default search action
Jan Jürjens
Person information
- affiliation: University of Koblenz-Landau, Germany
- affiliation (former): Dortmund University of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Sven Peldszus, Jens Bürger, Jan Jürjens:
UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering. IEEE Trans. Software Eng. 50(1): 16-47 (2024) - [c164]Matthias Lohr, Sven Peldszus, Jan Jürjens, Steffen Staab:
Fast, Favorable, and Fair Blockchain-based Exchange of Digital Goods using State Channels. ICBC 2024: 279-287 - [c163]Malla Reddy Sama, Eike Lyczkowski, Michael Petry, Wolfgang Kiess, Jan Jürjens:
5G-Enabled Flexible Security Framework for Industrial Applications. ICC 2024: 708-714 - [c162]Amir Shayan Ahmadian, Sebastian Franke, Charly Gnoguem, Jan Jürjens:
Privacy-Friendly Sharing of Health Data Using a Reference Architecture for Health Data Spaces. eSAAM 2024: 103-112 - [c161]Katharina Großer, Marina Rukavitsyna, Jan Jürjens:
A Comparative Evaluation of Requirement Template Systems (Summary). Software Engineering 2024: 47-48 - [d4]Matthias Lohr, Sven Peldszus, Jan Jürjens, Steffen Staab:
Fast, Favorable, and Fair Blockchain-based Exchange of Digital Goods using State Channels - Replication Package. Zenodo, 2024 - [i13]Anselm von Gladiss, Amir Shayan Ahmadian, Jan Jürjens:
Reconstruction as a service: a data space for off-site image reconstruction in magnetic particle imaging. CoRR abs/2401.05987 (2024) - [i12]Qusai Ramadan, Zeyd Boukhers, Muath AlShaikh, Christoph Lange, Jan Jürjens:
Data Trading and Monetization: Challenges and Open Research Directions. CoRR abs/2401.09199 (2024) - 2023
- [j39]Hussein Hasso, Katharina Großer, Iliass Aymaz, Hanna Geppert, Jan Jürjens:
Enhanced abbreviation-expansion pair detection for glossary term extraction. Inf. Softw. Technol. 159: 107203 (2023) - [j38]Zeyd Boukhers, Prantik Goswami, Jan Jürjens:
Knowledge guided multi-filter residual convolutional neural network for ICD coding from clinical text. Neural Comput. Appl. 35(24): 17633-17644 (2023) - [j37]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking security compliance between models and code. Softw. Syst. Model. 22(1): 273-296 (2023) - [c160]Zeyd Boukhers, Azeddine Bouabdallah, Cong Yang, Jan Jürjens:
Beyond Trading Data: The Hidden Influence of Public Awareness and Interest on Cryptocurrency Volatility. CIKM 2023: 142-151 - [c159]Qusai Ramadan, Zeyd Boukhers, Muath AlShaikh, Christoph Lange, Jan Jürjens:
Data Trading and Monetization: Challenges and Open Research Directions. ICFNDS 2023: 344-351 - [c158]Katharina Großer, Marina Rukavitsyna, Jan Jürjens:
A Comparative Evaluation of Requirement Template Systems. RE 2023: 41-52 - [c157]Hussein Hasso, Katharina Großer, Iliass Aymaz, Hanna Geppert, Jan Jürjens:
ILLOD Replication Package: An Open-Source Framework for Abbreviation-Expansion Pair Detection and Term Consolidation in Requirements. RE 2023: 369-370 - [c156]Katharina Großer, Volker Riediger, Jan Jürjens:
Requirements document relations: A reuse perspective on traceability through standards. Software Engineering 2023: 57-58 - [c155]Marco Konersmann, Angelika Kaplan, Thomas Kühn, Robert Heinrich, Anne Koziolek, Ralf H. Reussner, Jan Jürjens, Mahmood al-Doori, Nicolas Boltz, Marco Ehl, Dominik Fuchß, Katharina Großer, Sebastian Hahner, Jan Keim, Matthias Lohr, Timur Saglam, Sophie Schulz, Jan-Philipp Töberg:
Evaluation Methods and Replicability of Software Architecture Research Objects. Software Engineering 2023: 75-76 - [d3]Katharina Großer, Marina Rukavitsyna, Jan Jürjens:
Evaluation-of-templates-for-requirements-documentation. Zenodo, 2023 - [d2]Katharina Großer, Marina Rukavitsyna, Jan Jürjens:
k-grosser/Evaluation-of-templates-for-requirements-documentation: Submission to RE'23 Artifact Track. Zenodo, 2023 - 2022
- [j36]Joachim Stocker, Nils Herda, Jan Jürjens:
Life cycle and metrics to measure the resilience of business processes by considering resources. Bus. Process. Manag. J. 28(4): 1164-1182 (2022) - [j35]Zeyd Boukhers, Timo Hartmann, Jan Jürjens:
COIN: Counterfactual Image Generation for Visual Question Answering Interpretation. Sensors 22(6): 2245 (2022) - [j34]Katharina Großer, Volker Riediger, Jan Jürjens:
Requirements document relations. Softw. Syst. Model. 21(6): 1-37 (2022) - [c154]Matthias Lohr, Kenneth Skiba, Marco Konersmann, Jan Jürjens, Steffen Staab:
Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain. ICBC 2022: 1-5 - [c153]Marco Konersmann, Angelika Kaplan, Thomas Kühn, Robert Heinrich, Anne Koziolek, Ralf H. Reussner, Jan Jürjens, Mahmood al-Doori, Nicolas Boltz, Marco Ehl, Dominik Fuchß, Katharina Großer, Sebastian Hahner, Jan Keim, Matthias Lohr, Timur Saglam, Sophie Schulz, Jan-Philipp Töberg:
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects". ICSA Companion 2022: 58 - [c152]Marco Konersmann, Angelika Kaplan, Thomas Kühn, Robert Heinrich, Anne Koziolek, Ralf H. Reussner, Jan Jürjens, Mahmood al-Doori, Nicolas Boltz, Marco Ehl, Dominik Fuchß, Katharina Großer, Sebastian Hahner, Jan Keim, Matthias Lohr, Timur Saglam, Sophie Schulz, Jan-Philipp Töberg:
Evaluation Methods and Replicability of Software Architecture Research Objects. ICSA 2022: 157-168 - [c151]Kilian Vernickel, Mayank Singh, Marco Konersmann, Jan Jürjens:
Ontology-based Synchronization of Automated Production Systems and Their Simulation Models. IEEM 2022: 660-664 - [c150]Malla Reddy Sama, Wolfgang Kiess, Riccardo Guerzoni, Srisakul Thakolsri, Jan Jürjens:
Redefining the Trust Model for the Internet of Everything in the 6G era. PIMRC 2022: 1400-1406 - [c149]Hussein Hasso, Katharina Großer, Iliass Aymaz, Hanna Geppert, Jan Jürjens:
Abbreviation-Expansion Pair Detection for Glossary Term Extraction. REFSQ 2022: 63-78 - [p8]Jan Jürjens, Simon Scheider, Furkan Yildirim, Michael Henke:
Tokenomics: Decentralized Incentivization in the Context of Data Spaces. Designing Data Spaces 2022: 91-108 - [p7]Santiago Cáceres Elvira, Francisco Valverde, Carlos Enrique Palau, Andreu Belsa Pellicer, Christos A. Gizelis, Dimosthenes Krassas, Hanane Becha, Réda Khouani, Andreas Metzger, Nikos Tzagkarakis, Anthousa Karkoglou, Anastasios Nikolakopoulos, Achilleas Marinakis, Vrettos Moulos, Antonios Litke, Amir Shayan Ahmadian, Jan Jürjens:
Towards Cognitive Ports of the Future. Technologies and Applications for Big Data Value 2022: 453-474 - [d1]Hussein Hasso, Katharina Großer, Iliass Aymaz, Hanna Geppert, Jan Jürjens:
AEPForGTE/ILLOD: Additional Material. Zenodo, 2022 - [i11]Zeyd Boukhers, Timo Hartmann, Jan Jürjens:
COIN: Counterfactual Image Generation for VQA Interpretation. CoRR abs/2201.03342 (2022) - [i10]Zeyd Boukhers, Azeddine Bouabdallah, Matthias Lohr, Jan Jürjens:
Ensemble and Multimodal Approach for Forecasting Cryptocurrency Price. CoRR abs/2202.08967 (2022) - [i9]Matthias Lohr, Kenneth Skiba, Marco Konersmann, Jan Jürjens, Steffen Staab:
Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain (Extended Version). CoRR abs/2203.05925 (2022) - 2021
- [j33]Sven Peldszus, Jens Bürger, Timo Kehrer, Jan Jürjens:
Ontology-driven evolution of software security. Data Knowl. Eng. 134: 101907 (2021) - [j32]Muhammad Sheikh Sadi, Waseem Ahmed, Jan Jürjens:
Towards Tolerating Soft Errors for Embedded Systems. SN Comput. Sci. 2(2): 101 (2021) - [c148]Malla Reddy Sama, Riccardo Guerzoni, Wolfgang Kiess, Srisakul Thakolsri, Jan Jürjens:
Why is Application Reliability an Issue for an Ultra-Reliable 6G Network? EuCNC/6G Summit 2021: 568-573 - [i8]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking Security Compliance between Models and Code. CoRR abs/2108.08579 (2021) - [i7]Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab:
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols. IACR Cryptol. ePrint Arch. 2021: 166 (2021) - 2020
- [j31]Sebastian Pape, Federica Paci, Jan Jürjens, Fabio Massacci:
Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach. Inf. 11(5): 261 (2020) - [j30]Qusai Ramadan, Daniel Strüber, Mattia Salnitri, Jan Jürjens, Volker Riediger, Steffen Staab:
A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements. Softw. Syst. Model. 19(5): 1191-1227 (2020) - [c147]Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab:
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols. Blockchain 2020: 428-435 - [c146]Jens Bürger, Timo Kehrer, Jan Jürjens:
Ontology Evolution in the Context of Model-Based Secure Software Engineering. RCIS 2020: 437-454 - [c145]Sven Peldszus, Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings. SE 2020: 51-52 - [p6]Amir Shayan Ahmadian, Sven Peldszus, Jan Jürjens, Mattia Salnitri, Paolo Giorgini, Haralambos Mouratidis, José Fran. Ruiz:
The Architecture of VisiOn Privacy Platform. Visual Privacy Management 2020: 54-76 - [p5]Sven Peldszus, Amir Shayan Ahmadian, Mattia Salnitri, Jan Jürjens, Michalis Pavlidis, Haralambos Mouratidis:
Visual Privacy Management. Visual Privacy Management 2020: 77-108 - [e9]Mattia Salnitri, Jan Jürjens, Haralambos Mouratidis, Loredana Mancini, Paolo Giorgini:
Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform. Lecture Notes in Computer Science 12030, Springer 2020, ISBN 978-3-030-59943-0 [contents]
2010 – 2019
- 2019
- [c144]Matthias Lohr, Jonathan Hund, Jan Jürjens, Steffen Staab:
Ensuring Genuineness for Selectively Disclosed Confidential Data Using Distributed Ledgers: Applications to Rail Wayside Monitoring. Blockchain 2019: 477-482 - [c143]Sven Peldszus, Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings. MoDELS 2019: 23-33 - [c142]Amir Shayan Ahmadian, Daniel Strüber, Jan Jürjens:
Privacy-enhanced system design modeling based on privacy features. SAC 2019: 1492-1499 - [c141]Qusai Ramadan, Amir Shayan Ahmadian, Jan Jürjens, Steffen Staab, Daniel Strüber:
Explaining Algorithmic Decisions with respect to Fairness. SE/SWM 2019: 161-162 - [c140]Jens Bürger, Daniel Strüber, Stefan Gärtner, Thomas Ruhroth, Jan Jürjens, Kurt Schneider:
A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary). SE/SWM 2019: 179-180 - [p4]Jan Jürjens, Kurt Schneider, Jens Bürger, Fabien Patrick Viertel, Daniel Strüber, Michael Goedicke, Ralf H. Reussner, Robert Heinrich, Emre Taspolatoglu, Marco Konersmann, Alexander Fay, Winfried Lamersdorf, Jan Ladiges, Christopher Haubeck:
Maintaining Security in Software Evolution. Managed Software Evolution 2019: 207-253 - 2018
- [j29]Harrison Stewart, Jan Jürjens:
Data security and consumer trust in FinTech innovation in Germany. Inf. Comput. Secur. 26(1): 109-128 (2018) - [j28]Jens Bürger, Daniel Strüber, Stefan Gärtner, Thomas Ruhroth, Jan Jürjens, Kurt Schneider:
A framework for semi-automated co-evolution of security knowledge and system models. J. Syst. Softw. 139: 142-160 (2018) - [j27]Jan Jürjens, Stefan Ruf, Nils Herda:
Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen ins digitale Zeitalter? Wirtschaftsinformatik Manag. 10(3): 74-79 (2018) - [c139]Qusai Ramadan, Daniel Strüber, Mattia Salnitri, Volker Riediger, Jan Jürjens:
Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models. ECMFA 2018: 179-198 - [c138]Daniel Strüber, Sven Peldszus, Jan Jürjens:
Taming Multi-Variability of Software Product Line Transformations. FASE 2018: 337-355 - [c137]Sven Peldszus, Daniel Strüber, Jan Jürjens:
Model-based security analysis of feature-oriented software product lines. GPCE 2018: 93-106 - [c136]Qusai Ramadan, Amir Shayan Ahmadian, Daniel Strüber, Jan Jürjens, Steffen Staab:
Model-based discrimination analysis: a position paper. FairWare@ICSE 2018: 22-28 - [c135]Amir Shayan Ahmadian, Jan Jürjens, Daniel Strüber:
Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements. SAC 2018: 1142-1149 - [c134]Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, Jan Jürjens:
Supporting privacy impact assessment by model-based privacy analysis. SAC 2018: 1467-1474 - [c133]Qusai Ramadan, Mattia Salnitri, Daniel Strüber, Jan Jürjens, Paolo Giorgini:
Integrating BPMN- and UML-based Security Engineering via Model Transformation. Software Engineering 2018: 63-64 - [r2]Jan Jürjens, Eduardo B. Fernández:
Secure Database Development. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [j26]Sakib Ahammed, Muhammad Sheikh Sadi, Md Shamimur Rahman, Jan Jürjens:
Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method). Comput. Syst. Sci. Eng. 32(1) (2017) - [j25]Harrison Stewart, Jan Jürjens:
Information security management and the human aspect in organizations. Inf. Comput. Secur. 25(5): 494-534 (2017) - [c132]Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Julian Flake, Andrea Praitano, José Fran. Ruiz, Jan Jürjens, Michalis Pavlidis, Dimitri Bonutto, Andrès Castillo Sanz, Haralambos Mouratidis, Javier Garcia-Robles, Alberto Eugenio Tozzi:
Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain. APF 2017: 192-209 - [c131]Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, Jan Jürjens:
Model-Based Privacy Analysis in Industrial Ecosystems. ECMFA 2017: 215-231 - [c130]Qusai Ramadan, Mattia Salnitri, Daniel Strüber, Jan Jürjens, Paolo Giorgini:
From Secure Business Process Modeling to Design-Level Security Verification. MoDELS 2017: 123-133 - [c129]Amir Shayan Ahmadian, Sven Peldszus, Qusai Ramadan, Jan Jürjens:
Model-based privacy and security analysis with CARiSMA. ESEC/SIGSOFT FSE 2017: 989-993 - [e8]Jan Jürjens, Kurt Schneider:
Software Engineering 2017, Fachtagung des GI-Fachbereichs Softwaretechnik, 21.-24. Februar 2017, Hannover, Deutschland. LNI P-267, GI 2017, ISBN 978-3-88579-661-9 [contents] - [i6]Stefan Wagner, Jan Jürjens, Claudia Koller, Peter Trischberger:
Comparing Bug Finding Tools with Reviews and Tests. CoRR abs/1711.05019 (2017) - 2016
- [c128]Amir Shayan Ahmadian, Jan Jürjens:
Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements. CloudCom 2016: 360-365 - [c127]Sebastian Pape, Julian Flake, Andreas Beckmann, Jan Jürjens:
STAGE: a software tool for automatic grading of testing exercises: case study paper. ICSE (Companion Volume) 2016: 491-500 - [c126]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa:
Umlchange - specifying model changes to support security verification of potential evolution. Software Engineering 2016: 91-92 - 2015
- [j24]David Garcia Rosado, Nadira Lammari, Jan Jürjens:
Special Issue on Secure Information Systems Engineering. Comput. J. 58(10): 2193-2194 (2015) - [j23]Robert Heinrich, Stefan Gärtner, Tom-Michael Hesse, Thomas Ruhroth, Ralf H. Reussner, Kurt Schneider, Barbara Paech, Jan Jürjens:
The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution. Int. J. Softw. Eng. Knowl. Eng. 25(9-10): 1715-1720 (2015) - [j22]Jens Bürger, Jan Jürjens, Sven Wenzel:
Restoring security of evolving software models using graph transformation. Int. J. Softw. Tools Technol. Transf. 17(3): 267-289 (2015) - [c125]Amir Shayan Ahmadian, Fabian Coerschulte, Jan Jürjens:
Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds. BMSD 2015: 80-95 - [c124]Jens Bürger, Stefan Gärtner, Thomas Ruhroth, Johannes Zweihoff, Jan Jürjens, Kurt Schneider:
Restoring Security of Long-Living Systems by Co-evolution. COMPSAC 2015: 153-158 - [c123]Chris Apfelbeck, Martin Fritz, Jan Jürjens, Johannes Zweihoff:
Preserving Validity of Batch-Job Nets under Change at Run-Time. COMPSAC 2015: 169-178 - [c122]Jan Jürjens, Amir Shayan Ahmadian:
Model-based Security Analysis and Applications to Security Economics. MODELSWARD 2015: 674-677 - [c121]Stefan Gärtner, Thomas Ruhroth, Jens Bürger, Kurt Schneider, Jan Jürjens:
Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge. Software Engineering & Management 2015: 83-84 - [c120]Robert Heinrich, Stefan Gärtner, Tom-Michael Hesse, Thomas Ruhroth, Ralf H. Reussner, Kurt Schneider, Barbara Paech, Jan Jürjens:
A Platform for Empirical Research on Information System Evolution. SEKE 2015: 415-420 - 2014
- [j21]Carlos Blanco, David Garcia Rosado, Luis Enrique Sánchez, Jan Jürjens:
Security in information systems: Advances and new challenges. Comput. Stand. Interfaces 36(4): 687-688 (2014) - [j20]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa:
Specifying model changes with UMLchange to support security verification of potential evolution. Comput. Stand. Interfaces 36(4): 776-791 (2014) - [j19]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [j18]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a general-purpose C verifier to prove cryptographic protocols. J. Comput. Secur. 22(5): 823-866 (2014) - [j17]Thomas Ruhroth, Stefan Gärtner, Jens Bürger, Jan Jürjens, Kurt Schneider:
Versioning and Evolution Requirements for Model-Based System Development. Softwaretechnik-Trends 34(2) (2014) - [c119]Thomas Ruhroth, Stefan Gärtner, Jens Bürger, Jan Jürjens, Kurt Schneider:
Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems. PROFES 2014: 239-253 - [c118]Stefan Gärtner, Thomas Ruhroth, Jens Bürger, Kurt Schneider, Jan Jürjens:
Maintaining requirements for long-living software systems by incorporating security knowledge. RE 2014: 103-112 - [c117]Stefan Gärtner, Jens Bürger, Kurt Schneider, Jan Jürjens:
Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen. Software Engineering (Workshops) 2014: 6-7 - [c116]Jan Jürjens, Kurt Schneider:
The SecReq approach: From Security Requirements to Secure Design while Managing Software Evolution. Software Engineering 2014: 89-90 - [e7]Jan Jürjens, Frank Piessens, Nataliia Bielova:
Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Lecture Notes in Computer Science 8364, Springer 2014, ISBN 978-3-319-04896-3 [contents] - [e6]David Garcia Rosado, Carlos Blanco, Daniel Mellado, Jan Jürjens, Luis Enrique Sánchez:
WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014. SciTePress 2014, ISBN 978-989-758-031-4 [contents] - [i5]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). CoRR abs/1409.6608 (2014) - 2013
- [j16]Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:
Resolving vulnerability identification errors using security requirements on business process models. Inf. Manag. Comput. Secur. 21(3): 202-223 (2013) - [c115]Thorsten Humberg, Christian Wessel, Daniel Poggenpohl, Sven Wenzel, Thomas Ruhroth, Jan Jürjens:
Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes. CLOSER (Selected Papers) 2013: 36-51 - [c114]Thorsten Humberg, Christian Wessel, Daniel Poggenpohl, Sven Wenzel, Thomas Ruhroth, Jan Jürjens:
Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes. CLOSER 2013: 553-561 - [c113]Jens Bürger, Jan Jürjens, Thomas Ruhroth, Stefan Gärtner, Kurt Schneider:
Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models. FOSAD 2013: 34-53 - [e5]Jan Jürjens, Benjamin Livshits, Riccardo Scandariato:
Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings. Lecture Notes in Computer Science 7781, Springer 2013, ISBN 978-3-642-36562-1 [contents] - [i4]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. CoRR abs/1312.6532 (2013) - 2012
- [j15]David Garcia Rosado, Luis Enrique Sánchez, Eduardo Fernández-Medina, Jan Jürjens:
Security in Information Systems: New Challenges and Opportunities. J. Univers. Comput. Sci. 18(6): 728-731 (2012) - [j14]Kurt Schneider, Eric Knauss, Siv Hilde Houmb, Shareeful Islam, Jan Jürjens:
Enhancing security requirements engineering by organizational learning. Requir. Eng. 17(1): 35-56 (2012) - [c112]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Computational verification of C protocol implementations by symbolic execution. CCS 2012: 712-723 - [c111]Sven Wenzel, Christian Wessel, Thorsten Humberg, Jan Jürjens:
Securing Processes for Outsourcing into the Cloud. CLOSER 2012: 675-680 - [c110]Martín Ochoa, Jan Jürjens, Daniel Warzecha:
A Sound Decision Procedure for the Compositionality of Secrecy. ESSoS 2012: 97-105 - [c109]Thomas Ruhroth, Jan Jürjens:
Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec. HASE 2012: 177-184 - [c108]Christian Wessel, Thorsten Humberg, Sven Wenzel, Jan Jürjens:
Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen. Software Engineering (Workshops) 2012: 175-181 - [c107]Martín Ochoa, Jan Jürjens, Jorge Cuéllar:
Non-interference on UML State-Charts. TOOLS (50) 2012: 219-235 - 2011
- [j13]Andreas Bauer, Jan Jürjens, Yijun Yu:
Run-Time Security Traceability for Evolving Systems. Comput. J. 54(1): 58-87 (2011) - [j12]Shareeful Islam, Haralambos Mouratidis, Jan Jürjens:
A framework to support alignment of secure software engineering with legal regulations. Softw. Syst. Model. 10(3): 369-394 (2011) - [c106]Elizabeta Fourneret, Martín Ochoa, Fabrice Bouquet, Julien Botella, Jan Jürjens, Parvaneh Yousefi:
Model-Based Security Verification and Testing for Smart-cards. ARES 2011: 272-279 - [c105]Holger Schmidt, Jan Jürjens:
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec. CAiSE 2011: 367-382 - [c104]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Extracting and verifying cryptographic models from C protocol code by symbolic execution. CCS 2011: 331-340 - [c103]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. CSF 2011: 3-17 - [c102]Jan Jürjens, Loïc Marchal, Martín Ochoa, Holger Schmidt:
Incremental Security Verification for Evolving UMLsec models. ECMFA 2011: 52-68 - [c101]Denis Hatebur, Maritta Heisel, Jan Jürjens, Holger Schmidt:
Systematic Development of UMLsec Design Models Based on Security Requirements. FASE 2011: 232-246 - [c100]Jan Jürjens:
Automated security hardening for evolving UML models. ICSE 2011: 986-988 - [c99]Seok-Won Lee, Mattia Monga, Jan Jürjens:
Seventh international workshop on software engineering for secure systems: (SESS 2011). ICSE 2011: 1200-1201 - [c98]Mihhail Aizatulin, François Dupressoir, Andrew D. Gordon, Jan Jürjens:
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge. Formal Aspects in Security and Trust 2011: 1-20 - [c97]Eric Knauss, Siv Hilde Houmb, Kurt Schneider, Shareeful Islam, Jan Jürjens:
Supporting Requirements Engineers in Recognising Security Issues. REFSQ 2011: 4-18 - [c96]Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain. SEC 2011: 259-270 - [c95]Fabio Massacci, Fabrice Bouquet, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, Jan Tobias Mühlberg, Federica Paci, Stéphane Paul, Frank Piessens, Bjørnar Solhaug, Sven Wenzel:
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143 - [c94]Jan Jürjens, Martín Ochoa, Holger Schmidt, Loïc Marchal, Siv Hilde Houmb, Shareeful Islam:
Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications. SFM 2011: 504-526 - [e4]Jan Jürjens, Seok-Won Lee, Mattia Monga:
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011. ACM 2011, ISBN 978-1-4503-0581-5 [contents] - [e3]David Garcia Rosado, Luis Enrique Sánchez, Jan Jürjens:
WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011. SciTePress 2011, ISBN 978-989-8425-61-4 [contents] - [i3]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution. CoRR abs/1107.1017 (2011) - [i2]Muhammad Sheikh Sadi, Md. Mizanur Rahman Khan, Md. Nazim Uddin, Jan Jürjens:
An Efficient Approach towards Mitigating Soft Errors Risks. CoRR abs/1110.3969 (2011) - 2010
- [j11]Andreas Bauer, Jan Jürjens:
Runtime verification of cryptographic protocols. Comput. Secur. 29(3): 315-330 (2010) - [j10]Muhammad Sheikh Sadi, D. G. Myers, Cesar Ortega-Sanchez, Jan Jürjens:
Component criticality analysis to minimize soft errors risk. Comput. Syst. Sci. Eng. 25(5) (2010) - [j9]Haralambos Mouratidis, Jan Jürjens:
From goal-driven security requirements engineering to secure design. Int. J. Intell. Syst. 25(8): 813-840 (2010) - [j8]Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jürjens, Kurt Schneider:
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec. Requir. Eng. 15(1): 63-93 (2010) - [c93]Alfredo Pironti, Jan Jürjens:
Formally-Based Black-Box Monitoring of Security Protocols. ESSoS 2010: 79-95 - [c92]Seok-Won Lee, Mattia Monga, Jan Jürjens:
The 6th International Workshop on Software Engineering for Secure Systems (SESS'10). ICSE (2) 2010: 433-434 - [c91]Kristian Beckers, Jan Jürjens:
Security and Compliance in Clouds. ISSE 2010: 91-100 - [c90]Lionel Montrieux, Jan Jürjens, Charles B. Haley, Yijun Yu, Pierre-Yves Schobbens, Hubert Toussaint:
Tool support for code generation from a UMLsec property. ASE 2010: 357-358 - [c89]Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Jan Jürjens:
Towards the Secure Modelling of OLAP Users' Behaviour. Secure Data Management 2010: 101-112 - [c88]Jan Jürjens:
Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote). VL/HCC 2010: 4 - [e2]Seok-Won Lee, Mattia Monga, Jan Jürjens:
ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa. ACM 2010, ISBN 978-1-60558-965-7 [contents]
2000 – 2009
- 2009
- [j7]Eduardo Fernández-Medina, Jan Jürjens, Juan Trujillo, Sushil Jajodia:
Model-Driven Development for secure information systems. Inf. Softw. Technol. 51(5): 809-814 (2009) - [j6]Jan Jürjens:
A domain-specific language for cryptographic protocols based on streams. J. Log. Algebraic Methods Program. 78(2): 54-73 (2009) - [j5]C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens:
Performance analysis of security aspects by weaving scenarios extracted from UML models. J. Syst. Softw. 82(1): 56-74 (2009) - [c87]Haralambos Mouratidis, Ali Sunyaev, Jan Jürjens:
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. CAiSE 2009: 231-245 - [c86]Jan Jürjens, Tjark Weber:
Finite Models in FOL-Based Crypto-Protocol Verification. ARSPA-WITS 2009: 155-172 - [c85]John Lloyd, Jan Jürjens:
Security Analysis of a Biometric Authentication System Using UMLsec and JML. MoDELS 2009: 77-91 - [c84]Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Jan Jürjens:
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). OOPSLA Companion 2009: 713-714 - [c83]Daniel Ratiu, Radu Marinescu, Jan Jürjens:
The Logical Modularity of Programs. WCRE 2009: 123-127 - [p3]Jan Jürjens:
Security and Dependability Engineering. Security and Dependability for Ambient Intelligence 2009: 21-36 - [r1]Jan Jürjens, Eduardo B. Fernández:
Secure Database Development. Encyclopedia of Database Systems 2009: 2528-2534 - 2008
- [c82]Jan Jürjens, Yijun Yu, Andreas Bauer:
Tools for Traceable Security Verification. BCS Int. Acad. Conf. 2008: 367-390 - [c81]Daniel Ratiu, Martin Feilkas, Jan Jürjens:
Extracting Domain Ontologies from Domain Specific APIs. CSMR 2008: 203-212 - [c80]Eduardo B. Fernández, Jan Jürjens, Nobukazu Yoshioka, Hironori Washizaki:
Incorporating Database Systems into a Secure Software Development Methodology. DEXA Workshops 2008: 310-314 - [c79]Jan Jürjens, Jörg Schreck, Yijun Yu:
Automated Analysis of Permission-Based Security Using UMLsec. FASE 2008: 292-295 - [c78]Andreas Bauer, Jan Jürjens:
Security protocols, properties, and their monitoring. SESS 2008: 33-40 - [c77]Jan Jürjens, Jörg Schreck, Peter Bartmann:
Model-based security analysis for mobile communications. ICSE 2008: 683-692 - [c76]Sebastian Höhn, Jan Jürjens:
Rubacon: automated support for model-based compliance engineering. ICSE 2008: 875-878 - [c75]Yijun Yu, Jan Jürjens, John Mylopoulos:
Traceability for the maintenance of secure software. ICSM 2008: 297-306 - [c74]Daniel Ratiu, Jan Jürjens:
Evaluating the Reference and Representation of Domain Concepts in APIs. ICPC 2008: 242-247 - [c73]Yijun Yu, Jan Jürjens, Jörg Schreck:
Tools for Traceability in Secure Software Development. ASE 2008: 503-504 - [c72]Shareeful Islam, Jan Jürjens:
Incorporating Security Requirements from Legal Regulations into UMLsec model. MODSEC@MoDELS 2008 - [c71]Jon Whittle, Jan Jürjens, Bashar Nuseibeh, Glen Dobson:
First International Modeling Security Workshop. MoDELS (Workshops) 2008: 181-184 - [c70]Jan Jürjens, Daniel Reiß, David Trachtenherz:
Model-Based Quality Assurance of Automotive Software. MoDELS 2008: 858-873 - [c69]Stefan Taubenberger, Jan Jürjens:
IT Security Risk Analysis based on Business Process Models enhanced with Security Requirements. MODSEC@MoDELS 2008 - [c68]Jan Jürjens:
Model-Based Run-Time Checking of Security Permissions Using Guarded Objects. RV 2008: 36-50 - [c67]Jan Jürjens:
Model-based Security Testing Using UMLsec: A Case Study. MBT@ETAPS 2008: 93-104 - [e1]Jon Whittle, Jan Jürjens, Bashar Nuseibeh, Glen Dobson:
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, France, September 28, 2008. CEUR Workshop Proceedings 413, CEUR-WS.org 2008 [contents] - 2007
- [j4]Jan Jürjens, Pasha Shabalin:
Tools for secure systems development with UML. Int. J. Softw. Tools Technol. Transf. 9(5-6): 527-544 (2007) - [c66]Daniel Ratiu, Jan Jürjens:
The Reality of Libraries. CSMR 2007: 307-318 - [c65]Jan Jürjens:
Developing Secure Embedded Systems: Pitfalls and How to Avoid Them. ICSE Companion 2007: 182-183 - [c64]Bastian Best, Jan Jürjens, Bashar Nuseibeh:
Model-Based Security Engineering of Distributed Information Systems Using UMLsec. ICSE 2007: 581-590 - [c63]Jan Jürjens, Yijun Yu:
Tools for model-based security engineering: models vs. code. ASE 2007: 545-546 - [c62]Dorina C. Petriu, C. Murray Woodside, Dorin Bogdan Petriu, Jing Xu, Toqeer Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens:
Performance analysis of security aspects in UML models. WOSP 2007: 91-102 - [c61]Jan Jürjens:
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project. AVoCS 2007: 123-136 - 2006
- [c60]Haralambos Mouratidis, Jan Jürjens, Jorge Fox:
Towards a Comprehensive Framework for Secure Systems Development. CAiSE 2006: 48-62 - [c59]Jan Jürjens:
Model-Based Security Engineering for Real. FM 2006: 600-606 - [c58]Jan Jürjens, Jorge Fox:
Tools for model-based security engineering. ICSE 2006: 819-822 - [c57]Jan Jürjens:
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers. ASE 2006: 167-176 - [c56]Geri Georg, Siv Hilde Houmb, Robert B. France, Steffen Zschaler, Dorina C. Petriu, Jan Jürjens:
Critical Systems Development Using Modeling Languages - CSDUML 2006 Workshop Report. MoDELS (Workshops) 2006: 27-31 - [c55]Jan Jürjens:
Model-Based Security Engineering. SECRYPT 2006 - [i1]Jorge Fox, Jan Jürjens:
A Framework for Analyzing Composition of Security Aspects. MMOSS 2006 - 2005
- [b2]Jan Jürjens:
Secure systems development with UML. Springer 2005, ISBN 978-3-540-00701-2, pp. I-XIX, 1-309 - [c54]Jan Jürjens:
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. ACSAC 2005: 138-149 - [c53]Jewgenij Botaschanjan, Jan Jürjens:
MoDeII: Modeling and Analyzing Time-Constraints. ECBS 2005: 299-306 - [c52]Jorge Fox, Jan Jürjens:
Introducing Security Aspects with Model Transformations. ECBS 2005: 543-549 - [c51]Stefan Wagner, Jan Jürjens:
Model-Based Identification of Fault-Prone Components. EDCC 2005: 435-452 - [c50]Jan Jürjens, Pasha Shabalin:
Tools for Secure Systems Development with UML: Security Analysis with ATPs. FASE 2005: 305-309 - [c49]Jan Jürjens:
Model-Based Security Engineering with UML: Introducing Security Aspects. FMCO 2005: 64-87 - [c48]Jan Jürjens:
Towards using game semantics for crypto protocol verification: Lorenzen games. GALOP@ETAPS 2005: 241-257 - [c47]Siv Hilde Houmb, Geri Georg, Robert B. France, James M. Bieman, Jan Jürjens:
Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development. ICECCS 2005: 195-204 - [c46]Jan Jürjens, Markus Lehrhuber, Guido Wimmel:
Model-Based Design and Analysis of Permission-Based Security. ICECCS 2005: 224-233 - [c45]Jan Jürjens:
Sound methods and effective tools for model-based security engineering with UML. ICSE 2005: 322-331 - [c44]Jan Jürjens:
Understanding Security Goals Provided by Crypto-Protocol Implementations. ICSM 2005: 643-646 - [c43]Jan Jürjens, Mark Yampolskiy:
Code security analysis with assertions. ASE 2005: 392-395 - [c42]Jan Jürjens:
Verification of low-level crypto-protocol implementations using automated theorem proving. MEMOCODE 2005: 89-98 - [c41]Stefan Wagner, Jan Jürjens, Claudia Koller, Peter Trischberger:
Comparing Bug Finding Tools with Reviews and Tests. TestCom 2005: 40-55 - [c40]Jan Jürjens, Siv Hilde Houmb:
Dynamic Secure Aspect Modeling with UML: From Models to Code. MoDELS 2005: 142-155 - [p2]Jan Jürjens, Pasha Shabalin:
Tool Support for Model-Driven Development of Security-Critical Systems with UML. Model-Driven Software Development 2005: 35-55 - [p1]Jan Jürjens, Stefan Wagner:
Component-Based Development of Dependable Systems with UML. Component-Based Software Development for Embedded Systems 2005: 320-344 - 2004
- [j3]Jan Jürjens:
Componentware for Critical Systems. J. Object Technol. 3(4): 47-50 (2004) - [c39]Jan Jürjens, Pasha Shabalin:
A Foundation for Tool-Supported Critical Systems Development with UML. ECBS 2004: 398-405 - [c38]Jan Jürjens:
Model-Based Security Engineering with UML. FOSAD 2004: 42-77 - [c37]Jan Jürjens:
Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol. HASE 2004: 231-240 - [c36]Martin R. Deubler, Johannes Grünbauer, Jan Jürjens, Guido Wimmel:
Sound development of secure service-based systems. ICSOC 2004: 115-124 - [c35]Jan Jürjens, Siv Hilde Houmb:
Risk-Driven Development Of Security-Critical Systems Using UMLsec. IFIP Congress Tutorials 2004: 21-53 - [c34]Johannes Grünbauer, Jan Jürjens, Guido Wimmel:
Modelling Secure IT Systems - A Survey. Modellierung 2004: 307-308 - [c33]Robert Schmidt, Jan Jürjens:
Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem. Modellierung 2004: 309-310 - [c32]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). UML Satellite Activities 2004: 76-84 - [c31]Jan Jürjens, Pasha Shabalin:
Tools for Critical Systems Development with UML (Tool Demo). UML Satellite Activities 2004: 250-253 - [c30]Jan Jürjens, Pasha Shabalin:
Automated Verification of UMLsec Models for Security Requirements. UML 2004: 365-379 - [c29]Jan Jürjens:
Foundations for Designing Secure Architectures. VODCA@FOSAD 2004: 31-46 - 2003
- [j2]Jan Jürjens:
Bericht über die erste Jahrestagung der GI-Fachgruppe FoMSESS vom 12. bis 13. Mai 2003 in Karlsruhe. Softwaretechnik-Trends 23(3) (2003) - [c28]Jan Romberg, Jan Jürjens, Guido Wimmel, Oscar Slotosch, Gabor Hahn:
AutoFOCUS and the MoDe Tool. ACSD 2003: 249-250 - [c27]Gerhard Popp, Jan Jürjens, Guido Wimmel, Ruth Breu:
Security-Critical System Development with Extended Use Cases. APSEC 2003: 478-487 - [c26]Siv Hilde Houmb, Jan Jürjens:
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec. APSEC 2003: 488- - [c25]Jan Jürjens:
Algebraic State Machines: Concepts and Applications to Security. Ershov Memorial Conference 2003: 338-343 - [c24]Jan Jürjens, Siv Hilde Houmb:
Development of Safety-Critical Systems and Model-Based Risk Analysis with UML. LADC 2003: 364-365 - [c23]Johannes Grünbauer, Helia Hollmann, Jan Jürjens, Guido Wimmel:
Modelling and Verification of Layered Security Protocols: A Bank Application. SAFECOMP 2003: 116-129 - [c22]Jan Jürjens, Johannes Grünbauer:
Critical Systems Development with UML: Overview with Automatic Case Study. SNPD 2003: 512-517 - [c21]Sebastian Höhn, Jan Jürjens:
Automated Checking of SAP Security Permisisons. IICIS 2003: 13-30 - [c20]Jan Jürjens:
Developing Safety-Critical Systems with UML. UML 2003: 360-372 - 2002
- [b1]Jan Jürjens:
Principles for secure system design. University of Oxford, UK, 2002 - [j1]Jan Jürjens:
Games In The Semantics Of Programming Languages - An Elementary Introduction. Synth. 133(1-2): 131-158 (2002) - [c19]Jan Jürjens:
Formal Semantics for Interacting UML subsystems. FMOODS 2002: 29-43 - [c18]Guido Wimmel, Jan Jürjens:
Specification-Based Test Generation for Security-Critical Systems Using Mutations. ICFEM 2002: 471-482 - [c17]Jan Jürjens:
A UML statecharts semantics with message-passing. SAC 2002: 1009-1013 - [c16]Jan Jürjens:
Using UMLsec and goal trees for secure systems development. SAC 2002: 1026-1030 - [c15]Jan Jürjens:
UMLsec: Extending UML for Secure Systems Development. UML 2002: 412-425 - 2001
- [c14]Jan Jürjens:
Abstracting from Failure Probabilities. ACSD 2001: 53- - [c13]Jan Jürjens, Guido Wimmel:
Specification-Based Testing of Firewalls. Ershov Memorial Conference 2001: 308-316 - [c12]Jan Jürjens:
Towards Development of Secure Systems Using UMLsec. FASE 2001: 187-200 - [c11]Jan Jürjens:
Secrecy-Preserving Refinement. FME 2001: 135-152 - [c10]Jan Jürjens, Guido Wimmel:
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. I3E 2001: 489-505 - [c9]Jan Jürjens, Guido Wimmel:
Formally Testing Fail-Safety of Electronic Purse Protocols. ASE 2001: 408-411 - [c8]Jan Jürjens:
Composability of Secrecy. MMM-ACNS 2001: 28-38 - [c7]Jan Jürjens:
Secure Java Development with UML. Network Security 2001: 107-124 - [c6]Jan Jürjens:
Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC. SEC 2001: 93-108 - [c5]Jan Jürjens:
Encapsulating Rules of Prudent Security Engineering. Security Protocols Workshop 2001: 95-101 - [c4]Jan Jürjens:
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion). Security Protocols Workshop 2001: 102-106 - [c3]Martín Abadi, Jan Jürjens:
Formal Eavesdropping and Its Computational Interpretation. TACS 2001: 82-94 - [c2]Jan Jürjens:
Developing Secure Systems with UMLsec - From Business Processes to Implementation. VIS 2001: 151-161 - 2000
- [c1]Jan Jürjens:
Secure Information Flow for Concurrent Processes. CONCUR 2000: 395-409
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint