}, pages = {242--247}, organization = {Institute of Electrical and Electronics Engineers}, crossref = {DBLP:conf/iwpc/2008}, DOI = {http://doi.org/10.1109/ICPC.2008.11}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ReferenceAndRepresentationOfCOnceptsInAPIs.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ratiud_concepts_in_apis.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, programComprehension}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens, J. Schreck, Yijun Yu: Automated Analysis of Permission-Based Security using UMLsec. In: Fundamental Approaches to Software Engineering (FASE), Springer Verlag, Lecture Notes in Computer Science, vol. 4961, pp. 292-295, 2008.
    @InProceedings{fase08JS, author = {J.~{J}{\"u}{r}jens and J.~Schreck and Yijun Yu}, title = {Automated Analysis of Permission-Based Security using {UMLsec}}, booktitle = {Fundamental Approaches to Software Engineering (FASE)}, year = {2008}, series = {Lecture Notes in Computer Science}, pages = {292--295}, volume = {4961}, publisher = {Springer Verlag}, crossref = {DBLP:conf/fase/2008}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fase08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fase08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-78743-3_21:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   slides   preprint   dblp   SpringerLink 
  • S. Höhn, J. Jürjens: Rubacon: Automated Support for Model-based Compliance Engineering. In: International Conference on Software Engineering (ICSE), pp. 875-878, ACM, 2008.
    @InProceedings{icse08HJ, author = {S.~H{\"o}hn and J.~{J}{\"u}{r}jens}, title = {Rubacon: Automated Support for Model-based Compliance Engineering}, booktitle = {International Conference on Software Engineering (ICSE)}, year = {2008}, pages = {875--878}, organization = {ACM}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse08tooltalk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsede57-hohn.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis, secureSoftwareEngineeringCompliance}, }
     BibTeX   slides   preprint   dblp 
  • E. B. Fernandez, J. Jürjens, N. Yoshioka, H. Washizaki: Incorporating database systems into a secure software development methodology. In: 2nd Int. Workshop on Secure systems methodologies using patterns (SPattern 2008), pp. 310-314, 2008.
    @InProceedings{ids08, author = {E. B.~Fernandez and J.~{J}{\"u}{r}jens and N.~Yoshioka and H.~Washizaki}, title = {Incorporating database systems into a secure software development methodology}, booktitle = {2nd Int. Workshop on Secure systems methodologies using patterns (SPattern 2008)}, year = {2008}, pages = {310--314}, crossref = {DBLP:conf/dexaw/2008}, DOI = {http://doi.ieeecomputersociety.org/10.1109/DEXA.2008.100}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/spattern08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {workshop, industrialConferences, databaseSecurity}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Countering the Malicious Programmer. In: Invited participation and presentation at the Dagstuhl seminar on ``Countering the Insider Threat'' from July 20 to July 25, 2008, , 2008.
    @InProceedings{dagstuhl08J, author = {J.~{J}{\"{u}}{r}jens}, title = {Countering the Malicious Programmer}, booktitle ={Invited participation and presentation at the Dagstuhl seminar on ``Countering the Insider Threat'' from July 20 to July 25, 2008}, year = {2008}, organization = {}, }
     BibTeX 
  • J. Jürjens, D. Trachtenherz, D. Reiss: Model-based Quality Assurance of Automotive Software. In: ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems (Models 2008), pp. 858-873, ACM/Institute of Electrical and Electronics Engineers, 2008.
    @InProceedings{mbqaas08, author = {J.~{J}{\"u}{r}jens and D.~Trachtenherz and D.~Reiss}, title = {Model-based Quality Assurance of Automotive Software}, booktitle = {ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems (Models 2008)}, year = {2008}, volume = {5301}, pages = {858--873}, organization = {ACM/Institute of Electrical and Electronics Engineers}, crossref = {DBLP:conf/models/2008}, file = {experimental data:http\://rgse.uni-koblenz.de/jj/publications/experiments/autoqa:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/models08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/models08d.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-87875-9_59:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   experimental data   slides   preprint   dblp   SpringerLink 
  • J. Jürjens: Model-based Run-time Checking of Security Permissions using Guarded Objects. In: Runtime-Verification 2008 (RV`08 @ ETAPS 2008), Springer Verlag, Lecture Notes in Computer Science, vol. 5289, pp. 36-50, 2008.
    @InProceedings{mbrtc08, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Run-time Checking of Security Permissions using Guarded Objects}, booktitle = {Runtime-Verification 2008 (RV`08 @ ETAPS 2008)}, year = {2008}, volume = {5289}, series = {Lecture Notes in Computer Science}, pages = {36--50}, publisher = {Springer Verlag}, crossref = {DBLP:conf/rv/2008}, DOI = {http://doi.org/10.1007/978-3-540-89247-2_3}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/rv08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/rv08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-89247-2_3:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityMonitoring}, }
     BibTeX   DOI   slides   preprint   dblp   SpringerLink 
  • J. Jürjens, J. Schreck, P. Bartmann: Model-based Security Analysis for Mobile Communications. In: 30th Intern. Conference on Software Engineering (ICSE 2008), pp. 683-692, ACM, 2008.
    @InProceedings{mbsamc08, author = {J.~{J}{\"u}{r}jens and J.~Schreck and P.~Bartmann}, title = {Model-based Security Analysis for Mobile Communications}, booktitle = {30th Intern.\ Conference on Software Engineering (ICSE 2008)}, year = {2008}, pages = {683--692}, organization = {ACM}, crossref = {DBLP:conf/icse/2008}, DOI = {http://doi.org/10.1145/1368088.1368186}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse08teletalk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsetele08-jurjens.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   slides   preprint   dblp 
  • A. Bauer, J. Jürjens: Security protocols, properties, and their monitoring. In: The 4th International Workshop on Software Engineering for Secure Systems (SESS'08 @ ICSE 2008), pp. 33-40, 2008.
    @InProceedings{sppm08, author = {A.~Bauer and J.~{J}{\"u}{r}jens}, title = {Security protocols, properties, and their monitoring}, booktitle = {The 4th International Workshop on Software Engineering for Secure Systems (SESS'08 @ ICSE 2008)}, year = {2008}, pages = {33--40}, crossref = {DBLP:conf/icse/2008sess}, DOI = {http://doi.acm.org/10.1145/1370905.1370910}, file = {photo:http\://picasaweb.google.com/lh/photo/ZisnJn8FQ6JYkqwiHs5svA:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sess08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/sess007-bauer.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringSecurityMonitoring}, }
     BibTeX   DOI   photo   slides   preprint   dblp 
  • J. Jürjens, Yijun Yu, A. Bauer: Tools for Traceable Security Verification. In: BCS Visions of Computer Science Conference, pp. 367-390, 2008.
    @InProceedings{ttsc08, author = {J.~{J}{\"u}{r}jens and Yijun Yu and A.~Bauer}, title = {Tools for Traceable Security Verification}, booktitle = {BCS Visions of Computer Science Conference}, year = {2008}, pages = {367--390}, crossref = {DBLP:conf/bcs/2008}, DOI = {http://www.bcs.org/server.php?show=ConWebDoc.22980}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/bcs08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/bcs08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • Yijun Yu, J. Jürjens, J. Schreck: Tools for Traceability in Secure Software Development. In: 23nd International Conference on Automated Software Engineering (ASE 2008), 2008.
    @InProceedings{ttssd08, author = {Yijun Yu and J.~{J}{\"u}{r}jens and J.~Schreck}, title = {Tools for Traceability in Secure Software Development}, booktitle = {23nd International Conference on Automated Software Engineering (ASE 2008)}, year = {2008}, crossref = {DBLP:conf/kbse/2008}, DOI = {http://doi.org/10.1109/ASE.2008.92}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ase08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • M. Giddings, J. Jürjens, P. M. Allen: Challenges for the model based development of distributed real time systems. In: 1st Int. Workshop on Non-functional System Properties in Domain Specific Modeling Languages (NFPinDSML @ MoDELS 2008), 2008.
    @InProceedings{cfmbd08, author = {M.~Giddings and J.~{J}{\"u}{r}jens and P. M.~Allen}, title = {Challenges for the model based development of distributed real time systems}, booktitle = {1st Int. Workshop on Non-functional System Properties in Domain Specific Modeling Languages (NFPinDSML @ MoDELS 2008)}, year = {2008}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/nfpdsml08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/nfpdsml08GJA.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides   preprint 
  • S. Islam, J. Jürjens: Incorporating Security Requirements from Legal Regulations into UMLsec Models. In: Modeling Security Workshop (ModSec @ MoDELS 2008), 2008.
    @InProceedings{isrlr08, author = {S.~Islam and J.~{J}{\"u}{r}jens}, title = {Incorporating Security Requirements from Legal Regulations into {UMLsec} Models}, booktitle = {Modeling Security Workshop (ModSec @ MoDELS 2008)}, year = {2008}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.7914}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/modsec08IJ.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringCompliance}, }
     BibTeX   DOI   preprint 
  • S. Taubenberger, J. Jürjens: IT Security Risk Analysis based on Business Process Models enhanced with Security Requirements. In: Modeling Security Workshop (ModSec @ MoDELS 2008), 2008.
    @InProceedings{itsra08, author = {S.~Taubenberger and J.~{J}{\"u}{r}jens}, title = {IT Security Risk Analysis based on Business Process Models enhanced with Security Requirements}, booktitle = {Modeling Security Workshop (ModSec @ MoDELS 2008)}, year = {2008}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/modsec08TJ.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint 
  • J. Jürjens, R. Rumm: Model-based Security Analysis of the German Health Card Architecture. In: Methods of Information in Medicine, vol. 47, no. 5, pp. 409-416, 2008. Special section on Model-based Development of Trustworthy Health Information Systems.
    @Article{mothis08JR, author = {J.~{J}{\"u}{r}jens and R.~Rumm}, title = {Model-based Security Analysis of the German Health Card Architecture}, journal = {Methods of Information in Medicine}, year = {2008}, volume = {47}, pages = {409--416}, number = {5}, note = {Special section on Model-based Development of Trustworthy Health Information Systems}, DOI = {http://doi.org/10.3414/ME9122}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/mothis08web.pdf:URL}, keywords = {modelbasedSecurityEngineering, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   preprint 
  • J. Jürjens: Linking Cryptoprotocol Verification to Reality. In: Annual Meeting of the Working Group on Formal Methods and Software Engineering for Safety and Security (German Computer Society), Darmstadt (Germany), 2008.
    @InProceedings{lcvr08, author = {J.~{J}{\"u}{r}jens}, title = {Linking Cryptoprotocol Verification to Reality}, booktitle = {Annual Meeting of the Working Group on Formal Methods and Software Engineering for Safety and Security (German Computer Society)}, year = {2008}, address = {Darmstadt (Germany)}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fomsess08talk.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   slides 
  • J. Jürjens: Model-based vs. Code-based Verification for Critical Systems. In: Models 2008 tutorial, 2008.
    @InProceedings{mbcbvcs08, author = {J.~{J}{\"u}{r}jens}, title = {Model-based vs. Code-based Verification for Critical Systems}, booktitle = {Models 2008 tutorial}, year = {2008}, file = {slides:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials/models08tut_handout.pdf:URL}, keywords = {atScientificConferences, tutorial, dependableSystems}, URL = {http://www.irit.fr/models/tutorials.html#CS}, }
     BibTeX   URL   slides 
  • Michel R. V. Chaudron (editors): First International Modeling Security Workshop, Springer, Lecture Notes in Computer Science, vol. 5421, pp. 181-184, 2008.
    @Proceedings{modsec08, author = {Jon Whittle and Jan J{\"{u}}rjens and Bashar Nuseibeh and Glen Dobson}, editor = {Michel R. V. Chaudron}, title = {First International Modeling Security Workshop}, booktitle = {Models in Software Engineering, Workshops and Symposia at {MODELS} 2008, Toulouse, France, September 28 - October 3, 2008. Reports and Revised Selected Papers}, pages = {181--184}, series = {Lecture Notes in Computer Science}, volume = {5421}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01648-6\_19}, doi = {10.1007/978-3-642-01648-6\_19}, keywords = {procs, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI 
  • J. Jürjens: Model-based Security Testing using UMLsec. In: Electronic Notes in Theoretical Computer Science, vol. 220, no. 1, pp. 93-104, 2008.
    @Article{entcs08J, title = {Model-based Security Testing using {UMLsec}}, author = {J.~{J}{\"u}{r}jens}, journal = {Electronic Notes in Theoretical Computer Science}, year = {2008}, number = {1}, pages = {93--104}, series = {Electronic Notes in Theoretical Computer Science}, volume = {220}, DOI = {10.1016/j.entcs.2008.11.008}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/mbt08.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {electronicJournals, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Model-based Security Testing using UMLsec. In: Model-based Testing 2008 (MBT`08 @ ETAPS 2008), pp. 93-104, 2008.
    @InProceedings{mbstus08b, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Testing using {UMLsec}}, booktitle = {Model-based Testing 2008 (MBT`08 @ ETAPS 2008)}, year = {2008}, volume = {220}, number = {1}, pages = {93--104}, DOI = {10.1016/j.entcs.2008.11.008}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/mbt08talk.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/mbt08.pdf:URL}, keywords = {industrialConferences, workshop, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX   DOI   slides   dblp   preprint 
  • J. Jürjens: Quality Assurance for Security-Critical Systems. In: 13th Software & Systems Quality Conferences (SQC08), Congress Center Düsseldorf, Germany, 2008.
    @InProceedings{qascs08, author = {J.~{J}{\"u}{r}jens}, title = {Quality Assurance for Security-Critical Systems}, booktitle = {13th Software \& Systems Quality Conferences (SQC08)}, year = {2008}, address = {Congress Center D{\"u}sseldorf, Germany}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sqc08talk.pdf:URL}, keywords = {industrialConferences, workshop, withIndustry, dependableSystems}, }
     BibTeX   slides 
  • D. Ratiu, M. Feilkas, F. Deissenboeck, J. Jürjens, R. Marinescu: Towards a Repository of Common Programming Technologies Knowledge. In: International Workshop on Semantic Technologies in System Maintenance (STSM 2008), 2008.
    @InProceedings{trcptk08, author = {D.~Ratiu and M.~Feilkas and F.~Deissenboeck and J.~{J}{\"u}{r}jens and R.~Marinescu}, title = {Towards a Repository of Common Programming Technologies Knowledge}, booktitle = {International Workshop on Semantic Technologies in System Maintenance (STSM 2008)}, year = {2008}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ProgrammingTechnologiesKnowledgeRepository.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/stsm08.pdf:URL}, keywords = {workshop, industrialConferences, programComprehension}, }
     BibTeX   slides   preprint 
  • J. Jürjens: Towards Verified Crypto-Protocol Implementations: The Java Secure Sockets Extension. In: ABZ 2008 VSRnet Workshop, 2008.
    @InProceedings{tvcpi08, author = {J.~{J}{\"u}{r}jens}, title = {Towards Verified Crypto-Protocol Implementations: The Java Secure Sockets Extension}, booktitle = {ABZ 2008 VSRnet Workshop}, year = {2008}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/vsrnet08talk.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   slides 
  • J. Jürjens: Using Interface Specifications for Verifying Crypto-protocol Implementations. In: Foundations of Interface Technologies 2008 (FIT`08 @ ETAPS 2008), 2008.
    @InProceedings{uisvcpi08, author = {J.~{J}{\"u}{r}jens}, title = {Using Interface Specifications for Verifying Crypto-protocol Implementations}, booktitle = {Foundations of Interface Technologies 2008 (FIT`08 @ ETAPS 2008)}, year = {2008}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.2736}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fit08talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fit08.pdf:URL}, keywords = {industrialConferences, workshop, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint 
  • J. Jürjens: Model-based Security-Engineering (Invited Lecture). In: Eingeladener Vortrag im Kolloquium des Elitestudienganges, / Univ. Augsburg, 2008.
    @InProceedings{muc08J, author = {J.~{J}{\"{u}}{r}jens}, title = {Model-based Security-Engineering (Invited Lecture)}, booktitle ={Eingeladener Vortrag im Kolloquium des Elitestudienganges}{Invited lecture in the colloquium of the Elite Graduate Program "Software Engineering"}, year = {2008}, organization = {/ Univ.~Augsburg}, }
     BibTeX 

2007


  • J. Jürjens: Developing Secure Embedded Systems: Pitfalls and How to Avoid Them. In: 29th International Conference on Software Engineering (ICSE 2007), pp. 182-183, ACM, 2007.
    @InProceedings{dses07, author = {J.~{J}{\"u}{r}jens}, title = {Developing Secure Embedded Systems: Pitfalls and How to Avoid Them}, booktitle = {29th International Conference on Software Engineering (ICSE 2007)}, year = {2007}, pages = {182--183}, organization = {ACM}, crossref = {DBLP:conf/icse/2007c}, DOI = {http://doi.ieeecomputersociety.org/10.1109/ICSECOMPANION.2007.30}, file = {slides:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials.html:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icse07tut.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecureEmbeddedSystems, atScientificConferences}, }
     BibTeX   DOI   slides   preprint   dblp 
  • B. Best, J. Jürjens, B. Nuseibeh: Model-based Security Engineering of Distributed Information Systems using UMLsec. In: 29th International Conference on Software Engineering (ICSE 2007), pp. 581-590, ACM, 2007.
    @InProceedings{mbsedis07, author = {B.~Best and J.~{J}{\"u}{r}jens and B.~Nuseibeh}, title = {Model-based Security Engineering of Distributed Information Systems using {UMLsec}}, booktitle = {29th International Conference on Software Engineering (ICSE 2007)}, year = {2007}, pages = {581--590}, organization = {ACM}, crossref = {DBLP:conf/icse/2007}, DOI = {http://doi.ieeecomputersociety.org/10.1109/ICSE.2007.55}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse07talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icse07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   DOI   slides   preprint   dblp 
  • D. Petriu, M. Woodside, D. Petriu, Jing Xu, T. Israr, G. Georg, R. France, J. Bieman, S. H. Houmb, J. Jürjens: Performance Analysis of Security Aspects in UML Models. In: Sixth International Workshop on Software and Performance (WOSP 2007), Buenos Aires, Argentina, pp. 91-102, ACM, 2007.
    @InProceedings{wosp07PWP, author = {D.~Petriu and M.~Woodside and D.~Petriu and Jing Xu and T.~Israr and G. Georg and R. France and J. Bieman and S. H.~Houmb and J.~{J}{\"u}{r}jens}, title = {Performance Analysis of Security Aspects in {UML} Models}, booktitle = {Sixth International Workshop on Software and Performance (WOSP 2007)}, year = {2007}, pages = {91--102}, address = {Buenos Aires, Argentina}, organization = {ACM}, DOI = {http://doi.acm.org/10.1145/1216993.1217010}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {workshop, industrialConferences, securityPerformance}, }
     BibTeX   DOI   dblp 
  • D. Ratiu, J. Jürjens: The Reality of Libraries. In: 11th European Conference on Software Maintenance and Reengineering (CSMR 2007), pp. 307-318, Institute of Electrical and Electronics Engineers, 2007.
    @InProceedings{rl07, author = {D.~Ratiu and J.~{J}{\"u}{r}jens}, title = {The Reality of Libraries}, booktitle = {11th European Conference on Software Maintenance and Reengineering (CSMR 2007)}, year = {2007}, pages = {307--318}, organization = {Institute of Electrical and Electronics Engineers}, crossref = {DBLP:conf/csmr/2007}, DOI = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2007.48}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/csmr07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, programComprehension}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, Yijun Yu: Tools for Model-based Security Engineering: Models vs. Code. In: 22nd International Conference on Automated Software Engineering (ASE), Automated Software Engineering (ASE), Institute of Electrical and Electronics Engineers/ACM, 2007.
    @InProceedings{tmbsemvc07, author = {J.~{J}{\"u}{r}jens and Yijun Yu}, title = {Tools for Model-based Security Engineering: Models vs. Code}, booktitle = {22nd International Conference on Automated Software Engineering (ASE)}, year = {2007}, series = {Automated Software Engineering (ASE)}, organization = {Institute of Electrical and Electronics Engineers/ACM}, crossref = {DBLP:conf/kbse/2007}, DOI = {http://doi.org/10.1145/1321631.1321736}, file = {preprint:http://mcs.open.ac.uk/yy66/paper/jurjens07ase.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project. In: Seventh International Workshop on Automated Verification of Critical Systems (AVOCS 2007), Oxford, 2007.
    @InProceedings{asvspi07, author = {J.~{J}{\"u}{r}jens}, title = {Automated Security Verification for Crypto Protocol Implementations: Verifying the {Jessie} Project}, booktitle = {Seventh International Workshop on Automated Verification of Critical Systems (AVOCS 2007)}, year = {2007}, address = {Oxford}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/avocs07talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/avocs07.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   slides   preprint 
  • J. Jürjens: Modellbasierte Entwicklung Sicherheitskritischer Systeme (Keynote). In: Software Engineering 2007, 2007.
    @InProceedings{mbess07, author = {J.~{J}{\"u}{r}jens}, title = {{Modellbasierte Entwicklung Sicherheitskritischer Systeme (Keynote)}}, booktitle = {Software Engineering 2007}, year = {2007}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/se07de.pdf:URL}, keywords = {conferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides 
  • J. Jürjens: Model-based Security Engineering for Compliance with Regulatory and Business Requirements. In: H.-G. Hegering, H. Reiser, M. Schiffers, T. Nebe (editors): 14th Annual Workshop of the HP Software University Association, Munich (Germany), pp. 219-226, 2007.
    @InProceedings{mbsecrbr07, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering for Compliance with Regulatory and Business Requirements}, booktitle = {14th Annual Workshop of the HP Software University Association}, year = {2007}, editor = {H.-G.~Hegering and H.~Reiser and M.~Schiffers and T.~Nebe}, pages = {219--226}, address = {Munich (Germany)}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/hp07slides.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/hp07.pdf:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringCompliance}, }
     BibTeX   slides   preprint 
  • J. Jürjens: Model-based Security Engineering: Run-time Assurance. In: Third International Workshop on Software Engineering for Secure Systems (SESS 2007 @ ICSE 2007), Minneapolis (MN) (USA), 2007.
    @InProceedings{sess07, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering: Run-time Assurance}, booktitle = {Third International Workshop on Software Engineering for Secure Systems (SESS 2007 @ ICSE 2007)}, year = {2007}, address = {Minneapolis (MN) (USA)}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/sess07.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides 
  • J. Jürjens: Security Information Networks. In: Two-day tutorial, each in Mumbai and New Delhi, 2007. With enkryptix security consulting, Mumbai, India.
    @InProceedings{sin07, author = {J.~{J}{\"u}{r}jens}, title = {Security Information Networks}, booktitle = {Two-day tutorial, each in Mumbai and New Delhi}, year = {2007}, note = {With enkryptix security consulting, Mumbai, India.}, keywords = {withIndustry, tutorial, secureSoftwareEngineeringGeneral}, }
     BibTeX 
  • J. Jürjens: Compliance-driven Secure Software Quality Management. In: Software & Systems Quality Conference (SQC-UK 2007), London, 2./3. Oct, 2007.
    @InProceedings{sqs07ukJ, author = {J.~{J}{\"u}{r}jens}, title = {Compliance-driven Secure Software Quality Management}, booktitle = {Software \& Systems Quality Conference (SQC-UK 2007)}, year = {2007}, address = {London, 2./3. Oct}, keywords = {industrialConferences, dependableSystems, secureSoftwareEngineeringCompliance}, }
     BibTeX 
  • J. Jürjens, P. Shabalin: Tools for Secure Systems Development with UML. In: International Journal on Software Tools for Technology Transfer (STTT), vol. 9, no. 5--6, pp. 527-544, 2007. Invited submission to the special issue for FASE 2004/05.
    @Article{sttt07JS, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tools for Secure Systems Development with {UML}}, journal = {International Journal on Software Tools for Technology Transfer (STTT)}, year = {2007}, volume = {9}, pages = {527--544}, number = {5--6}, note = {Invited submission to the special issue for FASE 2004/05}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/sttt07.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/article/10.1007/s10009-007-0048-8:URL}, keywords = {modelbasedSecurityEngineering,vorsecurestreams, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens: Tools and Techniques for Model-based Testing with UML. In: 12th Software & Systems Quality Conferences, Congress Center Düsseldorf, Germany, 2007.
    @InProceedings{ttmbtu07, author = {J.~{J}{\"u}{r}jens}, title = {Tools and Techniques for Model-based Testing with {UML}}, booktitle = {12th Software \& Systems Quality Conferences}, year = {2007}, address = {Congress Center D{\"u}sseldorf, Germany}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sqs07hand.pdf:URL}, keywords = {workshop, industrialConferences, withIndustry, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX   slides 
  • E. B. Fernandez, N. Yoshioka, H. Washizaki, J. Jürjens: Using security patterns to build secure systems. In: 1st International Workshop on Software Patterns and Quality (SPAQu'07), 2007.
    @InProceedings{uspbss07, author = {E. B.~Fernandez and N.~Yoshioka and H.~Washizaki and J.~{J}{\"u}{r}jens}, title = {Using security patterns to build secure systems}, booktitle = {1st International Workshop on Software Patterns and Quality (SPAQu'07)}, year = {2007}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Model-based Security-Engineering (Invited Lecture),National Institute for Informatics, Tokyo (Japan), 22-26 Jan. 2007. In: , , 2007.
    @InProceedings{nii07J, author = {J.~{J}{\"{u}}{r}jens}, title = {Model-based Security-Engineering (Invited Lecture),National Institute for Informatics, Tokyo (Japan), 22--26 Jan.~2007}, booktitle ={}, year = {2007}, organization = {}, }
     BibTeX 

2006


  • J. Jürjens: Modeling and Compositional Design for Secure Embedded Systems (Invited Talk). In: NSF-IST workshop: Long Term Challenges in High Confidence Composable Embedded Systems, Helsinki (Finland), June 20--23, 2006, , 2006.
    @InProceedings{nsfist06Jtalk, author = {J.~{J}{\"{u}}{r}jens}, title = {Modeling and Compositional Design for Secure Embedded Systems (Invited Talk)}, booktitle ={NSF-IST workshop: Long Term Challenges in High Confidence Composable Embedded Systems, Helsinki (Finland), June~20--23, 2006}, year = {2006}, organization = {}, }
     BibTeX 
  • S. H. Houmb, G. Georg, J. Jürjens, R. B. France: An Integrated Security Verification and Security Solution Design Trade-off Analysis Approach. In: H. Mouratidis (editors): Idea Group pp. 190-219 Integrating Security and Software Engineering: Advances and Future Vision, 2006. Invited chapter.
    @InCollection{HGJF06, author = {S. H.~Houmb and G.~Georg and J.~{J}{\"u}{r}jens and R. B.~France}, title = {An Integrated Security Verification and Security Solution Design Trade-off Analysis Approach}, booktitle = {Integrating Security and Software Engineering: Advances and Future Vision}, year = {2006}, editor = {H. Mouratidis}, pages = {190--219}, publisher = {Idea Group}, note = {Invited chapter}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.741}, file = {preprint:http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.124.741&rep=rep1&type=pdf:URL}, keywords = {invitedBookChapters, secureSoftwareEngineeringAspectOrientedSecurity}, }
     BibTeX   DOI   preprint 
  • G. Georg, S. H. Houmb, R. B. France, S. Zschaler, D. C. Petriu, J. Jürjens: Critical Systems Development Using Modeling Languages: CSDUML 2006 Workshop Report. In: Models in Software Engineering, UML2006 Satellite Activities, Lecture Notes in Computer Science, vol. 4364, pp. 27-31, 2006.
    @InProceedings{csdusml06, author = {G.~Georg and S. H.~Houmb and R. B.~France and S.~Zschaler and D. C.~Petriu and J.~{J}{\"u}{r}jens}, title = {{Critical Systems Development Using Modeling Languages: CSDUML 2006 Workshop Report}}, booktitle = {Models in Software Engineering, UML2006 Satellite Activities}, year = {2006}, volume = {4364}, series = {Lecture Notes in Computer Science}, pages = {27--31}, crossref = {DBLP:conf/models/2006w}, DOI = {http://doi.org/10.1007/978-3-540-69489-2_4}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {editorials, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   dblp 
  • J. Jürjens: Model-Based Security Engineering for Real (Industry Day Invited Paper). In: 14th International Symposium on Formal Methods (FM 2006), Springer Verlag, Lecture Notes in Computer Science, vol. 4085, pp. 600-606, 2006. Industry Day Invited Paper.
    @InProceedings{mbser06, author = {J.~{J}{\"u}{r}jens}, title = {Model-Based Security Engineering for Real (Industry Day Invited Paper)}, booktitle = {14th International Symposium on Formal Methods (FM 2006)}, year = {2006}, volume = {4085}, series = {Lecture Notes in Computer Science}, pages = {600--606}, publisher = {Springer Verlag}, note = {Industry Day Invited Paper}, crossref = {DBLP:conf/fm/2006}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fm06talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fm06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11813040_42:URL}, keywords = {conferences, internationalConferences, secureSoftwareEngineeringIndustrialApplications}, }
     BibTeX   slides   preprint   dblp   SpringerLink 
  • J. Jürjens, J. Fox.: Tools for Model-based Security Engineering. In: 28th Intern. Conference on Software Engineering (ICSE 2006), 819--822. Research tool paper., ACM, 2006.
    @InProceedings{icse06toolJ, author = {J.~{J}{\"{u}}{r}jens and J.~Fox.}, title = {Tools for Model-based Security Engineering}, booktitle ={28th Intern.\ Conference on Software Engineering (ICSE 2006), ~819--822. Research tool paper.}, year = {2006}, organization = {ACM}, }
     BibTeX 
  • J. Jürjens, J. Fox: A Framework for Analyzing Composition of Security Aspects. In: Methods for Modelling Software Systems (MMOSS), 27.08. - 01.09.2006, ICSE, ACM, 2006.
    @InProceedings{tmbse06, author = {J.~{J}{\"u}{r}jens and J.~Fox}, title = {A Framework for Analyzing Composition of Security Aspects}, booktitle = {Methods for Modelling Software Systems (MMOSS), 27.08. - 01.09.2006}, year = {2006}, series = {ICSE}, organization = {ACM}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icse06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   preprint   dblp 
  • J. Jürjens: Building Biometric Authentication Systems: Pitfalls and How to Avoid Them. In: Annual Computer Security Applications Conference (ACSAC 2006), 2006.
    @InProceedings{bbas06, author = {J.~{J}{\"u}{r}jens}, title = {Building Biometric Authentication Systems: Pitfalls and How to Avoid Them}, booktitle = {Annual Computer Security Applications Conference (ACSAC 2006)}, year = {2006}, keywords = {atScientificConferences, cyberphysicalSystemsSecurity, tutorial}, }
     BibTeX 
  • J. Jürjens: Model-Based Security Engineering with UML: Introducing Security Aspects. In: Springer Lecture Notes in Computer Science pp. 64-87 International Symposium on Formal Methods for Components and Objects (FMCO 2005), 2006
    @InCollection{mbseuml06, author = {J.~{J}{\"u}{r}jens}, title = {Model-Based Security Engineering with {UML}: Introducing Security Aspects}, booktitle = {International Symposium on Formal Methods for Components and Objects (FMCO 2005)}, year = {2006}, volume = {4111}, series = {Lecture Notes in Computer Science}, pages = {64--87}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fmco05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11804192_4:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringAspectOrientedSecurity}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens: Security Analysis of Crypto-based Java Programs using Automated Theorem Provers. In: S. Easterbrook, S. Uchitel (editors): 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), ACM, pp. 167-176, 2006.
    @InProceedings{sacbjp06, author = {J.~{J}{\"u}{r}jens}, title = {Security Analysis of Crypto-based Java Programs using Automated Theorem Provers}, booktitle = {21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006)}, year = {2006}, editor = {S.~Easterbrook and S.~Uchitel}, pages = {167--176}, publisher = {ACM}, DOI = {http://doi.org/10.1109/ASE.2006.60}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ase06talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ase06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens: Sicherheit - Wo stehen wir heute aus Sicht der Wissenschaft ?. In: Microsoft DevDays Security 2006, Munich, 2006.
    @InProceedings{swswhsdw06, author = {J.~{J}{\"u}{r}jens}, title = {{Sicherheit -- Wo stehen wir heute aus Sicht der Wissenschaft~?}}, booktitle = {Microsoft DevDays Security 2006}, year = {2006}, address = {Munich}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/devdays06.pdf:URL}, keywords = {conferences, secureSoftwareEngineeringGeneral}, }
     BibTeX   slides 
  • H. Mouratidis, J. Jürjens, J. Fox: Towards a Comprehensive Framework for Secure Systems Development. In: 18th International Conference on Advanced Information Systems Engineering (CAiSE 2006), Springer Verlag, Lecture Notes in Computer Science, vol. 4001, pp. 48-62, 2006.
    @InProceedings{tcfssd06, author = {H.~Mouratidis and J.~{J}{\"u}{r}jens and J.~Fox}, title = {Towards a Comprehensive Framework for Secure Systems Development}, booktitle = {18th International Conference on Advanced Information Systems Engineering (CAiSE 2006)}, year = {2006}, volume = {4001}, series = {Lecture Notes in Computer Science}, pages = {48--62}, publisher = {Springer Verlag}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/caise06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11767138_5:URL}, ISBN = {3-540-26095-1}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityRequirementsEngineering}, }
     BibTeX   preprint   dblp   SpringerLink 
  • D. Gollmann, J. Jürjens (editors): 6th International Workshop on Issues in the Theory of Security (WITS`06), 2006.
    @Proceedings{wits06, title = {6th International Workshop on Issues in the Theory of Security (WITS`06)}, year = {2006}, editor = {D. Gollmann and J.~{J}{\"u}{r}jens}, keywords = {procs, secureSoftwareEngineeringGeneral}, }
     BibTeX 
  • J. Jürjens: Foundations for Designing Secure Architectures. In: First International Workshop on Views On Designing Complex Architectures (VODCA 2004), Bertinoro, pp. 31-46, 2006. Invited talk.
    @InProceedings{fdsa04, author = {J.~{J}{\"u}{r}jens}, title = {Foundations for Designing Secure Architectures}, booktitle = {First International Workshop on Views On Designing Complex Architectures (VODCA 2004)}, journal = {Electr. Notes Theor. Comput. Sci.}, volume = {142}, pages = {31--46}, year = {2006}, address = {Bertinoro}, note = {Invited talk}, DOI = {10.1016/j.entcs.2005.07.012}, file = {photo:http\://rgse.uni-koblenz.de/jj/pics/vodca04.jpg:URL;audio:http\://rgse.uni-koblenz.de/jj/publications/audio/vodca04.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/vodca04talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/vodca04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {workshop, invitedJournalPapers, invitedWorkshop, secureSoftwareEngineeringFoundationsOfSecurity}, }
     BibTeX   DOI   photo   audio   slides   preprint   dblp 

2005


  • J. Jürjens: Model-based Security Engineering with UML: Introducing Security Aspects. In: Frank S. de Boer, Marcello M. Bonsangue, Susanne Graf, Willem P. de Roever (editors): Formal Methods for Components and Objects, 4th International Symposium, FMCO 2005, Amsterdam, The Netherlands, November 1-4, 2005, Revised Lectures, Springer, Lecture Notes in Computer Science, vol. 4111, pp. 64-87, 2005.
    @InProceedings{mbse06, author = {J.~{J}{\"u}{r}jens}, editor = {Frank S. de Boer and Marcello M. Bonsangue and Susanne Graf and Willem P. de Roever}, title = {Model-based Security Engineering with {UML:} Introducing Security Aspects}, booktitle = {Formal Methods for Components and Objects, 4th International Symposium, {FMCO} 2005, Amsterdam, The Netherlands, November 1-4, 2005, Revised Lectures}, pages = {64--87}, series = {Lecture Notes in Computer Science}, volume = {4111}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11804192\_4}, doi = {10.1007/11804192\_4}, crossref = {DBLP:conf/secrypt/2006}, file = {bibtex:http\://dblp.uni-trier.de/rec/bibtex/conf/secrypt/Jurjens06:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/secrypt06talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/secrypt06.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {conferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://www.secrypt.org}, }
     BibTeX   DOI   URL   bibtex   slides   preprint   dblp 
  • S. Wagner, J. Jürjens, C. Koller, P. Trischberger: A Case Study Comparing Bug Finding Tools with Reviews and Tests. In: Testcom, Springer Verlag, Lecture Notes in Computer Science, vol. 3502, pp. 40-55, 2005.
    @InProceedings{acscbft05, author = {S.~Wagner and J.~{J}{\"u}{r}jens and C.~Koller and P.~Trischberger}, title = {A Case Study Comparing Bug Finding Tools with Reviews and Tests}, booktitle = {Testcom}, year = {2005}, series = {Lecture Notes in Computer Science}, pages = {40--55}, volume = {3502}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.9397}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/testcom05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11430230_4:URL}, keywords = {internationalConferences, codeAnalysis}, }
     BibTeX   DOI   preprint   dblp   SpringerLink 
  • J. Jürjens, Stefan Wagner: Component-Based Development of Dependable Systems with UML. In: Springer pp. 320-344 Component-Based Software Development for Embedded Systems -- An Overview on Current Research Trends, 2005
    @InCollection{cbdds05, author = {J.~{J}{\"u}{r}jens and Stefan Wagner}, title = {Component-Based Development of Dependable Systems with {UML}}, booktitle = {Component-Based Software Development for Embedded Systems -- An Overview on Current Research Trends}, year = {2005}, volume = {3778}, pages = {320--344}, publisher = {Springer}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/cbsd05.pdf:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11591962_16:URL}, keywords = {contributedBookChapters, dependableSystems}, }
     BibTeX   preprint   SpringerLink 
  • S. H. Houmb, G. Georg, R. France, J. Bieman, J. Jürjens: Cost-Benefit Trade-Off Analysis using BBN for Aspect-Oriented Risk-Driven Development. In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), Shanghai (China), Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{cbtoa05, author = {S. H.~Houmb and G.~Georg and R.~France and J.~Bieman and J.~{J}{\"u}{r}jens}, title = {Cost-Benefit Trade-Off Analysis using {BBN} for Aspect-Oriented Risk-Driven Development}, booktitle = {10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005)}, year = {2005}, address = {Shanghai (China)}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {http://doi.org/10.1109/ICECCS.2005.30}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/iceccs05camera.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringITSecurityRiskAssessment}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, M. Yampolskiy: Code security analysis with assertions. In: 20th International Conference on Automated Software Engineering (ASE 2005), IEEE/ACM, pp. 392-395, 2005.
    @InProceedings{ase05, author = {J.~{J}{\"u}{r}jens and M.~Yampolskiy}, title = {Code security analysis with assertions}, booktitle = {20th International Conference on Automated Software Engineering (ASE 2005)}, year = {2005}, pages = {392--395}, publisher = {IEEE/ACM}, DOI = {http://doi.acm.org/10.1145/1101908.1101978}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ase05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. In: 21st Annual Computer Security Applications Conference (ACSAC 2005), pp. 138-149, Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{csabas05, author = {J.~{J}{\"u}{r}jens}, title = {Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers}, booktitle = {21st Annual Computer Security Applications Conference (ACSAC 2005)}, year = {2005}, pages = {138--149}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {http://doi.org/10.1109/CSAC.2005.15}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/acsac05talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/acsac05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • S. H. Houmb, J. Jürjens, R. France (editors): Critical Systems Development Using Modeling Languages, TU München Technical Report, 2005. UML 2005 satellite workshop proceedings.
    @Proceedings{csdusml05, title = {Critical Systems Development Using Modeling Languages}, year = {2005}, editor = {S. H.~Houmb and J.~{J}{\"u}{r}jens and R.~France}, series = {TU M{\"u}nchen Technical Report}, note = {UML 2005 satellite workshop proceedings}, keywords = {procs, secureSoftwareEngineeringGeneral}, }
     BibTeX 
  • J. Jürjens, S. H. Houmb: Dynamic Secure Aspect Modeling with UML: From Models to Code. In: ACM / IEEE 8th International Conference on Model Driven Engineering Languages and Systems (MoDELS / UML 2005), Springer Verlag, Lecture Notes in Computer Science, pp. 142-155, ACM/Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{dsamu05, author = {J.~{J}{\"u}{r}jens and S. H.~Houmb}, title = {Dynamic Secure Aspect Modeling with {UML}: From Models to Code}, booktitle = {ACM / IEEE 8th International Conference on Model Driven Engineering Languages and Systems (MoDELS / UML 2005)}, year = {2005}, series = {Lecture Notes in Computer Science}, pages = {142--155}, organization = {ACM/Institute of Electrical and Electronics Engineers}, publisher = {Springer Verlag}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/models05talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/models05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11557432_11:URL}, keywords = {internationalConferences, secureSoftwareEngineeringAspectOrientedSecurity}, }
     BibTeX   slides   preprint   dblp   SpringerLink 
  • J. Jürjens, P. Shabalin: Tools for Secure Systems Development with UML: Security Analysis with ATPs. In: FASE 2005, Springer Verlag, Edinburgh, Lecture Notes in Computer Science, vol. 3442, pp. 305-309, 2005.
    @InProceedings{fase05JS, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tools for Secure Systems Development with {UML}: Security Analysis with {ATPs}}, booktitle = {FASE 2005}, year = {2005}, series = {Lecture Notes in Computer Science}, address = {Edinburgh}, pages = {305--309}, volume = {3442}, publisher = {Springer Verlag}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fase05talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/fase05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-31984-9_23:URL}, keywords = {toolDescription, internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   slides   preprint   dblp   SpringerLink 
  • J. Jürjens: Formal Development of Critical Systems with UML: Methods and Tools. In: International Symposium on Formal Methods for Components and Objects (FMCO 2005), 2005.
    @InProceedings{fdcsumt05, author = {J.~{J}{\"u}{r}jens}, title = {Formal Development of Critical Systems with {UML}: Methods and Tools}, booktitle = {International Symposium on Formal Methods for Components and Objects (FMCO 2005)}, year = {2005}, keywords = {tutorial, atScientificConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Testing Critical and Embedded Systems. In: 6th International Conference on Software Testing (ICSTEST 2005), April 6--8, 2005, Düsseldorf, German, Tutorial, , 2005.
    @InProceedings{icstest05J, author = {J.~{J}{\"{u}}{r}jens}, title = {Testing Critical and Embedded Systems}, booktitle ={6th International Conference on Software Testing (ICSTEST 2005), April 6--8, 2005, D\"usseldorf, German, Tutorial}, year = {2005}, organization = {}, }
     BibTeX 
  • J. Fox, J. Jürjens: Introducing Security Aspects with Model Transformation. In: 12th Annual IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), Greenbelt, Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{isamt05, author = {J.~Fox and J.~{J}{\"u}{r}jens}, title = {Introducing Security Aspects with Model Transformation}, booktitle = {12th Annual IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005)}, year = {2005}, address = {Greenbelt}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {10.1109/ECBS.2005.48}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/IntroducingSecAspectsWithMT.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • J. Botaschanjan, J. Jürjens: Modeling and Analyzing Time-Constraints. In: 12th Annual IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), Greenbelt, 2005.
    @InProceedings{matc05, author = {J.~Botaschanjan and J.~{J}{\"u}{r}jens}, title = {Modeling and Analyzing Time-Constraints}, booktitle = {12th Annual IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005)}, year = {2005}, address = {Greenbelt}, DOI = {10.1109/ECBS.2005.52}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ecbs05bot.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, M. Lehrhuber, G. Wimmel: Model-Based Design and Analysis of Permission-Based Security. In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), Shanghai (China), Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{mbdapbs05, author = {J.~{J}{\"u}{r}jens and M.~Lehrhuber and G.~Wimmel}, title = {Model-Based Design and Analysis of Permission-Based Security}, booktitle = {10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005)}, year = {2005}, address = {Shanghai (China)}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {10.1109/ICECCS.2005.61}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/iceccs05permissions.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • S. Wagner, J. Jürjens: Model-Based Identification of Fault-Prone Components. In: 5th European Dependable Computing Conference on Dependable Computing (EDCC-5), Springer Verlag, Lecture Notes in Computer Science, vol. 3463, pp. 435-452, 2005.
    @InProceedings{mbifpc05, author = {S.~Wagner and J.~{J}{\"u}{r}jens}, title = {Model-Based Identification of Fault-Prone Components}, booktitle = {5th European Dependable Computing Conference on Dependable Computing (EDCC-5)}, year = {2005}, volume = {3463}, series = {Lecture Notes in Computer Science}, pages = {435--452}, publisher = {Springer Verlag}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/edcc05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11408901_32:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens: Model-based Security Engineering with UML. In: A. Aldini, R. Gorrieri, F. Martinelli (editors): Lecture Notes in Computer Science pp. 42-77 Foundations of Security Analysis and Desing III: FOSAD 2004/2005 Tutorial Lectures, 2005
    @InCollection{fosad05, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering with {UML}}, booktitle = {Foundations of Security Analysis and Desing III: FOSAD 2004/2005 Tutorial Lectures}, year = {2005}, editor = {A. Aldini and R. Gorrieri and F. Martinelli}, volume = {3655}, series = {Lecture Notes in Computer Science}, pages = {42--77}, file = {slides (part 1/2):http\://rgse.uni-koblenz.de/jj/umlsec/fosad04handout1.pdf:URL;slides (part 2/2):http\://rgse.uni-koblenz.de/jj/umlsec/fosad04handout2.pdf:URL;book chapter:http\://rgse.uni-koblenz.de/jj/publications/papers/fosad04.pdf:URL;SpringerLink:http://link.springer.com/chapter/10.1007/11554578_2:URL}, keywords = {graduateSchoolLectures, invitedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides (part 1/2)   slides (part 2/2)   book chapter   SpringerLink 
  • J. Jürjens: Verification of Low-level Crypto-Protocol Implementations Using Automated Theorem Proving. In: 3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005), pp. 89-98, Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{memocode05J, author = {J.~{J}{\"u}{r}jens}, title = {Verification of Low-level Crypto-Protocol Implementations Using Automated Theorem Proving}, booktitle = {3rd ACM \& IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005)}, year = {2005}, pages = {89--98}, organization = {Institute of Electrical and Electronics Engineers}, alt_note = {Technical report with additional material accessible at \URL{http://www4.in.tum.de/$\tilde{\ }$juerjens/pkcs11results}}, DOI = {http://doi.org/10.1109/MEMCOD.2005.1487898}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/memocode05talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/memocode05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens: Return on Security Investment. In: Infotage, Starnberger See, 2005. Tutorial, FJLang Security Consulting.
    @InProceedings{rosi05, author = {J.~{J}{\"u}{r}jens}, title = {Return on Security Investment}, booktitle = {Infotage}, year = {2005}, address = {Starnberger See}, note = {Tutorial, FJLang Security Consulting}, keywords = {withIndustry, tutorial, securityEconomics}, }
     BibTeX 
  • J. Jürjens: Sound Methods and Effective Tools for Model-based Security Engineering with UML. In: 27th International Conference on Software Engineering (ICSE 2005), pp. 322-331, ACM, 2005.
    @InProceedings{smetmbse05, author = {J.~{J}{\"u}{r}jens}, title = {Sound Methods and Effective Tools for Model-based Security Engineering with {UML}}, booktitle = {27th International Conference on Software Engineering (ICSE 2005)}, year = {2005}, pages = {322--331}, organization = {ACM}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.4820}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icse05_ppt.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icse05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {toolDescription, internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens: Security Modeling with UML 2005. Invited graduate course.
    @Misc{smuml05, author = {J.~{J}{\"u}{r}jens}, title = {Security Modeling with {UML}}, year = {2005}, note = {Invited graduate course}, file = {Slides:http\://rgse.uni-koblenz.de/jj/umlsec/madrid05.pdf:URL}, keywords = {graduateSchoolLectures, secureSoftwareEngineeringModelBasedSecurityEngineering}, organization = {Universidad Carlos III de Madrid}, }
     BibTeX   Slides 
  • J. Jürjens: Secure Systems Development with UML Published by Springer (2005) 300 pages. Chinese translation: Tsinghua University Press, Beijing 2009.
    @Book{UMLsecBook05, title = {Secure Systems Development with {UML}}, publisher = {Springer}, year = {2005}, author = {J.~{J}{\"u}{r}jens}, pages = {300}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/book/10.1007%2Fb137706:URL}, note = {Chinese translation: Tsinghua University Press, Beijing 2009}, keywords = {selectedPub,book,vorsecurestreams, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   dblp   SpringerLink 
  • J. Jürjens, P. Shabalin: Tool-support for Model-Driven Development of Security-Critical Systems with UML. In: Springer Model-driven Software Development -- Volume II of Research and Practice in Software Engineering, 2005
    @InCollection{tsmdd05, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tool-support for Model-Driven Development of Security-Critical Systems with {UML}}, booktitle = {Model-driven Software Development -- Volume II of Research and Practice in Software Engineering}, year = {2005}, publisher = {Springer}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.7379}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/mdsd05.pdf:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-28554-7_3:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   SpringerLink 
  • J. Jürjens: Towards using game semantics for crypto protocol verification: Lorenzen games.. In: Dan R. Ghica, Guy McCusker (editors): ETAPS Workshop on Games for Logic and Programming Languages (GALOP 2005), University of Edinburgh, pp. 241-257, 2005.
    @InProceedings{tugscpv05, author = {J.~{J}{\"u}{r}jens}, title = {Towards using game semantics for crypto protocol verification: Lorenzen games.}, booktitle = {ETAPS Workshop on Games for Logic and Programming Languages (GALOP 2005)}, year = {2005}, editor = {Dan R. Ghica and Guy McCusker}, pages = {241--257}, address = {University of Edinburgh}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/galop05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   slides   dblp 
  • J. Jürjens: Understanding Security Goals Provided by Crypto-Protocol Implementations. In: 21st International Conference on Software Maintenance (ICSM 2005), pp. 643-646, Institute of Electrical and Electronics Engineers, 2005.
    @InProceedings{usgpcpi05, author = {J.~{J}{\"u}{r}jens}, title = {Understanding Security Goals Provided by Crypto-Protocol Implementations}, booktitle = {21st International Conference on Software Maintenance (ICSM 2005)}, year = {2005}, pages = {643--646}, organization = {Institute of Electrical and Electronics Engineers}, alt_note = {Technical report with additional material accessible at \URL{http://www4.in.tum.de/$\tilde{\ }$juerjens/opensslresults}}, DOI = {http://doi.org/10.1109/ICSM.2005.97}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icsm05talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsm05.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringCodeSecurityAnalysis}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens: UP and Security: Overview on UMLsec. In: Sobenet workshop: UP, XP and architecture, KU Leuven (Belgium), 2005.
    @InProceedings{sobenet05, author = {J.~{J}{\"u}{r}jens}, title = {UP and Security: Overview on {UMLsec}}, booktitle = {Sobenet workshop: UP, XP and architecture}, year = {2005}, address = {KU Leuven (Belgium)}, file = {slides:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/slides/sobenet05hand.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX   slides 
  • J. Jürjens: Model-based Security-Engineering (Invited Lecture). In: Eingeladener Vortrag in der Ringvorlesung ``Standort Internet"Invited talk in the colloquium, Institut für Informatik und Gesellschaft, Abt. Telematik, Universität Freiburg, Nov. 2005 eingeladen vonon invitation of Prof. Dr. Günter Müller, 2005.
    @InProceedings{freiburg05J, author = {J.~{J}{\"{u}}{r}jens}, title = {Model-based Security-Engineering (Invited Lecture)}, booktitle ={{Eingeladener Vortrag in der Ringvorlesung ``Standort Internet"}{Invited talk in the colloquium} }, year = {2005}, organization = {Institut f\"ur Informatik und Gesellschaft, Abt.~Telematik, Universit\"at Freiburg, Nov.~2005 {eingeladen von}{on invitation of} Prof.~Dr.~G\"unter M\"uller}, }
     BibTeX 

2004


  • J. Jürjens, Pasha Shabalin: A Foundation for Tool-Supported Critical Systems Development with UML. In: 11th Annual IEEE International Conference on the Engineering of Computer Based Systems (ECBS 2004), Brno, Czech Republic, Institute of Electrical and Electronics Engineers, 2004.
    @InProceedings{aftscsd04, author = {J.~{J}{\"u}{r}jens and Pasha Shabalin}, title = {A Foundation for Tool-Supported Critical Systems Development with {UML}}, booktitle = {11th Annual IEEE International Conference on the Engineering of Computer Based Systems (ECBS 2004)}, year = {2004}, address = {Brno, Czech Republic}, organization = {Institute of Electrical and Electronics Engineers}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ecbs04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, umlModelAnalysis}, }
     BibTeX   preprint   dblp 
  • J. Jürjens: Automated Software Engineering of Critical Systems Development with UML. In: ASE 2004, Linz, 2004. Tutorial.
    @InProceedings{ase04, author = {J.~{J}{\"u}{r}jens}, title = {Automated Software Engineering of Critical Systems Development with {UML}}, booktitle = {ASE 2004}, year = {2004}, address = {Linz}, note = {Tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://ase2012.paluno.uni-due.de/}, }
     BibTeX   URL 
  • J. Jürjens, P. Shabalin: Automated Verification of UMLsec Models for Security Requirements. In: \guillemotleftUML\guillemotright 2004 - The Unified Modelling Language: Modelling Languages and Applications. 7th International Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings, Springer Verlag, Lisabon, Lecture Notes in Computer Science, vol. 3273, pp. 365-379, 2004.
    @InProceedings{avus04, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Automated Verification of {UMLsec} Models for Security Requirements}, booktitle = {{\guillemotleft}UML{\guillemotright} 2004 - The Unified Modelling Language: Modelling Languages and Applications. 7th International Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings}, year = {2004}, pages = {365--379}, series = {Lecture Notes in Computer Science}, volume = {3273}, address = {Lisabon}, publisher = {Springer Verlag}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/uml04talk.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/uml04talk.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/uml04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-30187-5_26:URL}, keywords = {toolDescription, internationalConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   audio   slides   preprint   dblp   SpringerLink 
  • J. Jürjens, L. Buda: Geldautomatensicherheit: Die Software bleibt das größte Risiko. In: Zeitschrift für die Sicherheit der Wirtschaft (WIK), 4, Aug. 2004, , 2004.
    @InProceedings{wik03BJ, author = {J.~{J}{\"{u}}{r}jens and L.~Buda}, title = {Geldautomatensicherheit: Die Software bleibt das gr\"o{\ss}te Risiko}, booktitle ={Zeitschrift f\"ur die Sicherheit der Wirtschaft (WIK), 4, Aug.~2004}, year = {2004}, organization = {}, }
     BibTeX 
  • J. Jürjens, L. Buda: Sichere Web-Services - Wo gibt es Risiken ?. In: Datenschutzberater, June 2004, , 2004.
    @InProceedings{dsb03JB, author = {J.~{J}{\"{u}}{r}jens and L.~Buda}, title = {Sichere Web-Services -- Wo gibt es Risiken ?}, booktitle ={Datenschutzberater, June 2004}, year = {2004}, organization = {}, }
     BibTeX 
  • J. Jürjens, L. Buda: Kopierschutzmechanismen für Digitales Video. In: GIT Sicherheit + Management, Apr. 2004, , 2004.
    @InProceedings{git03JB, author = {J.~{J}{\"{u}}{r}jens and L.~Buda}, title = {Kopierschutzmechanismen f\"ur Digitales Video}, booktitle ={GIT Sicherheit + Management, Apr.~2004}, year = {2004}, organization = {}, }
     BibTeX 
  • L. Buda, J. Grünbauer, J. Jürjens, T. Kuhn, S. Gerbich: (Un)-Sicherheit bremst Webservices. In: Informationweek, 5/6--04, Apr. 8, 2004, , 2004.
    @InProceedings{iw03BGGJK, author = {L.~Buda and J.~Gr\"unbauer and J.~{J}{\"{u}}{r}jens and T.~Kuhn and S.~Gerbich}, title = {(Un)-Sicherheit bremst Webservices}, booktitle ={Informationweek, 5/6--04, Apr.~8, 2004}, year = {2004}, organization = {}, }
     BibTeX 
  • J. Grünbauer, J. Jürjens, T. Kuhn, L. Buda: Sicherheit in serviceorientierten Architekturen. In: Computer Zeitung, , 2004.
    @InProceedings{cz04GJKB, author = {J.~Gr\"unbauer and J.~{J}{\"{u}}{r}jens and T.~Kuhn and L.~Buda}, title = {Sicherheit in serviceorientierten Architekturen}, booktitle ={Computer Zeitung}, year = {2004}, organization = {}, }
     BibTeX 
  • J. Jürjens, J. Grünbauer, L. Buda: Hochschulen bauen ihr IT-Security-Angebot aus. In: Computer Zeitung, 1--3 / 2004, , 2004.
    @InProceedings{cz03JGB, author = {J.~{J}{\"{u}}{r}jens and J.~Gr\"unbauer and L.~Buda}, title = {Hochschulen bauen ihr IT-Security-Angebot aus}, booktitle ={Computer Zeitung, 1--3 / 2004}, year = {2004}, organization = {}, }
     BibTeX 
  • J. Jürjens, Lidiya Buda: Berechtigungsvergabe in SAP Systemen und ihre automatische Überprüfung. In: Datenschutz und Datensicherheit, 2004.
    @InProceedings{bsaps04, author = {J.~{J}{\"u}{r}jens and Lidiya Buda}, title = {Berechtigungsvergabe in SAP Systemen und ihre automatische {{\"U}}berpr{\"u}fung}, booktitle = {Datenschutz und Datensicherheit}, year = {2004}, keywords = {nonEnglishJournals, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens, E. B. Fernandez, R. B. France, B. Rumpe (editors): Critical Systems Development with UML (CSDUML 2004), TU München Technical Report, no. TUM-I0317, 2004. UML 2004 satellite workshop proceedings.
    @Proceedings{csduml04, title = {{Critical Systems Development with UML (CSDUML 2004)}}, year = {2004}, editor = {J.~{J}{\"u}{r}jens and E. B.~Fernandez and R. B.~France and B.~Rumpe}, number = {TUM-I0317}, series = {TU M{\"u}nchen Technical Report}, note = {UML 2004 satellite workshop proceedings}, booktitle = {Critical Systems Development with UML (CSDUML 2004)}, keywords = {procs, dependableSystems}, }
     BibTeX 
  • J. Jürjens: Critical Systems Development with UML and Model-based Testing. In: Software Engineering (SE 2004), Innsbruck (Austria), 2004.
    @InProceedings{csdumlmbt04, author = {J.~{J}{\"u}{r}jens}, title = {Critical Systems Development with {UML} and Model-based Testing}, booktitle = {Software Engineering (SE 2004)}, year = {2004}, address = {Innsbruck (Austria)}, keywords = {tutorial, atScientificConferences, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX 
  • J. Jürjens: Critical Systems Development with UML: Methods and Tools. In: European Conference on Object-Oriented Programming (ECOOP 2004), Oslo, Norway, ACM, 2004. Half-day tutorial.
    @InProceedings{csdumlmt04b, author = {J.~{J}{\"u}{r}jens}, title = {Critical Systems Development with {UML}: Methods and Tools}, booktitle = {European Conference on Object-Oriented Programming (ECOOP 2004)}, year = {2004}, address = {Oslo, Norway}, organization = {ACM}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens, E. B. Fernandez, R. B. France, B. Rumpe, C. Heitmeyer: Critical Systems Development Using Modeling Languages (CSDUML'04): Current Development and Future Challenges (Report on the Third International Workshop). In: UML Modeling Languages and Applications. UML 2004 Satellite Activities, Revised Selected Papers, Lecture Notes in Computer Science, vol. 3297, pp. 76-84, 2004.
    @InProceedings{csdusml04, author = {J.~{J}{\"u}{r}jens and E. B.~Fernandez and R. B.~France and B.~Rumpe and C.~Heitmeyer}, title = {Critical Systems Development Using Modeling Languages ({CSDUML}'04): Current Development and Future Challenges (Report on the Third International Workshop)}, booktitle = {UML Modeling Languages and Applications. UML 2004 Satellite Activities, Revised Selected Papers}, year = {2004}, volume = {3297}, pages = {76--84}, series = {Lecture Notes in Computer Science}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.176.2568}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-31797-5_9:URL}, keywords = {editorials, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   dblp   SpringerLink 
  • J. Jürjens: Modellierung 2004: Kurz-Beiträge. In: Lecture Notes in Informatics, Gesellschaft für Informatik, 2004. page 279, , 2004.
    @InProceedings{modellierung04J, author = {J.~{J}{\"{u}}{r}jens}, title = {Modellierung 2004: Kurz-Beitr\"age}, booktitle ={Lecture Notes in Informatics, Gesellschaft f\"ur Informatik, 2004. page 279}, year = {2004}, organization = {}, }
     BibTeX 
  • J. Jürjens: Constructing Tool-Support for Sophisticated Analysis of UML Models. In: UML 2004, Lisbon, 2004. Tutorial.
    @InProceedings{ctssa04, author = {J.~{J}{\"u}{r}jens}, title = {Constructing Tool-Support for Sophisticated Analysis of {UML} Models}, booktitle = {UML 2004}, year = {2004}, address = {Lisbon}, note = {Tutorial}, file = {announcement:http\://rgse.uni-koblenz.de/jj/csdumltut/History/uml04-ann.html:URL;audio 2/2:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/uml04b.wav:URL;audio 1/2:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/uml04a.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials/uml04.pdf:URL}, keywords = {atScientificConferences, tutorial, umlModelAnalysis}, URL = {http://www.umlconference.org/}, }
     BibTeX   URL   announcement   audio 2/2   audio 1/2   slides 
  • J. Jürjens: Componentware for Critical Systems. In: Journal of Object Technology, vol. 3, no. 4, pp. 47-50, 2004.
    @Article{cwcs04, author = {J.~{J}{\"u}{r}jens}, title = {Componentware for Critical Systems}, journal = {Journal of Object Technology}, year = {2004}, volume = {3}, pages = {47--50}, number = {4}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/jot04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {http://doi.org/10.5381/jot.2004.3.4.a3}, keywords = {invitedJournalPapers, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Developing High-Assurance Secure Systems with UML: An electronic purchase protocol. In: Eighth IEEE International Symposium on High Assurance Systems Engineering (HASE 2004), Tampa, FL (USA), pp. 231-240, Institute of Electrical and Electronics Engineers, 2004.
    @InProceedings{dhass04, author = {J.~{J}{\"u}{r}jens}, title = {Developing High-Assurance Secure Systems with {UML}: An electronic purchase protocol}, booktitle = {Eighth IEEE International Symposium on High Assurance Systems Engineering (HASE 2004)}, year = {2004}, pages = {231--240}, address = {Tampa, FL (USA)}, organization = {Institute of Electrical and Electronics Engineers}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/hase04.wav:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/hase04.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   preprint   dblp 
  • J. Jürjens: Towards Automated Computationally Faithful Verification of Cryptoprotocols. In: DIMACS Security Protocols Workshop, Rutgers University, 2004.
    @InProceedings{dimacs04J, author = {J.~{J}{\"u}{r}jens}, title = {Towards Automated Computationally Faithful Verification of Cryptoprotocols}, booktitle = {DIMACS Security Protocols Workshop}, year = {2004}, address = {Rutgers University}, keywords = {industrialConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX 
  • J. Jürjens: Developing Security-Critical Applications with UMLsec - A Short Walk-Through. In: Novatica, vol. 168, 2004.
    @Article{dscaumlsec04, author = {J.~{J}{\"u}{r}jens}, title = {Developing Security-Critical Applications with {UMLsec} -- A Short Walk-Through}, journal = {Novatica}, year = {2004}, volume = {168}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.73.2657}, file = {paper (spanish):http\://rgse.uni-koblenz.de/jj/publications/papers/novatica04-spa.pdf:URL;paper (english):http\://rgse.uni-koblenz.de/jj/publications/papers/novatica04.pdf:URL}, keywords = {conferences, invitedJournalPapers, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX   DOI   paper (spanish)   paper (english) 
  • J. Jürjens: Developing Secure Web-based Applications with UML: Methods and Tools. In: Fourth International Conference on Web Engineering (ICWE'04), München (Germany), 2004. Tutorial.
    @InProceedings{dswba04, author = {J.~{J}{\"u}{r}jens}, title = {Developing Secure Web-based Applications with {UML}: Methods and Tools}, booktitle = {Fourth International Conference on Web Engineering (ICWE'04)}, year = {2004}, address = {M{\"u}nchen (Germany)}, note = {Tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://www.icwe2004.org/}, }
     BibTeX   URL 
  • J. Jürjens: Critical Systems Development with UML: Methods and Tools. In: IFIP World Computer Congress 2004 (WCC '04), Toulouse, 2004. Full-day tutorial.
    @InProceedings{csdumlmt04a, author = {J.~{J}{\"u}{r}jens}, title = {Critical Systems Development with {UML}: Methods and Tools}, booktitle = {IFIP World Computer Congress 2004 (WCC '04)}, year = {2004}, address = {Toulouse}, note = {Full-day tutorial}, crossref = {safecomp04}, file = {audio 6/6:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/wcc04f.wav:URL;audio 5/6:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/wcc04e.wav:URL;audio 4/6:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/wcc04d.wav:URL;audio 3/6:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/wcc04c.wav:URL;audio 2/6:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/wcc04b.wav:URL;audio 1/6:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/wcc04a.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials/wcc04.pdf:URL}, keywords = {atScientificConferences, tutorial, umlModelAnalysis}, URL = {http://www.wcc2004.org/}, }
     BibTeX   URL   audio 6/6   audio 5/6   audio 4/6   audio 3/6   audio 2/6   audio 1/6   slides 
  • J. Grünbauer, J. Jürjens, G. Wimmel: Security Engineering - A Survey. In: B. Rumpe, W. Hesse (editors): Modellierung 2004, LNI, vol. 45, German Computer Society (GI), 2004.
    @InProceedings{GruJurWim03, author = {J.~Gr{\"u}nbauer and J.~{J}{\"u}{r}jens and G.~Wimmel}, title = {Security Engineering -- A Survey}, booktitle = {Modellierung 2004}, year = {2004}, editor = {B. Rumpe and W. Hesse}, volume = {45}, series = {LNI}, organization = {German Computer Society (GI)}, DOI = {http://subs.emis.de/LNI/Proceedings/Proceedings45/article1309.html}, keywords = {nonEnglish, secureSoftwareEngineeringGeneral}, }
     BibTeX   DOI 
  • J. Jürjens: Logic for Security. In: Spring School "Logic in Computer Science", Venezia, Graduate School on Logic in Informatics, Munich, 2004.
    @InProceedings{lfs04, author = {J.~{J}{\"u}{r}jens}, title = {Logic for Security}, booktitle = {Spring School {"}Logic in Computer Science{"}}, year = {2004}, address = {Venezia}, organization = {Graduate School on Logic in Informatics, Munich}, keywords = {graduateSchoolLectures, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX 
  • J. Jürjens: Model-based Security Engineering with UML. In: FOSAD 2004, Bertinoro, 2004.
    @InProceedings{mbseuml04, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security Engineering with {UML}}, booktitle = {FOSAD 2004}, year = {2004}, address = {Bertinoro}, file = {audio 4/4:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/fosad04d.wav:URL;audio 3/4:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/fosad04c.wav:URL;audio 2/4:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/fosad04b.wav:URL;audio 1/4:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/fosad04a.wav:URL;slides 2/2:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials/fosad04handout2.pdf:URL;slides 1/2:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials/fosad04handout1.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX   audio 4/4   audio 3/4   audio 2/4   audio 1/4   slides 2/2   slides 1/2   dblp 
  • J. Jürjens: Modell-basierte Sicherheit: Sicheres Konfigurations- und Änderungsmanagement. In: Systems 2004 (Software Development & Architecture Forum), München, 2004. Invited talk.
    @InProceedings{mbsska04, author = {J.~{J}{\"u}{r}jens}, title = {Modell-basierte Sicherheit: Sicheres Konfigurations- und {{\"A}}nderungsmanagement}, booktitle = {Systems 2004 (Software Development \& Architecture Forum)}, year = {2004}, address = {M{\"u}nchen}, note = {Invited talk}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/systems04.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/systems04.pdf:URL}, keywords = {conferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   slides 
  • J. Jürjens: Model-based Security with UMLsec. In: UMLchina, 2004. Web-cast.
    @InProceedings{mbsumlsec04, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security with {UMLsec}}, booktitle = {UMLchina}, year = {2004}, note = {Web-cast}, file = {transcript:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials/umlchina_transcript.pdf:URL;slides:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials/umlchina04.pdf:URL}, keywords = {withIndustry, tutorial, secureSoftwareEngineeringUMLsecProfile}, URL = {http://www.umlchina.com/}, }
     BibTeX   URL   transcript   slides 
  • J. Jürjens: Model-driven engineering of dependable critical systems with UML. In: International Symposium on Software Reliability Engineering (ISSRE 2004), Saint-Malo, Bretagne, 2004. Tutorial.
    @InProceedings{mdedcs04, author = {J.~{J}{\"u}{r}jens}, title = {Model-driven engineering of dependable critical systems with {UML}}, booktitle = {International Symposium on Software Reliability Engineering (ISSRE 2004)}, year = {2004}, address = {Saint-Malo, Bretagne}, note = {Tutorial}, file = {announcement:http\://rgse.uni-koblenz.de/jj/csdumltut/History/issre04-ann.pdf:URL}, keywords = {atScientificConferences, tutorial, dependableSystems}, URL = {http://www.issre.org/2004/}, }
     BibTeX   URL   announcement 
  • Johannes Grünbauer, J. Jürjens, Guido Wimmel: Modelling Secure IT-Systems – A Survey. In: Modellierung 2004, Marburg, 2004.
    @InProceedings{msits04, author = {Johannes Gr{\"u}nbauer and J.~{J}{\"u}{r}jens and Guido Wimmel}, title = {Modelling Secure IT-Systems – A Survey}, booktitle = {Modellierung 2004}, year = {2004}, address = {Marburg}, file = {ps:http\://rgse.uni-koblenz.de/jj/publications/papers/short_mod2004.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringGeneral}, DOI = {http://subs.emis.de/LNI/Proceedings/Proceedings45/article1309.html}, URL = {http://www.gi-ev.de/}, }
     BibTeX   DOI   URL   ps   dblp 
  • R. Schmidt, J. Jürjens: Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem. In: Bernhard Rumpe, Wolfgang Hesse (editors): Modellierung 2004, Proceedings zur Tagung, 23.-26. März 2004, Marburg, Proceedings, GI, Marburg (Germany), LNI, vol. 45, pp. 309-310, German Computer Society (GI), 2004.
    @InProceedings{msus04, author = {R.~Schmidt and J.~{J}{\"u}{r}jens}, editor = {Bernhard Rumpe and Wolfgang Hesse}, title = {Modellbasierte Sicherheitsanalyse mit {UMLsec}: Ein biometrisches Zugangskontrollsystem}, booktitle = {Modellierung 2004, Proceedings zur Tagung, 23.-26. M{\"{a}}rz 2004, Marburg, Proceedings}, year = {2004}, pages = {309--310}, series = {{LNI}}, volume = {45}, publisher = {{GI}}, address = {Marburg (Germany)}, organization = {German Computer Society (GI)}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/praesentation.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {nonEnglish, secureSoftwareEngineeringUMLsecProfile}, URL = {http://www.gi.de/}, }
     BibTeX   URL   slides   dblp 
  • J. Jürjens: Playing the Devil's Advocate: Testing Real-Time Systems. In: Conference on Software Testing (ICSTEST-E 2004), Bilbao (Spain), 2004. Invited talk.
    @InProceedings{pdatrts04, author = {J.~{J}{\"u}{r}jens}, title = {Playing the Devil's Advocate: Testing Real-Time Systems}, booktitle = {Conference on Software Testing (ICSTEST-E 2004)}, year = {2004}, address = {Bilbao (Spain)}, note = {Invited talk}, file = {audio (spanish):http\://rgse.uni-koblenz.de/jj/publications/audio/icsteste04span.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/icstest04.pdf:URL}, keywords = {conferences, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX   audio (spanish)   slides 
  • J. Jürjens, S. H. Houmb: Risk-Driven Development of Security-Critical Systems using UMLsec. In: klu pp. 21-53 IFIP International Federation for Information Processing, 2004
    @InCollection{rsdscs04, author = {J.~{J}{\"u}{r}jens and S. H.~Houmb}, title = {Risk-Driven Development of Security-Critical Systems using {UMLsec}}, booktitle = {IFIP International Federation for Information Processing}, year = {2004}, volume = {157}, pages = {21--53}, publisher = {klu}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/wcc04JH.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/1-4020-8159-6_2:URL}, keywords = {contributedBookChapters, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX   preprint   dblp   SpringerLink 
  • J. Jürjens: Software Architectures for Safe and Secure Systems. In: 4th IEEE/IFIP Conference on Software Architecture (WICSA 2004), Oslo, Norway, Institute of Electrical and Electronics Engineers, 2004. Half-day tutorial.
    @InProceedings{sasss04, author = {J.~{J}{\"u}{r}jens}, title = {Software Architectures for Safe and Secure Systems}, booktitle = {4th IEEE/IFIP Conference on Software Architecture (WICSA 2004)}, year = {2004}, address = {Oslo, Norway}, organization = {Institute of Electrical and Electronics Engineers}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://wicsa4.cs.rug.nl/}, }
     BibTeX   URL 
  • Martin Deubler, Johannes Grünbauer, J. Jürjens, Guido Wimmel: Sound development of secure service-based systems.. In: Marco Aiello, Mikio Aoyama, Francisco Curbera, Mike P. Papazoglou (editors): 2nd International Conference on Service Oriented Computing (ICSOC 2004), ACM, pp. 115-124, 2004.
    @InProceedings{sdssbs04, author = {Martin Deubler and Johannes Gr{\"u}nbauer and J.~{J}{\"u}{r}jens and Guido Wimmel}, title = {Sound development of secure service-based systems.}, booktitle = {2nd International Conference on Service Oriented Computing (ICSOC 2004)}, year = {2004}, editor = {Marco Aiello and Mikio Aoyama and Francisco Curbera and Mike P. Papazoglou}, pages = {115--124}, publisher = {ACM}, DOI = {http://doi.org/10.1145/1035167.1035185}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icsoc04.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, ISBN = {1-58113-871-7}, keywords = {internationalConferences, secureSoftwareEngineeringSecureService/CloudBasedSystems}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens: Security Modeling with UMLsec. In: Workshop regarding Security in Information Systems (SISBD2004), Málaga (Spain), 2004.
    @InProceedings{smumlsec04, author = {J.~{J}{\"u}{r}jens}, title = {Security Modeling with {UMLsec}}, booktitle = {Workshop regarding Security in Information Systems (SISBD2004)}, year = {2004}, address = {M\'{a}laga (Spain)}, file = {audio (part 1/2):http\://rgse.uni-koblenz.de/jj/publications/audio/sisbd04a.wav:URL;audio (part 2/2):http\://rgse.uni-koblenz.de/jj/publications/audio/sisbd04b.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sisbd04-handout.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX   audio (part 1/2)   audio (part 2/2)   slides 
  • J. Jürjens: Standards and Processes for Modelbased Engineering of Safety- and Security-Critical Systems. In: 23rd International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2004), Springer Verlag, Potsdam (Germany), Lecture Notes in Computer Science, 2004. Full-day tutorial.
    @InProceedings{spme04, author = {J.~{J}{\"u}{r}jens}, title = {Standards and Processes for Modelbased Engineering of Safety- and Security-Critical Systems}, booktitle = {23rd International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2004)}, year = {2004}, series = {Lecture Notes in Computer Science}, address = {Potsdam (Germany)}, publisher = {Springer Verlag}, note = {Full-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Secure Software Architecture Description using UML. In: Workshop on Software Architecture Description & UML (SADUML2004), Lisbon (Portugal), 2004. Invited talk.
    @InProceedings{ssad04, author = {J.~{J}{\"u}{r}jens}, title = {Secure Software Architecture Description using {UML}}, booktitle = {Workshop on Software Architecture Description \& UML (SADUML2004)}, year = {2004}, address = {Lisbon (Portugal)}, note = {Invited talk}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/saduml04.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides 
  • J. Jürjens: Secure Software Engineering. In: ESG, Munich (Germany), 2004.
    @InProceedings{sse04, author = {J.~{J}{\"u}{r}jens}, title = {Secure Software Engineering}, booktitle = {ESG}, year = {2004}, address = {Munich (Germany)}, keywords = {withIndustry, tutorial, secureSoftwareEngineeringGeneral}, }
     BibTeX 
  • J. Jürjens: Security Software Engineering and Embedded Systems. In: Infineon, Munich (Germany), 2004.
    @InProceedings{ssees04, author = {J.~{J}{\"u}{r}jens}, title = {Security Software Engineering and Embedded Systems}, booktitle = {Infineon}, year = {2004}, address = {Munich (Germany)}, file = {audio 2/2:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/infineon04b.wav:URL;audio 1/2:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/infineon04a.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials/infineon04handout.pdf:URL}, keywords = {withIndustry, tutorial, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   audio 2/2   audio 1/2   slides 
  • J. Jürjens, P. Shabalin: Tools for Critical Systems Development with UML. In: N. Jardin Nunes, B. Selic, A. Silva, A. Toval (editors): UML Modeling Languages and Applications, \guillemotleftUML\guillemotright 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers, Springer Verlag, Lisbon, Portugal, Lecture Notes in Computer Science, vol. 3297, pp. 250-253, 2004. Revised Selected Papers.
    @InProceedings{tcsdu04, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Tools for {Critical Systems Development with UML}}, booktitle = {{UML} Modeling Languages and Applications, {\guillemotleft}UML{\guillemotright} 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers}, year = {2004}, editor = {N. {Jardin Nunes} and B. Selic and A. Silva and A. Toval}, pages = {250--253}, series = {Lecture Notes in Computer Science}, volume = {3297}, address = {Lisbon, Portugal}, publisher = {Springer Verlag}, note = {Revised Selected Papers}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/uml04tool.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007%2F978-3-540-31797-5_27:URL}, keywords = {internationalConferences, umlModelAnalysis}, url = {https://doi.org/10.1007/978-3-540-31797-5\_27}, doi = {10.1007/978-3-540-31797-5\_27}, }
     BibTeX   DOI   preprint   dblp   SpringerLink 
  • J. Jürjens, P. Shabalin: XML-based Analysis of UML Models for Critical Systems Development. In: IDEA Group Publishing Advances in UML and XML Based Software Evolution, 2004
    @InCollection{xmlba04, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {{XML}-based Analysis of {UML} Models for Critical Systems Development}, booktitle = {Advances in UML and XML Based Software Evolution}, year = {2004}, publisher = {IDEA Group Publishing}, DOI = {10.4018/978-1-59140-621-1.ch011}, file = {preprint:https://books.google.de/books?id=TS9bOJYS93oC&pg=PA259&lpg=PA259&dq=%22XML-based+Analysis+of+UML+Models+for+Critical+Systems+Development%22&source=bl&ots=v0kuJcpfY7&sig=BUd4sXIGEkczI0lktDKdWYS3ShY&hl=de&sa=X&ei=l1i5VK30AobkaICcgrAP&ved=0CDgQ6AEwAw#v=onepage&q=%22XML-based%20Analysis%20of%20UML%20Models%20for%20Critical%20Systems%20Development%22&f=false:URL}, keywords = {contributedBookChapters, umlModelAnalysis}, }
     BibTeX   DOI   preprint 

2003


  • Jan Jürjens: Bericht über die erste Jahrestagung der GI-Fachgruppe FoMSESS vom 12. bis 13. Mai 2003 in Karlsruhe. In: Softwaretechnik-Trends, vol. 23, no. 3, 2003.
    @article{DBLP:journals/stt/Jurjens03, author = {Jan J{\"{u}}rjens}, title = {Bericht {\"{u}}ber die erste Jahrestagung der GI-Fachgruppe FoMSESS vom 12. bis 13. Mai 2003 in Karlsruhe}, journal = {Softwaretechnik-Trends}, volume = {23}, number = {3}, year = {2003}, url = {http://pi.informatik.uni-siegen.de/stt/23\_3/09\_Konferenzberichte/FoMSESS.ps}, }
     BibTeX   URL 
  • S. Höhn, J. Jürjens: Automated Checking of SAP Security Permissions. In: 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), Kluwer, Lausanne, Switzerland, pp. 13-30, IFIP, 2003.
    @InProceedings{acssp03, author = {S.~H{\"o}hn and J.~{J}{\"u}{r}jens}, title = {Automated Checking of {SAP} Security Permissions}, booktitle = {6th Working Conference on Integrity and Internal Control in Information Systems (IICIS)}, year = {2003}, volume = {140}, pages = {13--30}, address = {Lausanne, Switzerland}, organization = {IFIP}, publisher = {Kluwer}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/iicis03.pdf:URL;paper (ps.gz):http\://rgse.uni-koblenz.de/jj/publications/papers/iicis03.ps.gz:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/1-4020-7901-X_2:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   paper (pdf)   paper (ps.gz)   dblp   SpringerLink 
  • J. Jürjens: Algebraic State Machines: Concepts and Applications to Security. In: M. Broy, A. Zamulin, Manfred Broy, Alexandre V. Zamulin (editors): Andrei Ershov 5th International Conference ``Perspectives of System Informatics'' (PSI 2003), Springer Verlag, Novosibirsk (Russia), Lecture Notes in Computer Science, vol. 2890, pp. 338-343, 2003.
    @InProceedings{asm03, author = {J.~{J}{\"u}{r}jens}, title = {Algebraic State Machines: Concepts and Applications to Security}, booktitle = {Andrei Ershov 5th International Conference ``Perspectives of System Informatics'' (PSI 2003)}, year = {2003}, editor = {M. Broy and A. Zamulin and Manfred Broy and Alexandre V. Zamulin}, volume = {2890}, series = {Lecture Notes in Computer Science}, pages = {338--343}, address = {Novosibirsk (Russia)}, publisher = {Springer Verlag}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/psi03.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/psi03talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/psi03.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/psi03.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-39866-0_33:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Romberg, J. Jürjens, G. Wimmel, O. Slotosch, G. Hahn: AUTOFOCUS and the MoDe Tool. In: Third International Conference on Application of Concurrency to System Design (ACSD), Guimaraes (Portugal), Institute of Electrical and Electronics Engineers, 2003.
    @InProceedings{automode03, author = {J.~Romberg and J.~{J}{\"u}{r}jens and G.~Wimmel and O.~Slotosch and G.~Hahn}, title = {AUTOFOCUS and the MoDe Tool}, booktitle = {Third International Conference on Application of Concurrency to System Design (ACSD)}, year = {2003}, address = {Guimaraes (Portugal)}, organization = {Institute of Electrical and Electronics Engineers}, file = {preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/rombergj_modetool.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, DOI = {http://doi.ieeecomputersociety.org/10.1109/CSD.2003.1207727}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   preprint   dblp 
  • J. Jürjens, J. Grünbauer: Critical Systems Development with UML: motive Case-study. In: 4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003), Lübeck (Germany), pp. 512-517, International Association for Computer and Information Science (ACIS), 2003.
    @InProceedings{csd03, author = {J.~{J}{\"u}{r}jens and J. Gr{\"u}nbauer}, title = {Critical Systems Development with {UML}: motive Case-study}, booktitle = {4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003)}, year = {2003}, pages = {512--517}, address = {L{\"u}beck (Germany)}, organization = {International Association for Computer and Information Science (ACIS)}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.5805}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/snpd03.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/snpd03.ps:URL;audio 2/2:http\://rgse.uni-koblenz.de/jj/publications/audio/snpd03b.wav:URL;audio 1/2:http\://rgse.uni-koblenz.de/jj/publications/audio/snpd03a.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/snpd03slides.pdf:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   paper (pdf)   paper (ps)   audio 2/2   audio 1/2   slides 
  • J. Jürjens: Critical Systems Development with UML. In: Forum on Design Languages (FDL 2003), Frankfurt, 2003. Half-day tutorial.
    @InProceedings{csduml03, author = {J.~{J}{\"u}{r}jens}, title = {Critical Systems Development with {UML}}, booktitle = {Forum on Design Languages (FDL 2003)}, year = {2003}, address = {Frankfurt}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, dependableSystems}, }
     BibTeX 
  • J. Jürjens, B. Rumpe, R. France, E. Fernandez (editors): Critical Systems Development with UML (CSDUML 2003), TU München Technical Report, no. TUM-I0317, 2003. UML 2003 satellite workshop proceedings.
    @Proceedings{csduml03a, title = {{Critical Systems Development with UML (CSDUML 2003)}}, year = {2003}, editor = {J.~{J}{\"u}{r}jens and B.~Rumpe and R.~France and E.~Fernandez}, number = {TUM-I0317}, series = {TU M{\"u}nchen Technical Report}, note = {UML 2003 satellite workshop proceedings}, booktitle = {Critical Systems Development with UML (CSDUML 2003)}, keywords = {procs, dependableSystems}, }
     BibTeX 
  • J. Jürjens: Critical Systems Development with UML. In: International Conference on Software Engineering (SE 2003), Innsbruck, Austria, IASTED, 2003. Part of 21st IASTED International Multi-Conference APPLIED INFORMATICS (AI 2003). Half-day tutorial.
    @InProceedings{csduml03b, author = {J.~{J}{\"u}{r}jens}, title = {{Critical Systems Development with UML}}, booktitle = {International Conference on Software Engineering (SE 2003)}, year = {2003}, address = {Innsbruck, Austria}, organization = {IASTED}, note = {Part of 21st IASTED International Multi-Conference APPLIED INFORMATICS (AI 2003). Half-day tutorial}, keywords = {atScientificConferences, tutorial, dependableSystems}, }
     BibTeX 
  • J. Jürjens, J. Grünbauer: Critical Systems Development with UML-light. In: 18th International Conference on Automated Software Engineering (ASE 2003), Montreal, Canada, Institute of Electrical and Electronics Engineers, 2003. Half-day tutorial.
    @InProceedings{csdumll03, author = {J.~{J}{\"u}{r}jens and J.~Gr{\"u}nbauer}, title = {Critical Systems Development with {UML}-light}, booktitle = {18th International Conference on Automated Software Engineering (ASE 2003)}, year = {2003}, address = {Montreal, Canada}, organization = {Institute of Electrical and Electronics Engineers}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, dependableSystems}, URL = {http://ase2012.paluno.uni-due.de/}, }
     BibTeX   URL 
  • J. Jürjens: Critical Systems Development with UML and Model-based Testing. In: The 22st International Conference on Computer Safety, Reliability and Security (SAFECOMP 2003), Edinburgh, 2003. Full-day tutorial.
    @InProceedings{csdumlmbt03, author = {J.~{J}{\"u}{r}jens}, title = {Critical Systems Development with {UML} and Model-based Testing}, booktitle = {The 22st International Conference on Computer Safety, Reliability and Security (SAFECOMP 2003)}, year = {2003}, address = {Edinburgh}, note = {Full-day tutorial}, file = {audio 5/5:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/safecomp03e.wav:URL;audio 4/5:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/safecomp03d.wav:URL;audio 3/5:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/safecomp03c.wav:URL;audio 2/5:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/safecomp03b.wav:URL;announcement:http\://rgse.uni-koblenz.de/jj/csdumltut/History/safecomp03_announce.pdf:URL;audio 1/5:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/safecomp03a.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials/safecomp03-01.pdf:URL}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX   audio 5/5   audio 4/5   audio 3/5   audio 2/5   announcement   audio 1/5   slides 
  • J. Jürjens: Critical Systems Development with UML: Methods and Tools. In: 4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003), Lübeck, Germany, International Association for Computer and Information Science (ACIS), 2003. Half-day tutorial.
    @InProceedings{csdumlmt03, author = {J.~{J}{\"u}{r}jens}, title = {Critical Systems Development with {UML}: Methods and Tools}, booktitle = {4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003)}, year = {2003}, address = {L{\"u}beck, Germany}, organization = {International Association for Computer and Information Science (ACIS)}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://www.isp.uni-luebeck.de/snpd03/index.htm}, }
     BibTeX   URL 
  • Gerd Beneken, Ulrike Hammerschall, Manfred Broy, Maria Victoria Cengarle, J. Jürjens, Bernhard Rumpe, Maurce Schoenmakers: Componentware – State of the Art 2003. In: Understanding Components Workshop of the CUE Initiative, Venice, 2003.
    @InProceedings{csota03, author = {Gerd~Beneken and Ulrike Hammerschall and Manfred Broy and Maria Victoria Cengarle and J.~{J}{\"u}{r}jens and Bernhard Rumpe and Maurce Schoenmakers}, title = {Componentware – State of the Art 2003}, booktitle = {Understanding Components Workshop of the CUE Initiative}, year = {2003}, address = {Venice}, keywords = {workshop, industrialConferences,dependableSystems, componentBasedSystems}, }
     BibTeX 
  • J. Jürjens: Critical Systems Development with UML: Methods and Tools. In: International Conference on Circuits, Signals and Systems (CSS-2003), 2003. Half-day tutorial.
    @InProceedings{css03J, author = {J.~{J}{\"u}{r}jens}, title = {Critical Systems Development with {UML}: Methods and Tools}, booktitle = {International Conference on Circuits, Signals and Systems (CSS-2003)}, year = {2003}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens, P. Shabalin: Developing Critical Information Systems with UML: Concepts and Tool-support. In: M. Godlevsky, S. W.Liddle , H. C.Mayr (editors): 2nd International Conference on Information System Technology and its Applications (ISTA 2003), GI, Kharkiv, LNI, vol. 30, 2003. Half-day tutorial.
    @InProceedings{dcisuml03, author = {J.~{J}{\"u}{r}jens and P.~Shabalin}, title = {Developing Critical Information Systems with {UML}: Concepts and Tool-support}, booktitle = {2nd International Conference on Information System Technology and its Applications (ISTA 2003)}, year = {2003}, editor = {M. Godlevsky and {S.\,W.} Liddle and {H.\,C.} Mayr}, volume = {30}, series = {LNI}, address = {Kharkiv}, publisher = {GI}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://www.ifi.uni-klu.ac.at/Conferences/ISTA2003}, }
     BibTeX   URL 
  • J. Jürjens: Developing Security-Critical Distributed Systems with UML: Methods and Tools. In: 6th International Conference on Formal Methods for Open Object-based Distributed Systems, Paris (France), IFIP, 2003. Half-day tutorial.
    @InProceedings{dscds03, author = {J.~{J}{\"u}{r}jens}, title = {Developing Security-Critical Distributed Systems with {UML}: Methods and Tools}, booktitle = {6th International Conference on Formal Methods for Open Object-based Distributed Systems}, year = {2003}, address = {Paris (France)}, organization = {IFIP}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, URL = {http://fedconf.enst.fr/}, }
     BibTeX   URL 
  • J. Jürjens: Developing safety-critical systems with UML. In: P. Stevens (editors): The Unified Modeling Language (UML 2003), Springer Verlag, San Francisco, CA, Lecture Notes in Computer Science, vol. 2863, pp. 360-372, 2003. 6th International Conference.
    @InProceedings{dscs03, author = {J.~{J}{\"u}{r}jens}, title = {Developing safety-critical systems with {UML}}, booktitle = {The Unified Modeling Language (UML 2003)}, year = {2003}, editor = {P. Stevens}, volume = {2863}, series = {Lecture Notes in Computer Science}, pages = {360--372}, address = {San Francisco, CA}, publisher = {Springer Verlag}, note = {6th International Conference}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/uml03.wav:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/uml03.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/uml03.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-45221-8_31:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   audio   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens, S. H. Houmb: Development of Safety-Critical Systems and Model-Based Risk Analysis with UML. In: Dependable Computing, Springer Verlag, São Paulo (Brazil), Lecture Notes in Computer Science, vol. 2847, pp. 364-365, 2003.
    @InProceedings{dscsmbra03, author = {J.~{J}{\"u}{r}jens and S. H.~Houmb}, title = {Development of Safety-Critical Systems and Model-Based Risk Analysis with {UML}}, booktitle = {Dependable Computing}, year = {2003}, volume = {2847}, series = {Lecture Notes in Computer Science}, pages = {364--365}, address = {S\~{a}o Paulo (Brazil)}, file = {dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-45214-0_28:URL}, publisher = {Springer Verlag}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   dblp   SpringerLink 
  • J. Jürjens: Developing Secure Enterprise Applications with UML. In: Fourth Workshop on UML for Enterprise Applications, Burlingame, California, OMG, 2003. Half-day tutorial.
    @InProceedings{dseau03, author = {J.~{J}{\"u}{r}jens}, title = {Developing Secure Enterprise Applications with {UML}}, booktitle = {Fourth Workshop on UML for Enterprise Applications}, year = {2003}, address = {Burlingame, California}, organization = {OMG}, note = {Half-day tutorial}, keywords = {withIndustry, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens, T. Kuhn: Developing Secure and Mobile Web-based Applications with UML: Concepts and Tools. In: WWW/Internet 2003, Algarve (Portugal), 2003.
    @InProceedings{dsmwba03, author = {J.~{J}{\"u}{r}jens and T.~Kuhn}, title = {Developing Secure and Mobile Web-based Applications with {UML}: Concepts and Tools}, booktitle = {WWW/Internet 2003}, year = {2003}, address = {Algarve (Portugal)}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • S. H. Houmb, J. Jürjens: Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec. In: 10th Asia-Pacific Software Engineering Conference (APSEC 2003), Chiangmai (Thailand), pp. 488ff, Institute of Electrical and Electronics Engineers, 2003.
    @InProceedings{dsnwbs03, author = {S. H.~Houmb and J.~{J}{\"u}{r}jens}, title = {Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and {UMLsec}}, booktitle = {10th Asia-Pacific Software Engineering Conference (APSEC 2003)}, year = {2003}, pages = {488ff}, address = {Chiangmai (Thailand)}, organization = {Institute of Electrical and Electronics Engineers}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/APSEC_2003_MBRA_UMLsec_final.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/apsec03siv.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringITSecurityRiskAssessment}, }
     BibTeX   slides   preprint   dblp 
  • J. Jürjens: Developing Safety- and Security-critical Systems with UML. In: DARP workshop, Loughborough, 2003. Invited talk.
    @InProceedings{dsscs03, author = {J.~{J}{\"u}{r}jens}, title = {Developing Safety- and Security-critical Systems with {UML}}, booktitle = {DARP workshop}, year = {2003}, address = {Loughborough}, note = {Invited talk}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/darp03.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/darp03.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   slides 
  • J. Jürjens: Formal Development of Critical Systems with UML. In: IFIP International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2003), Berlin, IFIP, 2003. Half-day tutorial.
    @InProceedings{fdcsu03, author = {J.~{J}{\"u}{r}jens}, title = {Formal Development of Critical Systems with {UML}}, booktitle = {IFIP International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2003)}, year = {2003}, address = {Berlin}, organization = {IFIP}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Formal Development of Critical Systems with UML. In: ETAPS 2003 -- European joint conferences on Theory And Practice of Software 2003, Warsaw, Poland, 2003. Half-day tutorial.
    @InProceedings{fdcsuml03, author = {J.~{J}{\"u}{r}jens}, title = {Formal Development of Critical Systems with {UML}}, booktitle = {ETAPS 2003 -- European joint conferences on Theory And Practice of Software 2003}, year = {2003}, address = {Warsaw, Poland}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: Formal Development of Critical Systems with UML: Methods and Tools. In: FM 2003 -- 12th International Formal Methods Europe Symposium, Pisa, Italy, 2003. Half-day tutorial.
    @InProceedings{fdcsumt03, author = {J.~{J}{\"u}{r}jens}, title = {Formal Development of Critical Systems with {UML}: Methods and Tools}, booktitle = {FM 2003 -- 12th International Formal Methods Europe Symposium}, year = {2003}, address = {Pisa, Italy}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: IT-Sicherheits- und Risikoanalyse von Geschäftsprozessen. In: Infotage, Starnberger See, 2003. Tutorial.
    @InProceedings{infotage03aJ, author = {J.~{J}{\"u}{r}jens}, title = {IT-Sicherheits- und Risikoanalyse von Gesch{\"a}ftsprozessen}, booktitle = {Infotage}, year = {2003}, address = {Starnberger See}, note = {Tutorial}, keywords = {withIndustry, tutorial, secureSoftwareEngineeringITSecurityRiskAssessment}, }
     BibTeX 
  • J. Jürjens: IT-Security and Risk-Analysis for Business Processes. In: Infotage, Starnberger See, 2003. FJLang Security Consulting.
    @InProceedings{itsrabp03, author = {J.~{J}{\"u}{r}jens}, title = {IT-Security and Risk-Analysis for Business Processes}, booktitle = {Infotage}, year = {2003}, address = {Starnberger See}, note = {FJLang Security Consulting}, keywords = {withIndustry, tutorial, secureSoftwareEngineeringITSecurityRiskAssessment}, }
     BibTeX 
  • R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, G. Wimmel, V. Lotz: Key Issues of a Formally Based Process Model for Security Engineering. In: Sixteenth International Conference "Software & Systems Engineering & their Applications", Paris, 2003.
    @InProceedings{kifbpmse03, author = {R.~Breu and K.~Burger and M.~Hafner and J.~{J}{\"u}{r}jens and G.~Popp and G.~Wimmel and V.~Lotz}, title = {Key Issues of a Formally Based Process Model for Security Engineering}, booktitle = {Sixteenth International Conference {"}Software \& Systems Engineering \& their Applications{"}}, year = {2003}, address = {Paris}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5457}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ICSSEA2003v6.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/icssea03BBHJPWL.ps:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, address = {Paris}, }
     BibTeX   DOI   slides   preprint 
  • J. Jürjens: Model-based Security with UMLsec. In: UML Forum Tokyo, 2003. Invited talk.
    @InProceedings{mbsumlsec03, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Security with {UMLsec}}, booktitle = {UML Forum Tokyo}, year = {2003}, note = {Invited talk}, file = {audio (japanese part 1/2):http\://rgse.uni-koblenz.de/jj/publications/audio/umlforum03jap1.wav:URL;audio (japanese part 2/2):http\://rgse.uni-koblenz.de/jj/publications/audio/umlforum03jap2.wav:URL;audio (english):http\://rgse.uni-koblenz.de/jj/publications/audio/umlforum03eng.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/UMLF03.pdf:URL}, keywords = {conferences, secureSoftwareEngineeringUMLsecProfile}, URL = {http://www.otij.org/event/umlforum/2003/conference/#sec02}, }
     BibTeX   URL   audio (japanese part 1/2)   audio (japanese part 2/2)   audio (english)   slides 
  • J. Jürjens: Model-based Testing of Embedded Systems with UML. In: Conference on Software Testing (ICSTEST-E), Bilbao (Spain), 2003. Half-day tutorial.
    @InProceedings{mbtesu03, author = {J.~{J}{\"u}{r}jens}, title = {Model-based Testing of Embedded Systems with {UML}}, booktitle = {Conference on Software Testing (ICSTEST-E)}, year = {2003}, address = {Bilbao (Spain)}, note = {Half-day tutorial}, keywords = {withIndustry, tutorial, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX 
  • J. Jürjens: Methoden der Entwicklung sicherer Systeme. In: GI Teiltagung Sicherheit- Schutz und Zuverlässigkeit, Frankfurt, 2003. Half-day tutorial.
    @InProceedings{mess03, author = {J.~{J}{\"u}{r}jens}, title = {Methoden der Entwicklung sicherer Systeme}, booktitle = {GI Teiltagung Sicherheit- Schutz und Zuverl{\"a}ssigkeit}, year = {2003}, address = {Frankfurt}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringGeneral}, }
     BibTeX 
  • J. Jürjens: Modelling for IT-Security- and Risk-Analysis. In: Infotage, Starnberger See, 2003. FJLang Security Consultin.
    @InProceedings{mitsra03, author = {J.~{J}{\"u}{r}jens}, title = {Modelling for IT-Security- and Risk-Analysis}, booktitle = {Infotage}, year = {2003}, address = {Starnberger See}, note = {FJLang Security Consultin}, file = {audio:http\://rgse.uni-koblenz.de/jj/csdumltut/audio/InfotageNov03.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/csdumltut/tutorials/infotageNov03.pdf:URL}, keywords = {withIndustry, tutorial, secureSoftwareEngineeringITSecurityRiskAssessment}, }
     BibTeX   audio   slides 
  • J. Grünbauer, H. Hollmann, J. Jürjens, G. Wimmel: Modelling and Verification of Layered Security Protocols: A Bank Application. In: Computer Safety, Reliability, and Security (SAFECOMP 2003), Springer Verlag, Edinburgh, Lecture Notes in Computer Science, vol. 2788, pp. 116-129, 2003.
    @InProceedings{mvlsp03, author = {J.~Gr{\"u}nbauer and H.~Hollmann and J.~{J}{\"u}{r}jens and G.~Wimmel}, title = {Modelling and Verification of Layered Security Protocols: A Bank Application}, booktitle = {Computer Safety, Reliability, and Security (SAFECOMP 2003)}, year = {2003}, volume = {2788}, series = {Lecture Notes in Computer Science}, pages = {116--129}, address = {Edinburgh}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.4724}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/safecomp03GHJWtalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/safecomp03GHJW.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/safecomp03GHJW.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-540-39878-3_10:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • G. Popp, J. Jürjens, G. Wimmel, R. Breu: Security-Critical System Development with Extended Use Cases. In: 10th Asia-Pacific Software Engineering Conference (APSEC 2003), Chiangmai (Thailand), pp. 478-487, Institute of Electrical and Electronics Engineers, 2003.
    @InProceedings{scsdeuc03, author = {G.~Popp and J.~{J}{\"u}{r}jens and G.~Wimmel and R.~Breu}, title = {Security-Critical System Development with Extended Use Cases}, booktitle = {10th Asia-Pacific Software Engineering Conference (APSEC 2003)}, year = {2003}, pages = {478--487}, address = {Chiangmai (Thailand)}, organization = {Institute of Electrical and Electronics Engineers}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.9698}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/apsec03.pdf:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/apsec03.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   slides   preprint   dblp 
  • J. Jürjens, G. Popp, G. Wimmel: Use Case Oriented Development of Security-Critical Systems. In: OMG Workshop on Distributed Objects and Components Security (DOCsec 2003), Baltimore (USA), pp. April, Object Management Group (OMG), 2003. Also appeared in Information Security Bulletin 8:51--56, 2003.
    @InProceedings{ucodscs03, author = {J.~{J}{\"u}{r}jens and G.~Popp and G.~Wimmel}, title = {Use Case Oriented Development of Security-Critical Systems}, booktitle = {OMG Workshop on Distributed Objects and Components Security (DOCsec 2003)}, year = {2003}, pages = {April}, address = {Baltimore (USA)}, organization = {Object Management Group (OMG)}, note = {Also appeared in \emph{Information Security Bulletin} 8:51--56, 2003}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/omg03_slides.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/omg03.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/omg03.ps:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringAspectOrientedSecurity}, address = {Baltimore (USA)}, }
     BibTeX   slides   paper (pdf)   paper (ps) 
  • J. Jürjens, T. Kuhn: Mobile Web-based Applications with UML: Concepts and Tools. In: International Conference WWW/Internet 2003, International Association for Development of the Information Society (IADIS), 2003. Half-day tutorial.
    @InProceedings{wwwinternet03J, author = {J.~{J}{\"u}{r}jens and T.~Kuhn}, title = {Mobile Web-based Applications with {UML}: Concepts and Tools}, booktitle = {International Conference WWW/Internet 2003}, year = {2003}, organization = {International Association for Development of the Information Society (IADIS)}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens, L. Buda: Entwurfsprinzipien und Entwurfsmuster für sichere Systeme. In: IT-Audit, Sep. 2003, , 2003.
    @InProceedings{itaudit03JB, author = {J.~{J}{\"{u}}{r}jens and L.~Buda}, title = {Entwurfsprinzipien und Entwurfsmuster f\"ur sichere Systeme}, booktitle ={IT-Audit, Sep.~2003}, year = {2003}, organization = {}, }
     BibTeX 

2002


  • E. B. Fernandez, J. Jürjens: A Holistic View of Secure Systems Development: Using Patterns and UML. In: 17th International Conference on Information Security (SEC 2002), Cairo, International Federation for Information Processing (IFIP), 2002. Half-day tutorial.
    @InProceedings{ahvssd02, author = {E. B.~Fernandez and J.~{J}{\"u}{r}jens}, title = {A Holistic View of Secure Systems Development: Using Patterns and {UML}}, booktitle = {17th International Conference on Information Security (SEC 2002)}, year = {2002}, address = {Cairo}, organization = {International Federation for Information Processing (IFIP)}, note = {Half-day tutorial}, keywords = {atScientificConferences, tutorial, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX 
  • J. Jürjens: A UML statecharts semantics with message-passing. In: G. B.Lamont , H. Haddad, G. Papadopoulos, B. Panda (editors): Proceedings of the 2002 Symposium of Applied Computing (SAC), ACM Press, Madrid, Spain, pp. 1009-1013, ACM, 2002. Proceedings of the 2002 ACM Symposium of Applied Computing.
    @InProceedings{auss02, author = {J.~{J}{\"u}{r}jens}, title = {A {UML} statecharts semantics with message-passing}, booktitle = {Proceedings of the 2002 Symposium of Applied Computing (SAC)}, year = {2002}, editor = {{G. B.} Lamont and H. Haddad and G. Papadopoulos and B. Panda}, pages = {1009--1013}, address = {Madrid, Spain}, organization = {ACM}, publisher = {ACM Press}, note = {Proceedings of the 2002 ACM Symposium of Applied Computing}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.3196}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/sac02.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2Talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft2.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, umlModelAnalysis, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   audio   slides   paper (pdf)   paper (ps)   dblp 
  • J. Jürjens, V. Cengarle, E. B. Fernandez, B. Rumpe, R. Sandner (editors): Critical Systems Development with UML (CSDUML 2002), TU München Technical Report TUM-I0208, no. TUM-I0208, 2002. UML 2002 satellite workshop proceedings.
    @Proceedings{csduml02a, title = {{Critical Systems Development with UML (CSDUML 2002)}}, year = {2002}, editor = {J.~{J}{\"u}{r}jens and V.~Cengarle and E. B.~Fernandez and B.~Rumpe and R.~Sandner}, number = {TUM-I0208}, series = {TU M{\"u}nchen Technical Report TUM-I0208}, note = {UML 2002 satellite workshop proceedings}, booktitle = {Critical Systems Development with UML (CSDUML 2002)}, keywords = {procs, dependableSystems}, }
     BibTeX 
  • J. Jürjens: Critical Systems Development with UML. In: Forum on Design Languages (FDL 2002), Marseille, European Electronic Chips & Systems design Initiative (ECSI), 2002. Invited talk.
    @InProceedings{csduml02b, author = {J.~{J}{\"u}{r}jens}, title = {Critical Systems Development with {UML}}, booktitle = {Forum on Design Languages (FDL 2002)}, year = {2002}, address = {Marseille}, organization = {European Electronic Chips \& Systems design Initiative (ECSI)}, note = {Invited talk}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/fdl02.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fdl.pdf:URL}, keywords = {conferences, dependableSystems}, }
     BibTeX   audio   slides 
  • J. Jürjens: Critical Systems Development with UML. In: SAFECOMP 2002 -- The 21st International Conference on Computer Safety, Reliability and Security, Catania, Italy, EWICS TC7, 2002. Half-day tutorial.
    @InProceedings{csduml02c, author = {J.~{J}{\"u}{r}jens}, title = {{Critical Systems Development with UML}}, booktitle = {SAFECOMP 2002 -- The 21st International Conference on Computer Safety, Reliability and Security}, year = {2002}, address = {Catania, Italy}, organization = {EWICS TC7}, note = {Half-day tutorial}, keywords = {tutorial, dependableSystems}, }
     BibTeX 
  • J. Jürjens, G. Popp, G. Wimmel: Towards Using Security Patterns in Model-based System Development. In: 7th European Conference on Pattern Languages of Programs (EuroPLoP 2002), Kloster Irsee, 2002. Security Focus Group.
    @InProceedings{europlop02J, author = {J.~{J}{\"u}{r}jens and G.~Popp and G.~Wimmel}, title = {Towards Using Security Patterns in Model-based System Development}, booktitle = {7th European Conference on Pattern Languages of Programs (EuroPLoP 2002)}, year = {2002}, address = {Kloster Irsee}, note = {Security Focus Group}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.8894}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/europlop02.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/europlop02.ps:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   paper (pdf)   paper (ps) 
  • J. Jürjens: Formal Semantics for Interacting UML subsystems. In: B. Jacobs, A. Rensink, Bart Jacobs, Arend Rensink (editors): 5th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002), Kluwer, Twente, pp. 29-44, ifip, 2002.
    @InProceedings{fsius02, author = {J.~{J}{\"u}{r}jens}, title = {Formal Semantics for Interacting {UML} subsystems}, booktitle = {5th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002)}, year = {2002}, editor = {B. Jacobs and A. Rensink and Bart Jacobs and Arend Rensink}, pages = {29--44}, volume = {81}, address = {Twente}, organization = {ifip}, publisher = {Kluwer}, file = {audio (MS outlook):http\://rgse.uni-koblenz.de/jj/publications/audio/fmoods02.msg:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fmoods02Talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/fmoods02.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/fmoods02.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007%2F978-0-387-35496-5_4:URL}, keywords = {internationalConferences, umlModelAnalysis}, }
     BibTeX   audio (MS outlook)   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Games in the Semantics of Programming Languages. In: Journal Synthese, vol. 133, no. 1-2, pp. 131-158, 2002.
    @Article{gspl02, author = {J.~{J}{\"u}{r}jens}, title = {Games in the Semantics of Programming Languages}, journal = {Journal Synthese}, year = {2002}, volume = {133}, number = {1-2}, pages = {131--158}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.69}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/gamesrevd.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/gamesrevd.ps:URL;paper (gz):http\://rgse.uni-koblenz.de/jj/publications/papers/gamesrevd.ps.gz:URL;SpringerLink:http://link.springer.com/article/10.1023/A%3A1020883810034:URL}, keywords = {programmingLanguageSemantics, codeAnalysis}, URL = {http://www.wkap.nl/journalhome.htm/0039-7857}, }
     BibTeX   DOI   URL   paper (pdf)   paper (ps)   paper (gz)   SpringerLink 
  • J. Jürjens: Methodische Entwicklung sicherer CORBA-Anwendungen. In: P. Horster, Patrick Horster (editors): Enterprise Security, IT-Verlag, Sauerlach, Paderborn (Germany), GI-Fachgruppe 2.5.3 Verlässliche IT-Systeme et al., 2002.
    @InProceedings{mesca02, author = {J.~{J}{\"u}{r}jens}, title = {Methodische Entwicklung sicherer CORBA-Anwendungen}, booktitle = {Enterprise Security}, year = {2002}, editor = {P. Horster and Patrick Horster}, address = {Paderborn (Germany)}, organization = {GI-Fachgruppe 2.5.3 Verl{\"a}ssliche IT-Systeme et al.}, publisher = {IT-Verlag, Sauerlach}, file = {audio (MS Outlook):http\://rgse.uni-koblenz.de/jj/publications/audio/eps02.msg:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/eps02Talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/eps02.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/eps02.ps:URL}, ISBN = {3-9360-52-03-4}, keywords = {nonEnglish, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio (MS Outlook)   slides   paper (pdf)   paper (ps) 
  • J. Jürjens: Principles for Secure Systems Design Oxford University Computing Laboratory, 2002 (PhD-Thesis).
    @PhdThesis{Jur02, author = {J.~{J}{\"u}{r}jens}, title = {Principles for Secure Systems Design}, school = {Oxford University Computing Laboratory}, year = {2002}, type = {Thesis for Doctor in Philosophy in Computing Science}, address = {University of Oxford}, file = {thesis:http\://rgse.uni-koblenz.de/web/pages/people/juerjens/publications/papers/Jur02.pdf:URL}, keywords = {thesis, secureSoftwareEngineeringGeneral}, }
     BibTeX   thesis 
  • G. Wimmel, J. Jürjens: Specification-based Test Generation for Security-Critical Systems Using Mutations. In: International Conference on Formal Engineering Methods (ICFEM), Springer Verlag, Shanghai (China), Lecture Notes in Computer Science, vol. 2495, pp. 471-482, 2002.
    @InProceedings{sbtgscsum02, author = {G.~Wimmel and J.~{J}{\"u}{r}jens}, title = {Specification-based Test Generation for Security-Critical Systems Using Mutations}, booktitle = {International Conference on Formal Engineering Methods (ICFEM)}, year = {2002}, volume = {2495}, series = {Lecture Notes in Computer Science}, pages = {471--482}, address = {Shanghai (China)}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.724}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/icfem02.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/icfem02.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-36103-0_48:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX   DOI   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Secure Systems Development with UML - Applications to Telemedicine. In: CORAS Public Workshop, Regensburg, 2002. International Conference on Telemedicine (ICT 2002). Invited talk.
    @InProceedings{smunl02, author = {J.~{J}{\"u}{r}jens}, title = {Secure Systems Development with {UML} -- Applications to Telemedicine}, booktitle = {CORAS Public Workshop}, year = {2002}, address = {Regensburg}, note = {International Conference on Telemedicine (ICT 2002). Invited talk}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/coras02.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/UMLsecTelemed.pdf:URL}, keywords = {workshop, invitedWorkshop, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   audio   slides 
  • J. Jürjens: UMLsec - Presenting the Profile. In: 6th Annual Workshop on Distributed Objects and Components Security (DOCsec 2002), Baltimore, Maryland, Object Management Group (OMG), 2002. Half-day tutorial.
    @InProceedings{umlsec02, author = {J.~{J}{\"u}{r}jens}, title = {U{MLsec} -- Presenting the Profile}, booktitle = {6th Annual Workshop on Distributed Objects and Components Security (DOCsec 2002)}, year = {2002}, address = {Baltimore, Maryland}, organization = {Object Management Group (OMG)}, note = {Half-day tutorial}, keywords = {withIndustry, tutorial, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX 
  • J. Jürjens: UMLsec: Extending UML for Secure Systems Development. In: 5th International Conference on the Unified Modeling Language (UML 2002), Springer Verlag, Lecture Notes in Computer Science, vol. 2460, pp. 412-425, 2002. 10 years most influential paper award at Models 2012.
    @InProceedings{uml02J, author = {J.~{J}{\"u}{r}jens}, title = {{UMLsec}: Extending {UML} for Secure Systems Development}, booktitle = {5th International Conference on the Unified Modeling Language (UML 2002)}, year = {2002}, volume = {2460}, series = {Lecture Notes in Computer Science}, pages = {412--425}, publisher = {Springer Verlag}, note = {10 years most influential paper award at Models 2012}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/uml02talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/uml02.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/uml02.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45800-X_32:URL}, keywords = {internationalConferences, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Using UMLsec and Goal-Trees for Secure Systems Development. In: G. B.Lamont , H. Haddad, G. Papadopoulos, B. Panda (editors): Proceedings of the 2002 Symposium of Applied Computing (SAC), ACM, Madrid, Spain, pp. 1026-1031, 2002. Proceedings of the 2002 ACM Symposium of Applied Computing.
    @InProceedings{uusgtssd02, author = {J.~{J}{\"u}{r}jens}, title = {Using {UMLsec} and Goal-Trees for Secure Systems Development}, booktitle = {Proceedings of the 2002 Symposium of Applied Computing (SAC)}, year = {2002}, editor = {{G. B.} Lamont and H. Haddad and G. Papadopoulos and B. Panda}, pages = {1026--1031}, address = {Madrid, Spain}, publisher = {ACM}, note = {Proceedings of the 2002 ACM Symposium of Applied Computing}, DOI = {10.1145/508791.508990}, file = {audio:http\://rgse.uni-koblenz.de/jj/publications/audio/sac02ii.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/sac02softTalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/sac02soft.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   audio   slides   paper (pdf)   paper (ps)   dblp 

2001


  • J. Jürjens: Abstracting from Failure Probabilities. In: Second International Conference on Application of Concurrency to System Design (ACSD 2001), Institute of Electrical and Electronics Engineers, Newcastle, pp. 53-64, 2001.
    @InProceedings{afp01, author = {J.~{J}{\"u}{r}jens}, title = {Abstracting from Failure Probabilities}, booktitle = {Second International Conference on Application of Concurrency to System Design (ACSD 2001)}, year = {2001}, pages = {53--64}, address = {Newcastle}, publisher = {Institute of Electrical and Electronics Engineers}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.6032}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/J00hSli.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/J00hWeb.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/J00hWeb.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, dependableSystems}, }
     BibTeX   DOI   slides   paper (pdf)   paper (ps)   dblp 
  • J. Jürjens: Composability of Secrecy. In: V. Gorodetski, V. Skormin, L. Popyack (editors): International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2001), Springer Verlag, St. Petersburg (Russia), Lecture Notes in Computer Science, vol. 2052, pp. 28-38, 2001.
    @InProceedings{cs01, author = {J.~{J}{\"u}{r}jens}, title = {Composability of Secrecy}, booktitle = {International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2001)}, year = {2001}, editor = {V. Gorodetski and V. Skormin and L. Popyack}, volume = {2052}, series = {Lecture Notes in Computer Science}, pages = {28--38}, address = {St. Petersburg (Russia)}, publisher = {Springer Verlag}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/J01cSli.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/J01cWeb.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/J01cWeb.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45116-1_6:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, summary = {Gives notion of secrecy preserved under composition and refinement and results on modular verification}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Developing Secure Systems with UMLsec - From Business Processes to Implementation. In: D. Fox, M. Köhntopp, A. Pfitzmann (editors): Verläßliche IT-Systeme 2001 (VIS 2001), Vieweg-Verlag, Kiel (Germany), DuD-Fachbeiträge, 2001.
    @InProceedings{dssus01, author = {J.~{J}{\"u}{r}jens}, title = {Developing Secure Systems with {UMLsec} -- From Business Processes to Implementation}, booktitle = {Verl{\"a}{\ss}liche IT-Systeme 2001 (VIS 2001)}, year = {2001}, editor = {D. Fox and M. K{\"o}hntopp and A. Pfitzmann}, series = {DuD-Fachbeitr{\"a}ge}, address = {Kiel (Germany)}, publisher = {Vieweg-Verlag}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/vistalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/vis01.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/vis01.ps:URL;SpringerLink:http://link.springer.com/chapter/10.1007/978-3-663-05918-9_11:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringUMLsecProfile}, address = {Kiel (Germany)}, }
     BibTeX   slides   paper (pdf)   paper (ps)   SpringerLink 
  • J. Jürjens: Encapsulating Rules of Prudent Security Engineering. In: B. Christianson, B. Crispo, J. A.Malcolm , M. Roe (editors): International Workshop on Security Protocols, Springer Verlag, Cambridge, Lecture Notes in Computer Science, vol. 2467, pp. 95-101, 2001. 9th International Workshop. Transcript of discussion on pages 102--106.
    @InProceedings{erpse01, author = {J.~{J}{\"u}{r}jens}, title = {Encapsulating Rules of Prudent Security Engineering}, booktitle = {International Workshop on Security Protocols}, year = {2001}, editor = {B. Christianson and B. Crispo and {J. A.} Malcolm and M. Roe}, volume = {2467}, series = {Lecture Notes in Computer Science}, pages = {95--101}, address = {Cambridge}, publisher = {Springer Verlag}, note = {9th International Workshop. Transcript of discussion on pages 102--106}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/iwtalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/IWSecP01.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/IWSecP01.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45807-7_15:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Formal Development and Verification of Security-Critical Systems with UML. In: Workshop on Automated Verification of Critical Systems (AVoCS 2001), Oxford, 2001. Published as OUCL Technical Report PRG-RR-01-07.
    @InProceedings{fdvscsu01, author = {J.~{J}{\"u}{r}jens}, title = {Formal Development and Verification of Security-Critical Systems with {UML}}, booktitle = {Workshop on Automated Verification of Critical Systems (AVoCS 2001)}, year = {2001}, address = {Oxford}, note = {Published as OUCL Technical Report PRG-RR-01-07.}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/avocs01talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/avocs01abs.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/avocs01abs.ps:URL}, keywords = {workshop, industrialConferences, secureSoftwareEngineeringAutomatedFormalSecurityAnalysis}, }
     BibTeX   slides   paper (pdf)   paper (ps) 
  • M. Abadi, J. Jürjens: Formal Eavesdropping and its Computational Interpretation. In: N. Kobayashi, B. C.Pierce (editors): Theoretical Aspects of Computer Software (4th International Symposium, TACS 2001), Springer Verlag, Lecture Notes in Computer Science, vol. 2215, pp. 82-94, 2001.
    @InProceedings{feci01, author = {M.~Abadi and J.~{J}{\"u}{r}jens}, title = {Formal Eavesdropping and its Computational Interpretation}, booktitle = {Theoretical Aspects of Computer Software (4th International Symposium, TACS 2001)}, year = {2001}, editor = {N. Kobayashi and {B. C.} Pierce}, volume = {2215}, series = {Lecture Notes in Computer Science}, pages = {82--94}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.1076}, file = {extended version:http\://rgse.uni-koblenz.de/jj/publications/papers/lambdaweb.pdf:URL;(older) slides:http\://rgse.uni-koblenz.de/jj/publications/papers/dagstuhl.ps:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/lambda.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/lambda.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45500-0_4:URL}, keywords = {internationalConferences, secureSoftwareEngineeringFoundationsOfSecurity}, }
     BibTeX   DOI   extended version   (older) slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens, G. Wimmel: Formally Testing Fail-safety of Electronic Purse Protocols. In: 16th International Conference on Automated Software Engineering (ASE 2001), IEEE, pp. 408-411, 2001.
    @InProceedings{ase01JW, author = {J.~{J}{\"u}{r}jens and G. Wimmel}, title = {Formally Testing Fail-safety of Electronic Purse Protocols}, booktitle = {16th International Conference on Automated Software Engineering (ASE 2001)}, year = {2001}, pages = {408--411}, publisher = {IEEE}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/ase01sli.ps:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/ase01.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityTesting, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   slides   preprint   dblp 
  • J. Jürjens: Towards Development of Secure Systems using UMLsec. In: 4th International Conference on Fundamental Approaches to Software Engineering (FASE), Springer, Lecture Notes in Computer Science, vol. 2029, pp. 187-200, 2001.
    @InProceedings{fase01J, author = {J.~{J}{\"u}{r}jens}, title = {Towards Development of Secure Systems using {UMLsec}}, booktitle = {4th International Conference on Fundamental Approaches to Software Engineering (FASE)}, year = {2001}, volume = {2029}, series = {Lecture Notes in Computer Science}, pages = {187--200}, publisher = {Springer}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/fasetalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/secuml.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/secuml.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45314-8_14:URL}, keywords = {internationalConferences, secureSoftwareEngineeringUMLsecProfile}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Modelling audit security for smart-card payment schemes with UMLsec. In: 16th International Conference on Information Security (IFIPSEC''01), Kluwer, pp. 93-108, IFIP, 2001.
    @InProceedings{ifipsec01J, author = {J.~{J}{\"u}{r}jens}, title = {Modelling audit security for smart-card payment schemes with {UMLsec}}, booktitle = {16th International Conference on Information Security (IFIPSEC''01)}, year = {2001}, pages = {93--108}, organization = {IFIP}, publisher = {Kluwer}, file = {audio 3/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ii.wav:URL;audio 2/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ib.wav:URL;audio 1/3:http\://rgse.uni-koblenz.de/jj/publications/audio/ifipsec02ia.wav:URL;slides:http\://rgse.uni-koblenz.de/jj/publications/papers/iftalk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/ifipsec01final.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/ifipsec01final.ps:URL;SpringerLink:http://link.springer.com/chapter/10.1007/0-306-46998-7_7:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   audio 3/3   audio 2/3   audio 1/3   slides   paper (pdf)   paper (ps)   SpringerLink 
  • J. Jürjens, G. Wimmel: Specification-Based Testing of Firewalls. In: D. Bjørner, M. Broy, A. Zamulin (editors): Andrei Ershov 4th International Conference ``Perspectives of System Informatics'' (PSI 2001), Springer Verlag, Novosibirsk (Russia), Lecture Notes in Computer Science, vol. 2244, pp. 308-316, 2001.
    @InProceedings{sbtf01, author = {J.~{J}{\"u}{r}jens and G. Wimmel}, title = {Specification-Based Testing of Firewalls}, booktitle = {Andrei Ershov 4th International Conference ``Perspectives of System Informatics'' (PSI 2001)}, year = {2001}, editor = {D. Bj{\o}rner and M. Broy and A. Zamulin}, volume = {2244}, series = {Lecture Notes in Computer Science}, pages = {308--316}, address = {Novosibirsk (Russia)}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.2132}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/JurWim01sli.ps:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/JurWim01.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/JurWim01.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45575-2_31:URL}, keywords = {internationalConferences, secureSoftwareEngineeringSecurityTesting}, }
     BibTeX   DOI   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens: Secure Java Development with UML. In: I-NetSec 01 – First International IFIP TC-11 WG 11.4 Working Conference on Network Security, Kluwer, Leuven (Belgium), 2001.
    @InProceedings{sjdu01, author = {J.~{J}{\"u}{r}jens}, title = {Secure Java Development with {UML}}, booktitle = {I-NetSec 01 – First International IFIP TC-11 WG 11.4 Working Conference on Network Security}, year = {2001}, address = {Leuven (Belgium)}, publisher = {Kluwer}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/inetsec01talk.pdf:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/inetsec01.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/inetsec01.ps:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/0-306-46958-8_8:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   slides   paper (pdf)   paper (ps)   dblp   SpringerLink 
  • J. Jürjens, G. Wimmel: Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. In: First IFIP Conference on e-Commerce, e-Business, and e-Government (I3E), Kluwer, pp. 489-505, 2001.
    @InProceedings{i3eJW01, author = {J.~{J}{\"u}{r}jens and G. Wimmel}, title = {Security Modelling for Electronic Commerce: The {Common Electronic Purse Specifications}}, booktitle = {First IFIP Conference on e-Commerce, e-Business, and e-Government (I3E)}, year = {2001}, pages = {489--505}, publisher = {Kluwer}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/i3esli.ps:URL;preprint:http\://rgse.uni-koblenz.de/jj/publications/papers/JW01_I3E.ps:URL;SpringerLink:http://link.springer.com/chapter/10.1007/0-306-47009-8_36:URL}, keywords = {internationalConferences, secureSoftwareEngineeringModelBasedSecurityEngineering, secureSoftwareEngineeringSecureEmbeddedSystems}, }
     BibTeX   slides   preprint   SpringerLink 
  • J. Jürjens: Secrecy-preserving Refinement. In: J. Fiadeiro, P. Zave (editors): International Symposium on Formal Methods Europe (FME), Springer Verlag, Berlin Heidelberg New York, Lecture Notes in Computer Science, vol. 2021, pp. 135-152, 2001.
    @InProceedings{spr01, author = {J.~{J}{\"u}{r}jens}, title = {Secrecy-preserving Refinement}, booktitle = {International Symposium on Formal Methods Europe (FME)}, year = {2001}, editor = {J. Fiadeiro and P. Zave}, volume = {2021}, series = {Lecture Notes in Computer Science}, pages = {135--152}, address = {Berlin Heidelberg New York}, publisher = {Springer Verlag}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.11}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/J00kSli.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/J00kWeb.ps:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/J00kWeb.pdf:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-45251-6_8:URL}, keywords = {internationalConferences, secureSoftwareEngineeringFoundationsOfSecurity}, summary = {Presents secrecy property preserved under refinement; uncovers flaw in variant of security protocol TLS.}, }
     BibTeX   DOI   slides   paper (ps)   paper (pdf)   dblp   SpringerLink 
  • J. Jürjens: Transformations for Introducing Patterns - A Secure Systems Case Study. In: Workshop on Transformations in UML (WTUML, ETAPS 2001 Satellite Event), Genova, 2001.
    @InProceedings{tip01, author = {J.~{J}{\"u}{r}jens}, title = {Transformations for Introducing Patterns -- A Secure Systems Case Study}, booktitle = {Workshop on Transformations in UML (WTUML, ETAPS 2001 Satellite Event)}, year = {2001}, address = {Genova}, DOI = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.1124}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/wtuml01.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/wtuml01.ps:URL}, keywords = {workshop,industrialConferences, secureSoftwareEngineeringModelBasedSecurityEngineering}, }
     BibTeX   DOI   paper (pdf)   paper (ps) 
  • J. Jürjens: On a problem of Gabriel and Ulmer. In: Journal of Pure and Applied Algebra, vol. 158, pp. 183-196, 2001.
    @Article{jpaa01, author = {J.~{J}{\"u}{r}jens}, title = {On a problem of {Gabriel and Ulmer}}, journal = {Journal of Pure and Applied Algebra}, year = {2001}, volume = {158}, pages = {183--196}, DOI = {10.1016/S0022-4049(00)00043-8}, file = {paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/gurevd.pdf:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/gurevd.ps:URL;paper (gz):http\://rgse.uni-koblenz.de/jj/publications/papers/gurevd.ps.gz:URL}, keywords = {mathematicalLogic, journalPaper}, URL = {http://www.jurjens.de/jan}, }
     BibTeX   DOI   URL   paper (pdf)   paper (ps)   paper (gz) 

2000


  • M. Abadi, J. Jürjens: Bridging the gap: Formal vs. complexity-theoretical reasoning about cryptography. In: Security through Analysis and Verification, Dagstuhl, 2000.
    @InProceedings{AbaJur00a, author = {M.~Abadi and J.~{J}{\"u}{r}jens}, title = {Bridging the gap: Formal vs.\ complexity-theoretical reasoning about cryptography}, booktitle = {Security through Analysis and Verification}, year = {2000}, address = {Dagstuhl}, keywords = {workshop,industrialConferences, secureSoftwareEngineeringFoundationsOfSecurity}, }
     BibTeX 
  • J. Jürjens: Secure Information Flow for Concurrent Processes. In: 11th International Conference on Concurrency Theory (CONCUR 2000), Springer Verlag, Lecture Notes in Computer Science, vol. 1877, pp. 395-409, 2000.
    @InProceedings{concur00J, author = {J.~{J}{\"u}{r}jens}, title = {Secure Information Flow for Concurrent Processes}, booktitle = {11th International Conference on Concurrency Theory (CONCUR 2000)}, year = {2000}, volume = {1877}, series = {Lecture Notes in Computer Science}, pages = {395--409}, publisher = {Springer Verlag}, file = {slides:http\://rgse.uni-koblenz.de/jj/publications/papers/J00eSli.ps:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/J00eWeb.pdf:URL;paper (ps.gz):http\://rgse.uni-koblenz.de/jj/publications/papers/J00eWeb.ps.gz:URL;dblp:http://dblp.uni-trier.de/pers/hd/j/J=uuml=rjens:Jan:URL;SpringerLink:http://link.springer.com/chapter/10.1007/3-540-44618-4_29:URL}, keywords = {internationalConferences, secureSoftwareEngineeringFoundationsOfSecurity}, }
     BibTeX   slides   paper (pdf)   paper (ps.gz)   dblp   SpringerLink 

1998


  • J. Jürjens: Kleine Objekte in Kategorien von Algebren University of Bremen, 1998, Master Thesis.
    @MastersThesis{J98a, author = {J.~{J}{\"u}{r}jens}, title = {Kleine Objekte in Kategorien von Algebren}, school = {University of Bremen}, year = {1998}, type = {Master Thesis}, address = {Bremen (Germany)}, file = {paper (ps.gz):http\://rgse.uni-koblenz.de/jj/publications/papers/diplom.ps.gz:URL;paper (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/diplom.ps:URL;paper (pdf):http\://rgse.uni-koblenz.de/jj/publications/papers/diplom.pdf;abstract (ps.gz):http\://rgse.uni-koblenz.de/jj/publications/papers/gamesrevd.ps.gz:URL;abstract (ps):http\://rgse.uni-koblenz.de/jj/publications/papers/DAbstract.ps:URL;abstract (pdf):http://rgse.uni-koblenz.de/jj/publications/papers/DAbstract.pdf:URL}, keywords = {thesis, mathematicalLogic}, }
     BibTeX   paper (ps.gz)   paper (ps)   abstract (ps.gz)   abstract (ps)   abstract (pdf)