Search the dblp DataBase
Jan Jürjens :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jan Jürjens Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:138-149 [Conf ] Jan Romberg , Jan Jürjens , Guido Wimmel , Oscar Slotosch , Gabor Hahn AutoFOCUS and the MoDe Tool. [Citation Graph (0, 0)][DBLP ] ACSD, 2003, pp:249-250 [Conf ] Jan Jürjens Abstracting from Failure Probabilities. [Citation Graph (0, 0)][DBLP ] ACSD, 2001, pp:53-0 [Conf ] Siv Hilde Houmb , Jan Jürjens Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec. [Citation Graph (0, 0)][DBLP ] APSEC, 2003, pp:488-0 [Conf ] Gerhard Popp , Jan Jürjens , Guido Wimmel , Ruth Breu Security-Critical System Development with Extended Use Cases. [Citation Graph (0, 0)][DBLP ] APSEC, 2003, pp:478-487 [Conf ] Haralambos Mouratidis , Jan Jürjens , Jorge Fox Towards a Comprehensive Framework for Secure Systems Development. [Citation Graph (0, 0)][DBLP ] CAiSE, 2006, pp:48-62 [Conf ] Jan Jürjens Secure Information Flow for Concurrent Processes. [Citation Graph (0, 0)][DBLP ] CONCUR, 2000, pp:395-409 [Conf ] Daniel Ratiu , Jan Jürjens The Reality of Libraries. [Citation Graph (0, 0)][DBLP ] CSMR, 2007, pp:307-318 [Conf ] Jorge Fox , Jan Jürjens Introducing Security Aspects with Model Transformations. [Citation Graph (0, 0)][DBLP ] ECBS, 2005, pp:543-549 [Conf ] Jewgenij Botaschanjan , Jan Jürjens MoDeII: Modeling and Analyzing Time-Constraints. [Citation Graph (0, 0)][DBLP ] ECBS, 2005, pp:299-306 [Conf ] Jan Jürjens , Pasha Shabalin A Foundation for Tool-Supported Critical Systems Development with UML. [Citation Graph (0, 0)][DBLP ] ECBS, 2004, pp:398-405 [Conf ] Stefan Wagner , Jan Jürjens Model-Based Identification of Fault-Prone Components. [Citation Graph (0, 0)][DBLP ] EDCC, 2005, pp:435-452 [Conf ] Jan Jürjens Algebraic State Machines: Concepts and Applications to Security. [Citation Graph (0, 0)][DBLP ] Ershov Memorial Conference, 2003, pp:338-343 [Conf ] Jan Jürjens , Guido Wimmel Specification-Based Testing of Firewalls. [Citation Graph (0, 0)][DBLP ] Ershov Memorial Conference, 2001, pp:308-316 [Conf ] Jan Jürjens Towards Development of Secure Systems Using UMLsec. [Citation Graph (0, 0)][DBLP ] FASE, 2001, pp:187-200 [Conf ] Jan Jürjens , Pasha Shabalin Tools for Secure Systems Development with UML: Security Analysis with ATPs. [Citation Graph (0, 0)][DBLP ] FASE, 2005, pp:305-309 [Conf ] Jan Jürjens Secrecy-Preserving Refinement. [Citation Graph (0, 0)][DBLP ] FME, 2001, pp:135-152 [Conf ] Jan Jürjens Model-Based Security Engineering for Real. [Citation Graph (0, 0)][DBLP ] FM, 2006, pp:600-606 [Conf ] Jan Jürjens Model-Based Security Engineering with UML: Introducing Security Aspects. [Citation Graph (0, 0)][DBLP ] FMCO, 2005, pp:64-87 [Conf ] Jan Jürjens Formal Semantics for Interacting UML subsystems. [Citation Graph (0, 0)][DBLP ] FMOODS, 2002, pp:29-43 [Conf ] Jan Jürjens Model-Based Security Engineering with UML. [Citation Graph (0, 0)][DBLP ] FOSAD, 2004, pp:42-77 [Conf ] Jan Jürjens Towards using game semantics for crypto protocol verification: Lorenzen games. [Citation Graph (0, 0)][DBLP ] GALOP, 2005, pp:241-257 [Conf ] Jan Jürjens Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol. [Citation Graph (0, 0)][DBLP ] HASE, 2004, pp:231-240 [Conf ] Jan Jürjens , Guido Wimmel Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. [Citation Graph (0, 0)][DBLP ] I3E, 2001, pp:489-506 [Conf ] Siv Hilde Houmb , Geri Georg , Robert B. France , James M. Bieman , Jan Jürjens Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development. [Citation Graph (0, 0)][DBLP ] ICECCS, 2005, pp:195-204 [Conf ] Jan Jürjens , Markus Lehrhuber , Guido Wimmel Model-Based Design and Analysis of Permission-Based Security. [Citation Graph (0, 0)][DBLP ] ICECCS, 2005, pp:224-233 [Conf ] Guido Wimmel , Jan Jürjens Specification-Based Test Generation for Security-Critical Systems Using Mutations. [Citation Graph (0, 0)][DBLP ] ICFEM, 2002, pp:471-482 [Conf ] Jan Jürjens Sound methods and effective tools for model-based security engineering with UML. [Citation Graph (0, 0)][DBLP ] ICSE, 2005, pp:322-331 [Conf ] Jan Jürjens , Jorge Fox Tools for model-based security engineering. [Citation Graph (0, 0)][DBLP ] ICSE, 2006, pp:819-822 [Conf ] Bastian Best , Jan Jürjens , Bashar Nuseibeh Model-Based Security Engineering of Distributed Information Systems Using UMLsec. [Citation Graph (0, 0)][DBLP ] ICSE, 2007, pp:581-590 [Conf ] Jan Jürjens Understanding Security Goals Provided by Crypto-Protocol Implementations. [Citation Graph (0, 0)][DBLP ] ICSM, 2005, pp:643-646 [Conf ] Martin Deubler , Johannes Grünbauer , Jan Jürjens , Guido Wimmel Sound development of secure service-based systems. [Citation Graph (0, 0)][DBLP ] ICSOC, 2004, pp:115-124 [Conf ] Jan Jürjens , Siv Hilde Houmb Risk-Driven Development Of Security-Critical Systems Using UMLsec. [Citation Graph (0, 0)][DBLP ] IFIP Congress Tutorials, 2004, pp:21-54 [Conf ] Jan Jürjens Security Analysis of Crypto-based Java Programs using Automated Theorem Provers. [Citation Graph (0, 0)][DBLP ] ASE, 2006, pp:167-176 [Conf ] Jan Jürjens , Guido Wimmel Formally Testing Fail-Safety of Electronic Purse Protocols. [Citation Graph (0, 0)][DBLP ] ASE, 2001, pp:408-411 [Conf ] Jan Jürjens , Mark Yampolskiy Code security analysis with assertions. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:392-395 [Conf ] Jan Jürjens , Siv Hilde Houmb Development of Safety-Critical Systems and Model-Based Risk Analysis with UML. [Citation Graph (0, 0)][DBLP ] LADC, 2003, pp:364-365 [Conf ] Jan Jürjens Verification of low-level crypto-protocol implementations using automated theorem proving. [Citation Graph (0, 0)][DBLP ] MEMOCODE, 2005, pp:89-98 [Conf ] Jan Jürjens Composability of Secrecy. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:28-38 [Conf ] Robert Schmidt , Jan Jürjens Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem. [Citation Graph (0, 0)][DBLP ] Modellierung, 2004, pp:309-310 [Conf ] Johannes Grünbauer , Jan Jürjens , Guido Wimmel Modelling Secure IT Systems - A Survey. [Citation Graph (0, 0)][DBLP ] Modellierung, 2004, pp:307-308 [Conf ] Geri Georg , Siv Hilde Houmb , Robert B. France , Steffen Zschaler , Dorina C. Petriu , Jan Jürjens Critical Systems Development Using Modeling Languages - CSDUML 2006 Workshop Report. [Citation Graph (0, 0)][DBLP ] MoDELS Workshops, 2006, pp:27-31 [Conf ] Jan Jürjens Secure Java Development with UML. [Citation Graph (0, 0)][DBLP ] Network Security, 2001, pp:107-124 [Conf ] Stefan Wagner , Jan Jürjens , Claudia Koller , Peter Trischberger Comparing Bug Finding Tools with Reviews and Tests. [Citation Graph (0, 0)][DBLP ] TestCom, 2005, pp:40-55 [Conf ] Jan Jürjens A UML statecharts semantics with message-passing. [Citation Graph (0, 0)][DBLP ] SAC, 2002, pp:1009-1013 [Conf ] Jan Jürjens Using UMLsec and goal trees for secure systems development. [Citation Graph (0, 0)][DBLP ] SAC, 2002, pp:1026-1030 [Conf ] Johannes Grünbauer , H. Hollmann , Jan Jürjens , Guido Wimmel Modelling and Verification of Layered Security Protocols: A Bank Application. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2003, pp:116-129 [Conf ] Jan Jürjens Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:93-108 [Conf ] Jan Jürjens Model-Based Security Engineering. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:- [Conf ] Jan Jürjens , Johannes Grünbauer Critical Systems Development with UML: Overview with Automatic Case Study. [Citation Graph (0, 0)][DBLP ] SNPD, 2003, pp:512-517 [Conf ] Jan Jürjens Encapsulating Rules of Prudent Security Engineering. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:95-101 [Conf ] Jan Jürjens Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:102-106 [Conf ] Martín Abadi , Jan Jürjens Formal Eavesdropping and Its Computational Interpretation. [Citation Graph (0, 0)][DBLP ] TACS, 2001, pp:82-94 [Conf ] Jan Jürjens UMLsec: Extending UML for Secure Systems Development. [Citation Graph (0, 0)][DBLP ] UML, 2002, pp:412-425 [Conf ] Jan Jürjens Developing Safety-Critical Systems with UML. [Citation Graph (0, 0)][DBLP ] UML, 2003, pp:360-372 [Conf ] Jan Jürjens , Eduardo B. Fernández , Robert B. France , Bernhard Rumpe , Constance L. Heitmeyer Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). [Citation Graph (0, 0)][DBLP ] UML Satellite Activities, 2004, pp:76-84 [Conf ] Jan Jürjens , Siv Hilde Houmb Dynamic Secure Aspect Modeling with UML: From Models to Code. [Citation Graph (0, 0)][DBLP ] MoDELS, 2005, pp:142-155 [Conf ] Jan Jürjens , Pasha Shabalin Automated Verification of UMLsec Models for Security Requirements. [Citation Graph (0, 0)][DBLP ] UML, 2004, pp:365-379 [Conf ] Jan Jürjens , Pasha Shabalin Tools for Critical Systems Development with UML (Tool Demo). [Citation Graph (0, 0)][DBLP ] UML Satellite Activities, 2004, pp:250-253 [Conf ] Dorina C. Petriu , C. Murray Woodside , Dorin Bogdan Petriu , Jing Xu , Toqeer Israr , Geri Georg , Robert B. France , James M. Bieman , Siv Hilde Houmb , Jan Jürjens Performance analysis of security aspects in UML models. [Citation Graph (0, 0)][DBLP ] WOSP, 2007, pp:91-102 [Conf ] Jan Jürjens Foundations for Designing Secure Architectures. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:31-46 [Journal ] Jan Jürjens Componentware for Critical Systems. [Citation Graph (0, 0)][DBLP ] Journal of Object Technology, 2004, v:3, n:4, pp:47-50 [Journal ] Jan Jürjens Developing Secure Embedded Systems: Pitfalls and How to Avoid Them. [Citation Graph (0, 0)][DBLP ] ICSE Companion, 2007, pp:182-183 [Conf ] Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. [Citation Graph (, )][DBLP ] Extracting Domain Ontologies from Domain Specific APIs. [Citation Graph (, )][DBLP ] A Framework for Analyzing Composition of Security Aspects. [Citation Graph (, )][DBLP ] Incorporating Database Systems into a Secure Software Development Methodology. [Citation Graph (, )][DBLP ] Automated Analysis of Permission-Based Security Using UMLsec. [Citation Graph (, )][DBLP ] Security protocols, properties, and their monitoring. [Citation Graph (, )][DBLP ] Rubacon: automated support for model-based compliance engineering. [Citation Graph (, )][DBLP ] Model-based security analysis for mobile communications. [Citation Graph (, )][DBLP ] The 6th International Workshop on Software Engineering for Secure Systems (SESS'10). [Citation Graph (, )][DBLP ] Traceability for the maintenance of secure software. [Citation Graph (, )][DBLP ] Finite Models in FOL-Based Crypto-Protocol Verification. [Citation Graph (, )][DBLP ] Evaluating the Reference and Representation of Domain Concepts in APIs. [Citation Graph (, )][DBLP ] Tools for model-based security engineering: models vs. code. [Citation Graph (, )][DBLP ] Tools for Traceability in Secure Software Development. [Citation Graph (, )][DBLP ] Tool support for code generation from a UMLsec property. [Citation Graph (, )][DBLP ] Model-Based Quality Assurance of Automotive Software. [Citation Graph (, )][DBLP ] First International Modeling Security Workshop. [Citation Graph (, )][DBLP ] Security Analysis of a Biometric Authentication System Using UMLsec and JML. [Citation Graph (, )][DBLP ] Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). [Citation Graph (, )][DBLP ] Towards the Secure Modelling of OLAP Users' Behaviour. [Citation Graph (, )][DBLP ] The Logical Modularity of Programs. [Citation Graph (, )][DBLP ] Model-Based Run-Time Checking of Security Permissions Using Guarded Objects. [Citation Graph (, )][DBLP ] Formally-Based Black-Box Monitoring of Security Protocols. [Citation Graph (, )][DBLP ] Tools for Traceable Security Verification. [Citation Graph (, )][DBLP ] Runtime verification of cryptographic protocols. [Citation Graph (, )][DBLP ] Model-based Security Testing Using UMLsec: A Case Study. [Citation Graph (, )][DBLP ] Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project. [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.012secs