The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Guido Wimmel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jan Romberg, Jan Jürjens, Guido Wimmel, Oscar Slotosch, Gabor Hahn
    AutoFOCUS and the MoDe Tool. [Citation Graph (0, 0)][DBLP]
    ACSD, 2003, pp:249-250 [Conf]
  2. Martin Deubler, Johannes Grünbauer, Gerhard Popp, Guido Wimmel, Chris Salzmann
    Tool Supported Development of Service-Based Systems. [Citation Graph (0, 0)][DBLP]
    APSEC, 2004, pp:99-108 [Conf]
  3. Gerhard Popp, Jan Jürjens, Guido Wimmel, Ruth Breu
    Security-Critical System Development with Extended Use Cases. [Citation Graph (0, 0)][DBLP]
    APSEC, 2003, pp:478-487 [Conf]
  4. Jan Jürjens, Guido Wimmel
    Specification-Based Testing of Firewalls. [Citation Graph (0, 0)][DBLP]
    Ershov Memorial Conference, 2001, pp:308-316 [Conf]
  5. Jan Jürjens, Guido Wimmel
    Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. [Citation Graph (0, 0)][DBLP]
    I3E, 2001, pp:489-506 [Conf]
  6. Jan Jürjens, Markus Lehrhuber, Guido Wimmel
    Model-Based Design and Analysis of Permission-Based Security. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:224-233 [Conf]
  7. Guido Wimmel, Jan Jürjens
    Specification-Based Test Generation for Security-Critical Systems Using Mutations. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2002, pp:471-482 [Conf]
  8. Martin Deubler, Johannes Grünbauer, Jan Jürjens, Guido Wimmel
    Sound development of secure service-based systems. [Citation Graph (0, 0)][DBLP]
    ICSOC, 2004, pp:115-124 [Conf]
  9. David Bettencourt da Cruz, Bernhard Rumpe, Guido Wimmel
    Retrofitting Security into a Web-Based Information System. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:301-305 [Conf]
  10. Jan Jürjens, Guido Wimmel
    Formally Testing Fail-Safety of Electronic Purse Protocols. [Citation Graph (0, 0)][DBLP]
    ASE, 2001, pp:408-411 [Conf]
  11. Johannes Grünbauer, Jan Jürjens, Guido Wimmel
    Modelling Secure IT Systems - A Survey. [Citation Graph (0, 0)][DBLP]
    Modellierung, 2004, pp:307-308 [Conf]
  12. Johannes Grünbauer, H. Hollmann, Jan Jürjens, Guido Wimmel
    Modelling and Verification of Layered Security Protocols: A Bank Application. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2003, pp:116-129 [Conf]
  13. Guido Wimmel, Alexander K. Wißpeintner
    Extended Description Techniques for Security Engineering. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:469-0 [Conf]
  14. Monika Vetterling, Guido Wimmel, Alexander K. Wißpeintner
    Secure systems development based on the common criteria: the PalME project. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 2002, pp:129-138 [Conf]
  15. Guido Wimmel, Heiko Lötzbeyer, Alexander Pretschner, Oscar Slotosch
    Specification based test sequence generation with propositional logic. [Citation Graph (0, 0)][DBLP]
    Softw. Test., Verif. Reliab., 2000, v:10, n:4, pp:229-248 [Journal]

Search in 0.021secs, Finished in 0.022secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002