The SCEAS System
Navigation Menu

Search the dblp DataBase


Jan Jürjens: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jan Jürjens
    Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:138-149 [Conf]
  2. Jan Romberg, Jan Jürjens, Guido Wimmel, Oscar Slotosch, Gabor Hahn
    AutoFOCUS and the MoDe Tool. [Citation Graph (0, 0)][DBLP]
    ACSD, 2003, pp:249-250 [Conf]
  3. Jan Jürjens
    Abstracting from Failure Probabilities. [Citation Graph (0, 0)][DBLP]
    ACSD, 2001, pp:53-0 [Conf]
  4. Siv Hilde Houmb, Jan Jürjens
    Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec. [Citation Graph (0, 0)][DBLP]
    APSEC, 2003, pp:488-0 [Conf]
  5. Gerhard Popp, Jan Jürjens, Guido Wimmel, Ruth Breu
    Security-Critical System Development with Extended Use Cases. [Citation Graph (0, 0)][DBLP]
    APSEC, 2003, pp:478-487 [Conf]
  6. Haralambos Mouratidis, Jan Jürjens, Jorge Fox
    Towards a Comprehensive Framework for Secure Systems Development. [Citation Graph (0, 0)][DBLP]
    CAiSE, 2006, pp:48-62 [Conf]
  7. Jan Jürjens
    Secure Information Flow for Concurrent Processes. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2000, pp:395-409 [Conf]
  8. Daniel Ratiu, Jan Jürjens
    The Reality of Libraries. [Citation Graph (0, 0)][DBLP]
    CSMR, 2007, pp:307-318 [Conf]
  9. Jorge Fox, Jan Jürjens
    Introducing Security Aspects with Model Transformations. [Citation Graph (0, 0)][DBLP]
    ECBS, 2005, pp:543-549 [Conf]
  10. Jewgenij Botaschanjan, Jan Jürjens
    MoDeII: Modeling and Analyzing Time-Constraints. [Citation Graph (0, 0)][DBLP]
    ECBS, 2005, pp:299-306 [Conf]
  11. Jan Jürjens, Pasha Shabalin
    A Foundation for Tool-Supported Critical Systems Development with UML. [Citation Graph (0, 0)][DBLP]
    ECBS, 2004, pp:398-405 [Conf]
  12. Stefan Wagner, Jan Jürjens
    Model-Based Identification of Fault-Prone Components. [Citation Graph (0, 0)][DBLP]
    EDCC, 2005, pp:435-452 [Conf]
  13. Jan Jürjens
    Algebraic State Machines: Concepts and Applications to Security. [Citation Graph (0, 0)][DBLP]
    Ershov Memorial Conference, 2003, pp:338-343 [Conf]
  14. Jan Jürjens, Guido Wimmel
    Specification-Based Testing of Firewalls. [Citation Graph (0, 0)][DBLP]
    Ershov Memorial Conference, 2001, pp:308-316 [Conf]
  15. Jan Jürjens
    Towards Development of Secure Systems Using UMLsec. [Citation Graph (0, 0)][DBLP]
    FASE, 2001, pp:187-200 [Conf]
  16. Jan Jürjens, Pasha Shabalin
    Tools for Secure Systems Development with UML: Security Analysis with ATPs. [Citation Graph (0, 0)][DBLP]
    FASE, 2005, pp:305-309 [Conf]
  17. Jan Jürjens
    Secrecy-Preserving Refinement. [Citation Graph (0, 0)][DBLP]
    FME, 2001, pp:135-152 [Conf]
  18. Jan Jürjens
    Model-Based Security Engineering for Real. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:600-606 [Conf]
  19. Jan Jürjens
    Model-Based Security Engineering with UML: Introducing Security Aspects. [Citation Graph (0, 0)][DBLP]
    FMCO, 2005, pp:64-87 [Conf]
  20. Jan Jürjens
    Formal Semantics for Interacting UML subsystems. [Citation Graph (0, 0)][DBLP]
    FMOODS, 2002, pp:29-43 [Conf]
  21. Jan Jürjens
    Model-Based Security Engineering with UML. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2004, pp:42-77 [Conf]
  22. Jan Jürjens
    Towards using game semantics for crypto protocol verification: Lorenzen games. [Citation Graph (0, 0)][DBLP]
    GALOP, 2005, pp:241-257 [Conf]
  23. Jan Jürjens
    Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:231-240 [Conf]
  24. Jan Jürjens, Guido Wimmel
    Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. [Citation Graph (0, 0)][DBLP]
    I3E, 2001, pp:489-506 [Conf]
  25. Siv Hilde Houmb, Geri Georg, Robert B. France, James M. Bieman, Jan Jürjens
    Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:195-204 [Conf]
  26. Jan Jürjens, Markus Lehrhuber, Guido Wimmel
    Model-Based Design and Analysis of Permission-Based Security. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:224-233 [Conf]
  27. Guido Wimmel, Jan Jürjens
    Specification-Based Test Generation for Security-Critical Systems Using Mutations. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2002, pp:471-482 [Conf]
  28. Jan Jürjens
    Sound methods and effective tools for model-based security engineering with UML. [Citation Graph (0, 0)][DBLP]
    ICSE, 2005, pp:322-331 [Conf]
  29. Jan Jürjens, Jorge Fox
    Tools for model-based security engineering. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:819-822 [Conf]
  30. Bastian Best, Jan Jürjens, Bashar Nuseibeh
    Model-Based Security Engineering of Distributed Information Systems Using UMLsec. [Citation Graph (0, 0)][DBLP]
    ICSE, 2007, pp:581-590 [Conf]
  31. Jan Jürjens
    Understanding Security Goals Provided by Crypto-Protocol Implementations. [Citation Graph (0, 0)][DBLP]
    ICSM, 2005, pp:643-646 [Conf]
  32. Martin Deubler, Johannes Grünbauer, Jan Jürjens, Guido Wimmel
    Sound development of secure service-based systems. [Citation Graph (0, 0)][DBLP]
    ICSOC, 2004, pp:115-124 [Conf]
  33. Jan Jürjens, Siv Hilde Houmb
    Risk-Driven Development Of Security-Critical Systems Using UMLsec. [Citation Graph (0, 0)][DBLP]
    IFIP Congress Tutorials, 2004, pp:21-54 [Conf]
  34. Jan Jürjens
    Security Analysis of Crypto-based Java Programs using Automated Theorem Provers. [Citation Graph (0, 0)][DBLP]
    ASE, 2006, pp:167-176 [Conf]
  35. Jan Jürjens, Guido Wimmel
    Formally Testing Fail-Safety of Electronic Purse Protocols. [Citation Graph (0, 0)][DBLP]
    ASE, 2001, pp:408-411 [Conf]
  36. Jan Jürjens, Mark Yampolskiy
    Code security analysis with assertions. [Citation Graph (0, 0)][DBLP]
    ASE, 2005, pp:392-395 [Conf]
  37. Jan Jürjens, Siv Hilde Houmb
    Development of Safety-Critical Systems and Model-Based Risk Analysis with UML. [Citation Graph (0, 0)][DBLP]
    LADC, 2003, pp:364-365 [Conf]
  38. Jan Jürjens
    Verification of low-level crypto-protocol implementations using automated theorem proving. [Citation Graph (0, 0)][DBLP]
    MEMOCODE, 2005, pp:89-98 [Conf]
  39. Jan Jürjens
    Composability of Secrecy. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:28-38 [Conf]
  40. Robert Schmidt, Jan Jürjens
    Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem. [Citation Graph (0, 0)][DBLP]
    Modellierung, 2004, pp:309-310 [Conf]
  41. Johannes Grünbauer, Jan Jürjens, Guido Wimmel
    Modelling Secure IT Systems - A Survey. [Citation Graph (0, 0)][DBLP]
    Modellierung, 2004, pp:307-308 [Conf]
  42. Geri Georg, Siv Hilde Houmb, Robert B. France, Steffen Zschaler, Dorina C. Petriu, Jan Jürjens
    Critical Systems Development Using Modeling Languages - CSDUML 2006 Workshop Report. [Citation Graph (0, 0)][DBLP]
    MoDELS Workshops, 2006, pp:27-31 [Conf]
  43. Jan Jürjens
    Secure Java Development with UML. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:107-124 [Conf]
  44. Stefan Wagner, Jan Jürjens, Claudia Koller, Peter Trischberger
    Comparing Bug Finding Tools with Reviews and Tests. [Citation Graph (0, 0)][DBLP]
    TestCom, 2005, pp:40-55 [Conf]
  45. Jan Jürjens
    A UML statecharts semantics with message-passing. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:1009-1013 [Conf]
  46. Jan Jürjens
    Using UMLsec and goal trees for secure systems development. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:1026-1030 [Conf]
  47. Johannes Grünbauer, H. Hollmann, Jan Jürjens, Guido Wimmel
    Modelling and Verification of Layered Security Protocols: A Bank Application. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2003, pp:116-129 [Conf]
  48. Jan Jürjens
    Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:93-108 [Conf]
  49. Jan Jürjens
    Model-Based Security Engineering. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:- [Conf]
  50. Jan Jürjens, Johannes Grünbauer
    Critical Systems Development with UML: Overview with Automatic Case Study. [Citation Graph (0, 0)][DBLP]
    SNPD, 2003, pp:512-517 [Conf]
  51. Jan Jürjens
    Encapsulating Rules of Prudent Security Engineering. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:95-101 [Conf]
  52. Jan Jürjens
    Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:102-106 [Conf]
  53. Martín Abadi, Jan Jürjens
    Formal Eavesdropping and Its Computational Interpretation. [Citation Graph (0, 0)][DBLP]
    TACS, 2001, pp:82-94 [Conf]
  54. Jan Jürjens
    UMLsec: Extending UML for Secure Systems Development. [Citation Graph (0, 0)][DBLP]
    UML, 2002, pp:412-425 [Conf]
  55. Jan Jürjens
    Developing Safety-Critical Systems with UML. [Citation Graph (0, 0)][DBLP]
    UML, 2003, pp:360-372 [Conf]
  56. Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer
    Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). [Citation Graph (0, 0)][DBLP]
    UML Satellite Activities, 2004, pp:76-84 [Conf]
  57. Jan Jürjens, Siv Hilde Houmb
    Dynamic Secure Aspect Modeling with UML: From Models to Code. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2005, pp:142-155 [Conf]
  58. Jan Jürjens, Pasha Shabalin
    Automated Verification of UMLsec Models for Security Requirements. [Citation Graph (0, 0)][DBLP]
    UML, 2004, pp:365-379 [Conf]
  59. Jan Jürjens, Pasha Shabalin
    Tools for Critical Systems Development with UML (Tool Demo). [Citation Graph (0, 0)][DBLP]
    UML Satellite Activities, 2004, pp:250-253 [Conf]
  60. Dorina C. Petriu, C. Murray Woodside, Dorin Bogdan Petriu, Jing Xu, Toqeer Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens
    Performance analysis of security aspects in UML models. [Citation Graph (0, 0)][DBLP]
    WOSP, 2007, pp:91-102 [Conf]
  61. Jan Jürjens
    Foundations for Designing Secure Architectures. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:31-46 [Journal]
  62. Jan Jürjens
    Componentware for Critical Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2004, v:3, n:4, pp:47-50 [Journal]
  63. Jan Jürjens
    Developing Secure Embedded Systems: Pitfalls and How to Avoid Them. [Citation Graph (0, 0)][DBLP]
    ICSE Companion, 2007, pp:182-183 [Conf]

  64. Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. [Citation Graph (, )][DBLP]

  65. Extracting Domain Ontologies from Domain Specific APIs. [Citation Graph (, )][DBLP]

  66. A Framework for Analyzing Composition of Security Aspects. [Citation Graph (, )][DBLP]

  67. Incorporating Database Systems into a Secure Software Development Methodology. [Citation Graph (, )][DBLP]

  68. Automated Analysis of Permission-Based Security Using UMLsec. [Citation Graph (, )][DBLP]

  69. Security protocols, properties, and their monitoring. [Citation Graph (, )][DBLP]

  70. Rubacon: automated support for model-based compliance engineering. [Citation Graph (, )][DBLP]

  71. Model-based security analysis for mobile communications. [Citation Graph (, )][DBLP]

  72. The 6th International Workshop on Software Engineering for Secure Systems (SESS'10). [Citation Graph (, )][DBLP]

  73. Traceability for the maintenance of secure software. [Citation Graph (, )][DBLP]

  74. Finite Models in FOL-Based Crypto-Protocol Verification. [Citation Graph (, )][DBLP]

  75. Evaluating the Reference and Representation of Domain Concepts in APIs. [Citation Graph (, )][DBLP]

  76. Tools for model-based security engineering: models vs. code. [Citation Graph (, )][DBLP]

  77. Tools for Traceability in Secure Software Development. [Citation Graph (, )][DBLP]

  78. Tool support for code generation from a UMLsec property. [Citation Graph (, )][DBLP]

  79. Model-Based Quality Assurance of Automotive Software. [Citation Graph (, )][DBLP]

  80. First International Modeling Security Workshop. [Citation Graph (, )][DBLP]

  81. Security Analysis of a Biometric Authentication System Using UMLsec and JML. [Citation Graph (, )][DBLP]

  82. Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). [Citation Graph (, )][DBLP]

  83. Towards the Secure Modelling of OLAP Users' Behaviour. [Citation Graph (, )][DBLP]

  84. The Logical Modularity of Programs. [Citation Graph (, )][DBLP]

  85. Model-Based Run-Time Checking of Security Permissions Using Guarded Objects. [Citation Graph (, )][DBLP]

  86. Formally-Based Black-Box Monitoring of Security Protocols. [Citation Graph (, )][DBLP]

  87. Tools for Traceable Security Verification. [Citation Graph (, )][DBLP]

  88. Runtime verification of cryptographic protocols. [Citation Graph (, )][DBLP]

  89. Model-based Security Testing Using UMLsec: A Case Study. [Citation Graph (, )][DBLP]

  90. Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project. [Citation Graph (, )][DBLP]

Search in 0.008secs, Finished in 0.012secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002