2009 |
81 | EE | Jan Jürjens:
A domain-specific language for cryptographic protocols based on streams.
J. Log. Algebr. Program. 78(2): 54-73 (2009) |
80 | EE | C. Murray Woodside,
Dorina C. Petriu,
Dorin Bogdan Petriu,
Jing Xu,
Tauseef A. Israr,
Geri Georg,
Robert B. France,
James M. Bieman,
Siv Hilde Houmb,
Jan Jürjens:
Performance analysis of security aspects by weaving scenarios extracted from UML models.
Journal of Systems and Software 82(1): 56-74 (2009) |
2008 |
79 | EE | Yijun Yu,
Jan Jürjens,
Jörg Schreck:
Tools for Traceability in Secure Software Development.
ASE 2008: 503-504 |
78 | EE | Daniel Ratiu,
Martin Feilkas,
Jan Jürjens:
Extracting Domain Ontologies from Domain Specific APIs.
CSMR 2008: 203-212 |
77 | EE | Eduardo B. Fernández,
Jan Jürjens,
Nobukazu Yoshioka,
Hironori Washizaki:
Incorporating Database Systems into a Secure Software Development Methodology.
DEXA Workshops 2008: 310-314 |
76 | EE | Jan Jürjens,
Jörg Schreck,
Yijun Yu:
Automated Analysis of Permission-Based Security Using UMLsec.
FASE 2008: 292-295 |
75 | EE | Daniel Ratiu,
Jan Jürjens:
Evaluating the Reference and Representation of Domain Concepts in APIs.
ICPC 2008: 242-247 |
74 | EE | Jan Jürjens,
Jörg Schreck,
Peter Bartmann:
Model-based security analysis for mobile communications.
ICSE 2008: 683-692 |
73 | EE | Sebastian Höhn,
Jan Jürjens:
Rubacon: automated support for model-based compliance engineering.
ICSE 2008: 875-878 |
72 | EE | Yijun Yu,
Jan Jürjens,
John Mylopoulos:
Traceability for the maintenance of secure software.
ICSM 2008: 297-306 |
71 | EE | Jan Jürjens,
Daniel Reiß,
David Trachtenherz:
Model-Based Quality Assurance of Automotive Software.
MoDELS 2008: 858-873 |
70 | EE | Jon Whittle,
Jan Jürjens,
Bashar Nuseibeh,
Glen Dobson:
First International Modeling Security Workshop.
MoDELS Workshops 2008: 181-184 |
69 | EE | Jan Jürjens:
Model-Based Run-Time Checking of Security Permissions Using Guarded Objects.
RV 2008: 36-50 |
68 | EE | Andreas Bauer,
Jan Jürjens:
Security protocols, properties, and their monitoring.
SESS 2008: 33-40 |
67 | EE | Jan Jürjens:
Model-based Security Testing Using UMLsec: A Case Study.
Electr. Notes Theor. Comput. Sci. 220(1): 93-104 (2008) |
2007 |
66 | EE | Jan Jürjens,
Yijun Yu:
Tools for model-based security engineering: models vs. code.
ASE 2007: 545-546 |
65 | EE | Daniel Ratiu,
Jan Jürjens:
The Reality of Libraries.
CSMR 2007: 307-318 |
64 | EE | Bastian Best,
Jan Jürjens,
Bashar Nuseibeh:
Model-Based Security Engineering of Distributed Information Systems Using UMLsec.
ICSE 2007: 581-590 |
63 | EE | Jan Jürjens:
Developing Secure Embedded Systems: Pitfalls and How to Avoid Them.
ICSE Companion 2007: 182-183 |
62 | EE | Dorina C. Petriu,
C. Murray Woodside,
Dorin Bogdan Petriu,
Jing Xu,
Toqeer Israr,
Geri Georg,
Robert B. France,
James M. Bieman,
Siv Hilde Houmb,
Jan Jürjens:
Performance analysis of security aspects in UML models.
WOSP 2007: 91-102 |
61 | EE | Jan Jürjens,
Pasha Shabalin:
Tools for secure systems development with UML.
STTT 9(5-6): 527-544 (2007) |
2006 |
60 | EE | Jan Jürjens:
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers.
ASE 2006: 167-176 |
59 | EE | Haralambos Mouratidis,
Jan Jürjens,
Jorge Fox:
Towards a Comprehensive Framework for Secure Systems Development.
CAiSE 2006: 48-62 |
58 | EE | Jan Jürjens:
Model-Based Security Engineering for Real.
FM 2006: 600-606 |
57 | EE | Jan Jürjens,
Jorge Fox:
Tools for model-based security engineering.
ICSE 2006: 819-822 |
56 | EE | Jorge Fox,
Jan Jürjens:
A Framework for Analyzing Composition of Security Aspects.
MMOSS 2006 |
55 | EE | Geri Georg,
Siv Hilde Houmb,
Robert B. France,
Steffen Zschaler,
Dorina C. Petriu,
Jan Jürjens:
Critical Systems Development Using Modeling Languages - CSDUML 2006 Workshop Report.
MoDELS Workshops 2006: 27-31 |
54 | | Jan Jürjens:
Model-Based Security Engineering.
SECRYPT 2006 |
53 | EE | Jan Jürjens:
Foundations for Designing Secure Architectures.
Electr. Notes Theor. Comput. Sci. 142: 31-46 (2006) |
2005 |
52 | EE | Jan Jürjens:
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers.
ACSAC 2005: 138-149 |
51 | EE | Jan Jürjens,
Mark Yampolskiy:
Code security analysis with assertions.
ASE 2005: 392-395 |
50 | EE | Jewgenij Botaschanjan,
Jan Jürjens:
MoDeII: Modeling and Analyzing Time-Constraints.
ECBS 2005: 299-306 |
49 | EE | Jorge Fox,
Jan Jürjens:
Introducing Security Aspects with Model Transformations.
ECBS 2005: 543-549 |
48 | EE | Stefan Wagner,
Jan Jürjens:
Model-Based Identification of Fault-Prone Components.
EDCC 2005: 435-452 |
47 | EE | Jan Jürjens,
Pasha Shabalin:
Tools for Secure Systems Development with UML: Security Analysis with ATPs.
FASE 2005: 305-309 |
46 | EE | Jan Jürjens:
Model-Based Security Engineering with UML: Introducing Security Aspects.
FMCO 2005: 64-87 |
45 | | Jan Jürjens:
Towards using game semantics for crypto protocol verification: Lorenzen games.
GALOP 2005: 241-257 |
44 | EE | Siv Hilde Houmb,
Geri Georg,
Robert B. France,
James M. Bieman,
Jan Jürjens:
Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development.
ICECCS 2005: 195-204 |
43 | EE | Jan Jürjens,
Markus Lehrhuber,
Guido Wimmel:
Model-Based Design and Analysis of Permission-Based Security.
ICECCS 2005: 224-233 |
42 | EE | Jan Jürjens:
Sound methods and effective tools for model-based security engineering with UML.
ICSE 2005: 322-331 |
41 | EE | Jan Jürjens:
Understanding Security Goals Provided by Crypto-Protocol Implementations.
ICSM 2005: 643-646 |
40 | EE | Jan Jürjens:
Verification of low-level crypto-protocol implementations using automated theorem proving.
MEMOCODE 2005: 89-98 |
39 | EE | Jan Jürjens,
Siv Hilde Houmb:
Dynamic Secure Aspect Modeling with UML: From Models to Code.
MoDELS 2005: 142-155 |
38 | EE | Stefan Wagner,
Jan Jürjens,
Claudia Koller,
Peter Trischberger:
Comparing Bug Finding Tools with Reviews and Tests.
TestCom 2005: 40-55 |
2004 |
37 | EE | Jan Jürjens,
Pasha Shabalin:
A Foundation for Tool-Supported Critical Systems Development with UML.
ECBS 2004: 398-405 |
36 | EE | Jan Jürjens:
Model-Based Security Engineering with UML.
FOSAD 2004: 42-77 |
35 | EE | Jan Jürjens:
Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol.
HASE 2004: 231-240 |
34 | EE | Martin Deubler,
Johannes Grünbauer,
Jan Jürjens,
Guido Wimmel:
Sound development of secure service-based systems.
ICSOC 2004: 115-124 |
33 | | Jan Jürjens,
Siv Hilde Houmb:
Risk-Driven Development Of Security-Critical Systems Using UMLsec.
IFIP Congress Tutorials 2004: 21-54 |
32 | | Johannes Grünbauer,
Jan Jürjens,
Guido Wimmel:
Modelling Secure IT Systems - A Survey.
Modellierung 2004: 307-308 |
31 | | Robert Schmidt,
Jan Jürjens:
Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem.
Modellierung 2004: 309-310 |
30 | EE | Jan Jürjens,
Pasha Shabalin:
Automated Verification of UMLsec Models for Security Requirements.
UML 2004: 365-379 |
29 | EE | Jan Jürjens,
Pasha Shabalin:
Tools for Critical Systems Development with UML (Tool Demo).
UML Satellite Activities 2004: 250-253 |
28 | EE | Jan Jürjens,
Eduardo B. Fernández,
Robert B. France,
Bernhard Rumpe,
Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop).
UML Satellite Activities 2004: 76-84 |
27 | EE | Jan Jürjens:
Componentware for Critical Systems.
Journal of Object Technology 3(4): 47-50 (2004) |
2003 |
26 | EE | Jan Romberg,
Jan Jürjens,
Guido Wimmel,
Oscar Slotosch,
Gabor Hahn:
AutoFOCUS and the MoDe Tool.
ACSD 2003: 249-250 |
25 | EE | Gerhard Popp,
Jan Jürjens,
Guido Wimmel,
Ruth Breu:
Security-Critical System Development with Extended Use Cases.
APSEC 2003: 478-487 |
24 | EE | Siv Hilde Houmb,
Jan Jürjens:
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec.
APSEC 2003: 488- |
23 | EE | Jan Jürjens:
Algebraic State Machines: Concepts and Applications to Security.
Ershov Memorial Conference 2003: 338-343 |
22 | EE | Jan Jürjens,
Siv Hilde Houmb:
Development of Safety-Critical Systems and Model-Based Risk Analysis with UML.
LADC 2003: 364-365 |
21 | EE | Johannes Grünbauer,
H. Hollmann,
Jan Jürjens,
Guido Wimmel:
Modelling and Verification of Layered Security Protocols: A Bank Application.
SAFECOMP 2003: 116-129 |
20 | | Jan Jürjens,
Johannes Grünbauer:
Critical Systems Development with UML: Overview with Automatic Case Study.
SNPD 2003: 512-517 |
19 | EE | Jan Jürjens:
Developing Safety-Critical Systems with UML.
UML 2003: 360-372 |
2002 |
18 | | Jan Jürjens:
Formal Semantics for Interacting UML subsystems.
FMOODS 2002: 29-43 |
17 | EE | Guido Wimmel,
Jan Jürjens:
Specification-Based Test Generation for Security-Critical Systems Using Mutations.
ICFEM 2002: 471-482 |
16 | EE | Jan Jürjens:
A UML statecharts semantics with message-passing.
SAC 2002: 1009-1013 |
15 | EE | Jan Jürjens:
Using UMLsec and goal trees for secure systems development.
SAC 2002: 1026-1030 |
14 | EE | Jan Jürjens:
UMLsec: Extending UML for Secure Systems Development.
UML 2002: 412-425 |
2001 |
13 | EE | Jan Jürjens:
Abstracting from Failure Probabilities.
ACSD 2001: 53- |
12 | EE | Jan Jürjens,
Guido Wimmel:
Formally Testing Fail-Safety of Electronic Purse Protocols.
ASE 2001: 408-411 |
11 | EE | Jan Jürjens,
Guido Wimmel:
Specification-Based Testing of Firewalls.
Ershov Memorial Conference 2001: 308-316 |
10 | EE | Jan Jürjens:
Towards Development of Secure Systems Using UMLsec.
FASE 2001: 187-200 |
9 | EE | Jan Jürjens:
Secrecy-Preserving Refinement.
FME 2001: 135-152 |
8 | | Jan Jürjens,
Guido Wimmel:
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications.
I3E 2001: 489-506 |
7 | EE | Jan Jürjens:
Composability of Secrecy.
MMM-ACNS 2001: 28-38 |
6 | | Jan Jürjens:
Secure Java Development with UML.
Network Security 2001: 107-124 |
5 | | Jan Jürjens:
Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC.
SEC 2001: 93-108 |
4 | EE | Jan Jürjens:
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion).
Security Protocols Workshop 2001: 102-106 |
3 | EE | Jan Jürjens:
Encapsulating Rules of Prudent Security Engineering.
Security Protocols Workshop 2001: 95-101 |
2 | EE | Martín Abadi,
Jan Jürjens:
Formal Eavesdropping and Its Computational Interpretation.
TACS 2001: 82-94 |
2000 |
1 | EE | Jan Jürjens:
Secure Information Flow for Concurrent Processes.
CONCUR 2000: 395-409 |