default search action
BibTeX records: Jan Jürjens
@article{DBLP:journals/tse/PeldszusBJ24, author = {Sven Peldszus and Jens B{\"{u}}rger and Jan J{\"{u}}rjens}, title = {UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering}, journal = {{IEEE} Trans. Software Eng.}, volume = {50}, number = {1}, pages = {16--47}, year = {2024}, url = {https://doi.org/10.1109/TSE.2023.3326366}, doi = {10.1109/TSE.2023.3326366}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/PeldszusBJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SamaLPKJ24, author = {Malla Reddy Sama and Eike Lyczkowski and Michael Petry and Wolfgang Kiess and Jan J{\"{u}}rjens}, title = {5G-Enabled Flexible Security Framework for Industrial Applications}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2024, Denver, CO, USA, June 9-13, 2024}, pages = {708--714}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICC51166.2024.10622813}, doi = {10.1109/ICC51166.2024.10622813}, timestamp = {Mon, 02 Sep 2024 15:04:36 +0200}, biburl = {https://dblp.org/rec/conf/icc/SamaLPKJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/GrosserRJ24, author = {Katharina Gro{\ss}er and Marina Rukavitsyna and Jan J{\"{u}}rjens}, editor = {Rick Rabiser and Manuel Wimmer and Iris Groher and Andreas Wortmann and Bianca Wiesmayr}, title = {A Comparative Evaluation of Requirement Template Systems (Summary)}, booktitle = {Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26 - March 1, 2024}, series = {{LNI}}, volume = {{P-343}}, pages = {47--48}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sw2024\_10}, doi = {10.18420/SW2024\_10}, timestamp = {Mon, 11 Mar 2024 16:51:10 +0100}, biburl = {https://dblp.org/rec/conf/se/GrosserRJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/LohrPJS24, author = {Matthias Lohr and Sven Peldszus and Jan J{\"{u}}rjens and Steffen Staab}, title = {Fast, Favorable, and Fair Blockchain-based Exchange of Digital Goods using State Channels - Replication Package (Version 1)}, publisher = {Zenodo}, year = {2024}, month = mar, howpublished = {\url{https://doi.org/10.5281/zenodo.10793692}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.5281/zenodo.10793692}, doi = {10.5281/ZENODO.10793692}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/data/10/LohrPJS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-05987, author = {Anselm von Gladiss and Amir Shayan Ahmadian and Jan J{\"{u}}rjens}, title = {Reconstruction as a service: a data space for off-site image reconstruction in magnetic particle imaging}, journal = {CoRR}, volume = {abs/2401.05987}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.05987}, doi = {10.48550/ARXIV.2401.05987}, eprinttype = {arXiv}, eprint = {2401.05987}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-05987.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-09199, author = {Qusai Ramadan and Zeyd Boukhers and Muath AlShaikh and Christoph Lange and Jan J{\"{u}}rjens}, title = {Data Trading and Monetization: Challenges and Open Research Directions}, journal = {CoRR}, volume = {abs/2401.09199}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.09199}, doi = {10.48550/ARXIV.2401.09199}, eprinttype = {arXiv}, eprint = {2401.09199}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-09199.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/HassoGAGJ23, author = {Hussein Hasso and Katharina Gro{\ss}er and Iliass Aymaz and Hanna Geppert and Jan J{\"{u}}rjens}, title = {Enhanced abbreviation-expansion pair detection for glossary term extraction}, journal = {Inf. Softw. Technol.}, volume = {159}, pages = {107203}, year = {2023}, url = {https://doi.org/10.1016/j.infsof.2023.107203}, doi = {10.1016/J.INFSOF.2023.107203}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/HassoGAGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/BoukhersGJ23, author = {Zeyd Boukhers and Prantik Goswami and Jan J{\"{u}}rjens}, title = {Knowledge guided multi-filter residual convolutional neural network for {ICD} coding from clinical text}, journal = {Neural Comput. Appl.}, volume = {35}, number = {24}, pages = {17633--17644}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-08581-2}, doi = {10.1007/S00521-023-08581-2}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/BoukhersGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/TumaPSSJ23, author = {Katja Tuma and Sven Peldszus and Daniel Str{\"{u}}ber and Riccardo Scandariato and Jan J{\"{u}}rjens}, title = {Checking security compliance between models and code}, journal = {Softw. Syst. Model.}, volume = {22}, number = {1}, pages = {273--296}, year = {2023}, url = {https://doi.org/10.1007/s10270-022-00991-5}, doi = {10.1007/S10270-022-00991-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/TumaPSSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/BoukhersBYJ23, author = {Zeyd Boukhers and Azeddine Bouabdallah and Cong Yang and Jan J{\"{u}}rjens}, editor = {Ingo Frommholz and Frank Hopfgartner and Mark Lee and Michael Oakes and Mounia Lalmas and Min Zhang and Rodrygo L. T. Santos}, title = {Beyond Trading Data: The Hidden Influence of Public Awareness and Interest on Cryptocurrency Volatility}, booktitle = {Proceedings of the 32nd {ACM} International Conference on Information and Knowledge Management, {CIKM} 2023, Birmingham, United Kingdom, October 21-25, 2023}, pages = {142--151}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3583780.3614790}, doi = {10.1145/3583780.3614790}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/BoukhersBYJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfnds/RamadanBA0J23, author = {Qusai Ramadan and Zeyd Boukhers and Muath AlShaikh and Christoph Lange and Jan J{\"{u}}rjens}, title = {Data Trading and Monetization: Challenges and Open Research Directions}, booktitle = {Proceedings of the 7th International Conference on Future Networks and Distributed Systems, {ICFNDS} 2023, Dubai, United Arab Emirates, December 21-22, 2023}, pages = {344--351}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3644713.3644758}, doi = {10.1145/3644713.3644758}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfnds/RamadanBA0J23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GrosserRJ23, author = {Katharina Gro{\ss}er and Marina Rukavitsyna and Jan J{\"{u}}rjens}, editor = {Kurt Schneider and Fabiano Dalpiaz and Jennifer Horkoff}, title = {A Comparative Evaluation of Requirement Template Systems}, booktitle = {31st {IEEE} International Requirements Engineering Conference, {RE} 2023, Hannover, Germany, September 4-8, 2023}, pages = {41--52}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/RE57278.2023.00014}, doi = {10.1109/RE57278.2023.00014}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/GrosserRJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/HassoGAGJ23, author = {Hussein Hasso and Katharina Gro{\ss}er and Iliass Aymaz and Hanna Geppert and Jan J{\"{u}}rjens}, editor = {Kurt Schneider and Fabiano Dalpiaz and Jennifer Horkoff}, title = {{ILLOD} Replication Package: An Open-Source Framework for Abbreviation-Expansion Pair Detection and Term Consolidation in Requirements}, booktitle = {31st {IEEE} International Requirements Engineering Conference, {RE} 2023, Hannover, Germany, September 4-8, 2023}, pages = {369--370}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/RE57278.2023.00056}, doi = {10.1109/RE57278.2023.00056}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/HassoGAGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/GrosserRJ23, author = {Katharina Gro{\ss}er and Volker Riediger and Jan J{\"{u}}rjens}, editor = {Gregor Engels and Regina Hebig and Matthias Tichy}, title = {Requirements document relations: {A} reuse perspective on traceability through standards}, booktitle = {Software Engineering 2023, Fachtagung des GI-Fachbereichs Softwaretechnik, 20.-24. Februar 2023, Paderborn}, series = {{LNI}}, volume = {{P-332}}, pages = {57--58}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2023}, url = {https://dl.gi.de/handle/20.500.12116/40079}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/GrosserRJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/KonersmannK0HKR23, author = {Marco Konersmann and Angelika Kaplan and Thomas K{\"{u}}hn and Robert Heinrich and Anne Koziolek and Ralf H. Reussner and Jan J{\"{u}}rjens and Mahmood al{-}Doori and Nicolas Boltz and Marco Ehl and Dominik Fuch{\ss} and Katharina Gro{\ss}er and Sebastian Hahner and Jan Keim and Matthias Lohr and Timur Saglam and Sophie Schulz and Jan{-}Philipp T{\"{o}}berg}, editor = {Gregor Engels and Regina Hebig and Matthias Tichy}, title = {Evaluation Methods and Replicability of Software Architecture Research Objects}, booktitle = {Software Engineering 2023, Fachtagung des GI-Fachbereichs Softwaretechnik, 20.-24. Februar 2023, Paderborn}, series = {{LNI}}, volume = {{P-332}}, pages = {75--76}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2023}, url = {https://dl.gi.de/handle/20.500.12116/40089}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/KonersmannK0HKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bpmj/StockerHJ22, author = {Joachim Stocker and Nils Herda and Jan J{\"{u}}rjens}, title = {Life cycle and metrics to measure the resilience of business processes by considering resources}, journal = {Bus. Process. Manag. J.}, volume = {28}, number = {4}, pages = {1164--1182}, year = {2022}, url = {https://doi.org/10.1108/BPMJ-10-2021-0674}, doi = {10.1108/BPMJ-10-2021-0674}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bpmj/StockerHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/BoukhersHJ22, author = {Zeyd Boukhers and Timo Hartmann and Jan J{\"{u}}rjens}, title = {{COIN:} Counterfactual Image Generation for Visual Question Answering Interpretation}, journal = {Sensors}, volume = {22}, number = {6}, pages = {2245}, year = {2022}, url = {https://doi.org/10.3390/s22062245}, doi = {10.3390/S22062245}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/BoukhersHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/GrosserRJ22, author = {Katharina Gro{\ss}er and Volker Riediger and Jan J{\"{u}}rjens}, title = {Requirements document relations}, journal = {Softw. Syst. Model.}, volume = {21}, number = {6}, pages = {1--37}, year = {2022}, url = {https://doi.org/10.1007/s10270-021-00958-y}, doi = {10.1007/S10270-021-00958-Y}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sosym/GrosserRJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/LohrSKJS22, author = {Matthias Lohr and Kenneth Skiba and Marco Konersmann and Jan J{\"{u}}rjens and Steffen Staab}, title = {Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2022, Shanghai, China, May 2-5, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICBC54727.2022.9805522}, doi = {10.1109/ICBC54727.2022.9805522}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/LohrSKJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsa/KonersmannK0HKR22, author = {Marco Konersmann and Angelika Kaplan and Thomas K{\"{u}}hn and Robert Heinrich and Anne Koziolek and Ralf H. Reussner and Jan J{\"{u}}rjens and Mahmood al{-}Doori and Nicolas Boltz and Marco Ehl and Dominik Fuch{\ss} and Katharina Gro{\ss}er and Sebastian Hahner and Jan Keim and Matthias Lohr and Timur Saglam and Sophie Schulz and Jan{-}Philipp T{\"{o}}berg}, title = {Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects"}, booktitle = {{IEEE} 19th International Conference on Software Architecture Companion, {ICSA} Companion 2022, Honolulu, HI, USA, March 12-15, 2022}, pages = {58}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICSA-C54293.2022.00021}, doi = {10.1109/ICSA-C54293.2022.00021}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsa/KonersmannK0HKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsa/KonersmannKKHKR22, author = {Marco Konersmann and Angelika Kaplan and Thomas K{\"{u}}hn and Robert Heinrich and Anne Koziolek and Ralf H. Reussner and Jan J{\"{u}}rjens and Mahmood al{-}Doori and Nicolas Boltz and Marco Ehl and Dominik Fuch{\ss} and Katharina Gro{\ss}er and Sebastian Hahner and Jan Keim and Matthias Lohr and Timur Saglam and Sophie Schulz and Jan{-}Philipp T{\"{o}}berg}, title = {Evaluation Methods and Replicability of Software Architecture Research Objects}, booktitle = {19th {IEEE} International Conference on Software Architecture, {ICSA} 2022, Honolulu, HI, USA, March 12-15, 2022}, pages = {157--168}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICSA53651.2022.00023}, doi = {10.1109/ICSA53651.2022.00023}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsa/KonersmannKKHKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieem/VernickelSKJ22, author = {Kilian Vernickel and Mayank Singh and Marco Konersmann and Jan J{\"{u}}rjens}, title = {Ontology-based Synchronization of Automated Production Systems and Their Simulation Models}, booktitle = {{IEEE} International Conference on Industrial Engineering and Engineering Management, {IEEM} 2022, Kuala Lumpur, Malaysia, December 7-10, 2022}, pages = {660--664}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IEEM55944.2022.9989593}, doi = {10.1109/IEEM55944.2022.9989593}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ieem/VernickelSKJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/SamaKGTJ22, author = {Malla Reddy Sama and Wolfgang Kiess and Riccardo Guerzoni and Srisakul Thakolsri and Jan J{\"{u}}rjens}, title = {Redefining the Trust Model for the Internet of Everything in the 6G era}, booktitle = {2022 {IEEE} 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Kyoto, Japan, September 12-15, 2022}, pages = {1400--1406}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/PIMRC54779.2022.9977941}, doi = {10.1109/PIMRC54779.2022.9977941}, timestamp = {Tue, 09 May 2023 13:13:50 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/SamaKGTJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refsq/HassoGAGJ22, author = {Hussein Hasso and Katharina Gro{\ss}er and Iliass Aymaz and Hanna Geppert and Jan J{\"{u}}rjens}, editor = {Vincenzo Gervasi and Andreas Vogelsang}, title = {Abbreviation-Expansion Pair Detection for Glossary Term Extraction}, booktitle = {Requirements Engineering: Foundation for Software Quality - 28th International Working Conference, {REFSQ} 2022, Birmingham, UK, March 21-24, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13216}, pages = {63--78}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98464-9\_6}, doi = {10.1007/978-3-030-98464-9\_6}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/refsq/HassoGAGJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/22/JurjensSY022, author = {Jan J{\"{u}}rjens and Simon Scheider and Furkan Yildirim and Michael Henke}, editor = {Boris Otto and Michael ten Hompel and Stefan Wrobel}, title = {Tokenomics: Decentralized Incentivization in the Context of Data Spaces}, booktitle = {Designing Data Spaces: The Ecosystem Approach to Competitive Advantage}, pages = {91--108}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-93975-5\_6}, doi = {10.1007/978-3-030-93975-5\_6}, timestamp = {Wed, 07 Dec 2022 23:14:27 +0100}, biburl = {https://dblp.org/rec/books/sp/22/JurjensSY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/22/CaceresVPPGKBKMTKNMMLAJ22, author = {Santiago C{\'{a}}ceres Elvira and Francisco Valverde and Carlos Enrique Palau and Andreu Belsa Pellicer and Christos A. Gizelis and Dimosthenes Krassas and Hanane Becha and R{\'{e}}da Khouani and Andreas Metzger and Nikos Tzagkarakis and Anthousa Karkoglou and Anastasios Nikolakopoulos and Achilleas Marinakis and Vrettos Moulos and Antonios Litke and Amir Shayan Ahmadian and Jan J{\"{u}}rjens}, editor = {Edward Curry and S{\"{o}}ren Auer and Arne J. Berre and Andreas Metzger and Mar{\'{\i}}a S. P{\'{e}}rez and Sonja Zillner}, title = {Towards Cognitive Ports of the Future}, booktitle = {Technologies and Applications for Big Data Value}, pages = {453--474}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-78307-5\_20}, doi = {10.1007/978-3-030-78307-5\_20}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/22/CaceresVPPGKBKMTKNMMLAJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-03342, author = {Zeyd Boukhers and Timo Hartmann and Jan J{\"{u}}rjens}, title = {{COIN:} Counterfactual Image Generation for {VQA} Interpretation}, journal = {CoRR}, volume = {abs/2201.03342}, year = {2022}, url = {https://arxiv.org/abs/2201.03342}, eprinttype = {arXiv}, eprint = {2201.03342}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-03342.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-08967, author = {Zeyd Boukhers and Azeddine Bouabdallah and Matthias Lohr and Jan J{\"{u}}rjens}, title = {Ensemble and Multimodal Approach for Forecasting Cryptocurrency Price}, journal = {CoRR}, volume = {abs/2202.08967}, year = {2022}, url = {https://arxiv.org/abs/2202.08967}, eprinttype = {arXiv}, eprint = {2202.08967}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-08967.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-05925, author = {Matthias Lohr and Kenneth Skiba and Marco Konersmann and Jan J{\"{u}}rjens and Steffen Staab}, title = {Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain (Extended Version)}, journal = {CoRR}, volume = {abs/2203.05925}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.05925}, doi = {10.48550/ARXIV.2203.05925}, eprinttype = {arXiv}, eprint = {2203.05925}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-05925.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/PeldszusBKJ21, author = {Sven Peldszus and Jens B{\"{u}}rger and Timo Kehrer and Jan J{\"{u}}rjens}, title = {Ontology-driven evolution of software security}, journal = {Data Knowl. Eng.}, volume = {134}, pages = {101907}, year = {2021}, url = {https://doi.org/10.1016/j.datak.2021.101907}, doi = {10.1016/J.DATAK.2021.101907}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dke/PeldszusBKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/SadiAJ21, author = {Muhammad Sheikh Sadi and Waseem Ahmed and Jan J{\"{u}}rjens}, title = {Towards Tolerating Soft Errors for Embedded Systems}, journal = {{SN} Comput. Sci.}, volume = {2}, number = {2}, pages = {101}, year = {2021}, url = {https://doi.org/10.1007/s42979-021-00497-9}, doi = {10.1007/S42979-021-00497-9}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sncs/SadiAJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/SamaGKTJ21, author = {Malla Reddy Sama and Riccardo Guerzoni and Wolfgang Kiess and Srisakul Thakolsri and Jan J{\"{u}}rjens}, title = {Why is Application Reliability an Issue for an Ultra-Reliable 6G Network?}, booktitle = {Joint European Conference on Networks and Communications {\&} 6G Summit, EuCNC/6G Summit 2021, Porto, Portugal, June 8-11, 2021}, pages = {568--573}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuCNC/6GSummit51104.2021.9482540}, doi = {10.1109/EUCNC/6GSUMMIT51104.2021.9482540}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eucnc/SamaGKTJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-08579, author = {Katja Tuma and Sven Peldszus and Daniel Str{\"{u}}ber and Riccardo Scandariato and Jan J{\"{u}}rjens}, title = {Checking Security Compliance between Models and Code}, journal = {CoRR}, volume = {abs/2108.08579}, year = {2021}, url = {https://arxiv.org/abs/2108.08579}, eprinttype = {arXiv}, eprint = {2108.08579}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-08579.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LohrSJS21, author = {Matthias Lohr and Benjamin Schlosser and Jan J{\"{u}}rjens and Steffen Staab}, title = {Cost Fairness for Blockchain-Based Two-Party Exchange Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2021}, url = {https://eprint.iacr.org/2021/166}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LohrSJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/PapePJM20, author = {Sebastian Pape and Federica Paci and Jan J{\"{u}}rjens and Fabio Massacci}, title = {Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach}, journal = {Inf.}, volume = {11}, number = {5}, pages = {261}, year = {2020}, url = {https://doi.org/10.3390/info11050261}, doi = {10.3390/INFO11050261}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/PapePJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/RamadanSSJRS20, author = {Qusai Ramadan and Daniel Str{\"{u}}ber and Mattia Salnitri and Jan J{\"{u}}rjens and Volker Riediger and Steffen Staab}, title = {A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements}, journal = {Softw. Syst. Model.}, volume = {19}, number = {5}, pages = {1191--1227}, year = {2020}, url = {https://doi.org/10.1007/s10270-020-00781-x}, doi = {10.1007/S10270-020-00781-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/RamadanSSJRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/LohrSJS20, author = {Matthias Lohr and Benjamin Schlosser and Jan J{\"{u}}rjens and Steffen Staab}, title = {Cost Fairness for Blockchain-Based Two-Party Exchange Protocols}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes, Greece, November 2-6, 2020}, pages = {428--435}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/Blockchain50366.2020.00062}, doi = {10.1109/BLOCKCHAIN50366.2020.00062}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/LohrSJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/BurgerKJ20, author = {Jens B{\"{u}}rger and Timo Kehrer and Jan J{\"{u}}rjens}, editor = {Fabiano Dalpiaz and Jelena Zdravkovic and Pericles Loucopoulos}, title = {Ontology Evolution in the Context of Model-Based Secure Software Engineering}, booktitle = {Research Challenges in Information Science - 14th International Conference, {RCIS} 2020, Limassol, Cyprus, September 23-25, 2020, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {385}, pages = {437--454}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-50316-1\_26}, doi = {10.1007/978-3-030-50316-1\_26}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rcis/BurgerKJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/PeldszusT0JS20, author = {Sven Peldszus and Katja Tuma and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens and Riccardo Scandariato}, editor = {Michael Felderer and Wilhelm Hasselbring and Rick Rabiser and Reiner Jung}, title = {Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings}, booktitle = {Software Engineering 2020, Fachtagung des GI-Fachbereichs Softwaretechnik, 24.-28. Februar 2020, Innsbruck, Austria}, series = {{LNI}}, volume = {{P-300}}, pages = {51--52}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/SE2020\_13}, doi = {10.18420/SE2020\_13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/PeldszusT0JS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/AhmadianPJSGMR20, author = {Amir Shayan Ahmadian and Sven Peldszus and Jan J{\"{u}}rjens and Mattia Salnitri and Paolo Giorgini and Haralambos Mouratidis and Jos{\'{e}} Fran. Ruiz}, editor = {Mattia Salnitri and Jan J{\"{u}}rjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, title = {The Architecture of VisiOn Privacy Platform}, booktitle = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, series = {Lecture Notes in Computer Science}, volume = {12030}, pages = {54--76}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59944-7\_3}, doi = {10.1007/978-3-030-59944-7\_3}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/AhmadianPJSGMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/PeldszusASJPM20, author = {Sven Peldszus and Amir Shayan Ahmadian and Mattia Salnitri and Jan J{\"{u}}rjens and Michalis Pavlidis and Haralambos Mouratidis}, editor = {Mattia Salnitri and Jan J{\"{u}}rjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, title = {Visual Privacy Management}, booktitle = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, series = {Lecture Notes in Computer Science}, volume = {12030}, pages = {77--108}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59944-7\_4}, doi = {10.1007/978-3-030-59944-7\_4}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/PeldszusASJPM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/12030, editor = {Mattia Salnitri and Jan J{\"{u}}rjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, title = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, series = {Lecture Notes in Computer Science}, volume = {12030}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59944-7}, doi = {10.1007/978-3-030-59944-7}, isbn = {978-3-030-59943-0}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/12030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/LohrHJS19, author = {Matthias Lohr and Jonathan Hund and Jan J{\"{u}}rjens and Steffen Staab}, title = {Ensuring Genuineness for Selectively Disclosed Confidential Data Using Distributed Ledgers: Applications to Rail Wayside Monitoring}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {477--482}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00072}, doi = {10.1109/BLOCKCHAIN.2019.00072}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/LohrHJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/PeldszusT0JS19, author = {Sven Peldszus and Katja Tuma and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens and Riccardo Scandariato}, editor = {Marouane Kessentini and Tao Yue and Alexander Pretschner and Sebastian Voss and Loli Burgue{\~{n}}o}, title = {Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings}, booktitle = {22nd {ACM/IEEE} International Conference on Model Driven Engineering Languages and Systems, {MODELS} 2019, Munich, Germany, September 15-20, 2019}, pages = {23--33}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/MODELS.2019.00-18}, doi = {10.1109/MODELS.2019.00-18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/models/PeldszusT0JS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/Ahmadian0J19, author = {Amir Shayan Ahmadian and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {Privacy-enhanced system design modeling based on privacy features}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {1492--1499}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297431}, doi = {10.1145/3297280.3297431}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/Ahmadian0J19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/RamadanAJS019, author = {Qusai Ramadan and Amir Shayan Ahmadian and Jan J{\"{u}}rjens and Steffen Staab and Daniel Str{\"{u}}ber}, editor = {Steffen Becker and Ivan Bogicevic and Georg Herzwurm and Stefan Wagner}, title = {Explaining Algorithmic Decisions with respect to Fairness}, booktitle = {Software Engineering and Software Management, {SE/SWM} 2019, Stuttgart, Germany, February 18-22, 2019}, series = {{LNI}}, volume = {{P-292}}, pages = {161--162}, publisher = {{GI}}, year = {2019}, url = {https://doi.org/10.18420/se2019-50}, doi = {10.18420/SE2019-50}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/RamadanAJS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/Burger00RJS19, author = {Jens B{\"{u}}rger and Daniel Str{\"{u}}ber and Stefan G{\"{a}}rtner and Thomas Ruhroth and Jan J{\"{u}}rjens and Kurt Schneider}, editor = {Steffen Becker and Ivan Bogicevic and Georg Herzwurm and Stefan Wagner}, title = {A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary)}, booktitle = {Software Engineering and Software Management, {SE/SWM} 2019, Stuttgart, Germany, February 18-22, 2019}, series = {{LNI}}, volume = {{P-292}}, pages = {179--180}, publisher = {{GI}}, year = {2019}, url = {https://doi.org/10.18420/se2019-57}, doi = {10.18420/SE2019-57}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/Burger00RJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/JurjensSBV0GRHTKFLLH19, author = {Jan J{\"{u}}rjens and Kurt Schneider and Jens B{\"{u}}rger and Fabien Patrick Viertel and Daniel Str{\"{u}}ber and Michael Goedicke and Ralf H. Reussner and Robert Heinrich and Emre Taspolatoglu and Marco Konersmann and Alexander Fay and Winfried Lamersdorf and Jan Ladiges and Christopher Haubeck}, editor = {Ralf H. Reussner and Michael Goedicke and Wilhelm Hasselbring and Birgit Vogel{-}Heuser and Jan Keim and Lukas M{\"{a}}rtin}, title = {Maintaining Security in Software Evolution}, booktitle = {Managed Software Evolution}, pages = {207--253}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-13499-0\_9}, doi = {10.1007/978-3-030-13499-0\_9}, timestamp = {Sat, 30 Sep 2023 09:32:41 +0200}, biburl = {https://dblp.org/rec/books/sp/19/JurjensSBV0GRHTKFLLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StewartJ18, author = {Harrison Stewart and Jan J{\"{u}}rjens}, title = {Data security and consumer trust in FinTech innovation in Germany}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {1}, pages = {109--128}, year = {2018}, url = {https://doi.org/10.1108/ICS-06-2017-0039}, doi = {10.1108/ICS-06-2017-0039}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StewartJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BurgerSGRJS18, author = {Jens B{\"{u}}rger and Daniel Str{\"{u}}ber and Stefan G{\"{a}}rtner and Thomas Ruhroth and Jan J{\"{u}}rjens and Kurt Schneider}, title = {A framework for semi-automated co-evolution of security knowledge and system models}, journal = {J. Syst. Softw.}, volume = {139}, pages = {142--160}, year = {2018}, url = {https://doi.org/10.1016/j.jss.2018.02.003}, doi = {10.1016/J.JSS.2018.02.003}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/BurgerSGRJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wm/JurjensRH18, author = {Jan J{\"{u}}rjens and Stefan Ruf and Nils Herda}, title = {Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen ins digitale Zeitalter?}, journal = {Wirtschaftsinformatik Manag.}, volume = {10}, number = {3}, pages = {74--79}, year = {2018}, url = {https://doi.org/10.1007/s35764-018-0062-5}, doi = {10.1007/S35764-018-0062-5}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wm/JurjensRH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecmdafa/Ramadan0SRJ18, author = {Qusai Ramadan and Daniel Str{\"{u}}ber and Mattia Salnitri and Volker Riediger and Jan J{\"{u}}rjens}, editor = {Alfonso Pierantonio and Salvador Trujillo}, title = {Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models}, booktitle = {Modelling Foundations and Applications - 14th European Conference, ECMFA@STAF 2018, Toulouse, France, June 26-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10890}, pages = {179--198}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-92997-2\_12}, doi = {10.1007/978-3-319-92997-2\_12}, timestamp = {Fri, 20 Nov 2020 13:15:21 +0100}, biburl = {https://dblp.org/rec/conf/ecmdafa/Ramadan0SRJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/0001PJ18, author = {Daniel Str{\"{u}}ber and Sven Peldszus and Jan J{\"{u}}rjens}, editor = {Alessandra Russo and Andy Sch{\"{u}}rr}, title = {Taming Multi-Variability of Software Product Line Transformations}, booktitle = {Fundamental Approaches to Software Engineering, 21st International Conference, {FASE} 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10802}, pages = {337--355}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89363-1\_19}, doi = {10.1007/978-3-319-89363-1\_19}, timestamp = {Fri, 31 Jan 2020 21:32:22 +0100}, biburl = {https://dblp.org/rec/conf/fase/0001PJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpce/Peldszus0J18, author = {Sven Peldszus and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens}, editor = {Eric Van Wyk and Tiark Rompf}, title = {Model-based security analysis of feature-oriented software product lines}, booktitle = {Proceedings of the 17th {ACM} {SIGPLAN} International Conference on Generative Programming: Concepts and Experiences, {GPCE} 2018, Boston, MA, USA, November 5-6, 2018}, pages = {93--106}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3278122.3278126}, doi = {10.1145/3278122.3278126}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gpce/Peldszus0J18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/RamadanA0JS18, author = {Qusai Ramadan and Amir Shayan Ahmadian and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens and Steffen Staab}, editor = {Yuriy Brun and Brittany Johnson and Alexandra Meliou}, title = {Model-based discrimination analysis: a position paper}, booktitle = {Proceedings of the International Workshop on Software Fairness, FairWare@ICSE 2018, Gothenburg, Sweden, May 29, 2018}, pages = {22--28}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194770.3194775}, doi = {10.1145/3194770.3194775}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/RamadanA0JS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/AhmadianJ018, author = {Amir Shayan Ahmadian and Jan J{\"{u}}rjens and Daniel Str{\"{u}}ber}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {1142--1149}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167256}, doi = {10.1145/3167132.3167256}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/AhmadianJ018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/Ahmadian0RJ18, author = {Amir Shayan Ahmadian and Daniel Str{\"{u}}ber and Volker Riediger and Jan J{\"{u}}rjens}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Supporting privacy impact assessment by model-based privacy analysis}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {1467--1474}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167288}, doi = {10.1145/3167132.3167288}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/Ahmadian0RJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/RamadanS0JG18, author = {Qusai Ramadan and Mattia Salnitri and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens and Paolo Giorgini}, editor = {Matthias Tichy and Eric Bodden and Marco Kuhrmann and Stefan Wagner and Jan{-}Philipp Stegh{\"{o}}fer}, title = {Integrating {BPMN-} and UML-based Security Engineering via Model Transformation}, booktitle = {Software Engineering und Software Management 2018, Fachtagung des GI-Fachbereichs Softwaretechnik, {SE} 2018, 5.-9. M{\"{a}}rz 2018, Ulm, Germany}, series = {{LNI}}, volume = {{P-279}}, pages = {63--64}, publisher = {Gesellschaft f{\"{u}}r Informatik}, year = {2018}, url = {https://dl.gi.de/handle/20.500.12116/16320}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/RamadanS0JG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/JurjensF18, author = {Jan J{\"{u}}rjens and Eduardo B. Fern{\'{a}}ndez}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Secure Database Development}, booktitle = {Encyclopedia of Database Systems, Second Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4614-8265-9\_329}, doi = {10.1007/978-1-4614-8265-9\_329}, timestamp = {Thu, 14 Feb 2019 09:43:36 +0100}, biburl = {https://dblp.org/rec/reference/db/JurjensF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/AhammedSRJ17, author = {Sakib Ahammed and Muhammad Sheikh Sadi and Md Shamimur Rahman and Jan J{\"{u}}rjens}, title = {Soft error tolerance using {HVDQ} (Horizontal-Vertical-Diagonal-Queen parity method)}, journal = {Comput. Syst. Sci. Eng.}, volume = {32}, number = {1}, year = {2017}, timestamp = {Wed, 15 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/AhammedSRJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StewartJ17, author = {Harrison Stewart and Jan J{\"{u}}rjens}, title = {Information security management and the human aspect in organizations}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {5}, pages = {494--534}, year = {2017}, url = {https://doi.org/10.1108/ICS-07-2016-0054}, doi = {10.1108/ICS-07-2016-0054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StewartJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/DiamantopoulouA17, author = {Vasiliki Diamantopoulou and Konstantinos Angelopoulos and Julian Flake and Andrea Praitano and Jos{\'{e}} Fran. Ruiz and Jan J{\"{u}}rjens and Michalis Pavlidis and Dimitri Bonutto and Andr{\`{e}}s Castillo Sanz and Haralambos Mouratidis and Javier Garcia{-}Robles and Alberto Eugenio Tozzi}, editor = {Erich Schweighofer and Herbert Leitold and Andreas Mitrakas and Kai Rannenberg}, title = {Privacy Data Management and Awareness for Public Administrations: {A} Case Study from the Healthcare Domain}, booktitle = {Privacy Technologies and Policy - 5th Annual Privacy Forum, {APF} 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10518}, pages = {192--209}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67280-9\_11}, doi = {10.1007/978-3-319-67280-9\_11}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apf/DiamantopoulouA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecmdafa/AhmadianSRJ17, author = {Amir Shayan Ahmadian and Daniel Str{\"{u}}ber and Volker Riediger and Jan J{\"{u}}rjens}, editor = {Anthony Anjorin and Hu{\'{a}}scar Espinoza}, title = {Model-Based Privacy Analysis in Industrial Ecosystems}, booktitle = {Modelling Foundations and Applications - 13th European Conference, ECMFA@STAF 2017, Marburg, Germany, July 19-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10376}, pages = {215--231}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61482-3\_13}, doi = {10.1007/978-3-319-61482-3\_13}, timestamp = {Fri, 20 Nov 2020 13:14:49 +0100}, biburl = {https://dblp.org/rec/conf/ecmdafa/AhmadianSRJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/RamadanS0JG17, author = {Qusai Ramadan and Mattia Salnitri and Daniel Str{\"{u}}ber and Jan J{\"{u}}rjens and Paolo Giorgini}, title = {From Secure Business Process Modeling to Design-Level Security Verification}, booktitle = {20th {ACM/IEEE} International Conference on Model Driven Engineering Languages and Systems, {MODELS} 2017, Austin, TX, USA, September 17-22, 2017}, pages = {123--133}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MODELS.2017.10}, doi = {10.1109/MODELS.2017.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/models/RamadanS0JG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/AhmadianPRJ17, author = {Amir Shayan Ahmadian and Sven Peldszus and Qusai Ramadan and Jan J{\"{u}}rjens}, editor = {Eric Bodden and Wilhelm Sch{\"{a}}fer and Arie van Deursen and Andrea Zisman}, title = {Model-based privacy and security analysis with CARiSMA}, booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017}, pages = {989--993}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3106237.3122823}, doi = {10.1145/3106237.3122823}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/AhmadianPRJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/se/2017, editor = {Jan J{\"{u}}rjens and Kurt Schneider}, title = {Software Engineering 2017, Fachtagung des GI-Fachbereichs Softwaretechnik, 21.-24. Februar 2017, Hannover, Deutschland}, series = {{LNI}}, volume = {{P-267}}, publisher = {{GI}}, year = {2017}, url = {https://dl.gi.de/handle/20.500.12116/19973}, isbn = {978-3-88579-661-9}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/se/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-05019, author = {Stefan Wagner and Jan J{\"{u}}rjens and Claudia Koller and Peter Trischberger}, title = {Comparing Bug Finding Tools with Reviews and Tests}, journal = {CoRR}, volume = {abs/1711.05019}, year = {2017}, url = {http://arxiv.org/abs/1711.05019}, eprinttype = {arXiv}, eprint = {1711.05019}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-05019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/AhmadianJ16, author = {Amir Shayan Ahmadian and Jan J{\"{u}}rjens}, title = {Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements}, booktitle = {2016 {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2016, Luxembourg, December 12-15, 2016}, pages = {360--365}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CloudCom.2016.0063}, doi = {10.1109/CLOUDCOM.2016.0063}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/AhmadianJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/PapeFBJ16, author = {Sebastian Pape and Julian Flake and Andreas Beckmann and Jan J{\"{u}}rjens}, editor = {Laura K. Dillon and Willem Visser and Laurie A. Williams}, title = {{STAGE:} a software tool for automatic grading of testing exercises: case study paper}, booktitle = {Proceedings of the 38th International Conference on Software Engineering, {ICSE} 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume}, pages = {491--500}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2889160.2889203}, doi = {10.1145/2889160.2889203}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/PapeFBJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/WenzelPJO16, author = {Sven Wenzel and Daniel Poggenpohl and Jan J{\"{u}}rjens and Mart{\'{\i}}n Ochoa}, editor = {Jens Knoop and Uwe Zdun}, title = {Umlchange - specifying model changes to support security verification of potential evolution}, booktitle = {Software Engineering 2016, Fachtagung des GI-Fachbereichs Softwaretechnik, 23.-26. Februar 2016, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-252}}, pages = {91--92}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/738}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/WenzelPJO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/RosadoLJ15, author = {David Garcia Rosado and Nadira Lammari and Jan J{\"{u}}rjens}, title = {Special Issue on Secure Information Systems Engineering}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2193--2194}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxv020}, doi = {10.1093/COMJNL/BXV020}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/RosadoLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/HeinrichGHRRSPJ15, author = {Robert Heinrich and Stefan G{\"{a}}rtner and Tom{-}Michael Hesse and Thomas Ruhroth and Ralf H. Reussner and Kurt Schneider and Barbara Paech and Jan J{\"{u}}rjens}, title = {The CoCoME Platform: {A} Research Note on Empirical Studies in Information System Evolution}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {25}, number = {9-10}, pages = {1715--1720}, year = {2015}, url = {https://doi.org/10.1142/S0218194015710059}, doi = {10.1142/S0218194015710059}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/HeinrichGHRRSPJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/BurgerJW15, author = {Jens B{\"{u}}rger and Jan J{\"{u}}rjens and Sven Wenzel}, title = {Restoring security of evolving software models using graph transformation}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {17}, number = {3}, pages = {267--289}, year = {2015}, url = {https://doi.org/10.1007/s10009-014-0364-8}, doi = {10.1007/S10009-014-0364-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/BurgerJW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmsd/AhmadianCJ15, author = {Amir Shayan Ahmadian and Fabian Coerschulte and Jan J{\"{u}}rjens}, editor = {Boris Shishkov}, title = {Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds}, booktitle = {Business Modeling and Software Design - 5th International Symposium, {BMSD} 2015, Milan, Italy, July 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Business Information Processing}, volume = {257}, pages = {80--95}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-40512-4\_5}, doi = {10.1007/978-3-319-40512-4\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bmsd/AhmadianCJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/BurgerGRZJS15, author = {Jens B{\"{u}}rger and Stefan G{\"{a}}rtner and Thomas Ruhroth and Johannes Zweihoff and Jan J{\"{u}}rjens and Kurt Schneider}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {Restoring Security of Long-Living Systems by Co-evolution}, booktitle = {39th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2015, Taichung, Taiwan, July 1-5, 2015. Volume 2}, pages = {153--158}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.72}, doi = {10.1109/COMPSAC.2015.72}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/BurgerGRZJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ApfelbeckFJZ15, author = {Chris Apfelbeck and Martin Fritz and Jan J{\"{u}}rjens and Johannes Zweihoff}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {Preserving Validity of Batch-Job Nets under Change at Run-Time}, booktitle = {39th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2015, Taichung, Taiwan, July 1-5, 2015. Volume 2}, pages = {169--178}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.100}, doi = {10.1109/COMPSAC.2015.100}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ApfelbeckFJZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/modelsward/JurjensA15, author = {Jan J{\"{u}}rjens and Amir Shayan Ahmadian}, editor = {Slimane Hammoudi and Lu{\'{\i}}s Ferreira Pires and Philippe Desfray and Joaquim Filipe}, title = {Model-based Security Analysis and Applications to Security Economics}, booktitle = {{MODELSWARD} 2015 - Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {674--677}, publisher = {SciTePress}, year = {2015}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/modelsward/JurjensA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/GartnerRBSJ15, author = {Stefan G{\"{a}}rtner and Thomas Ruhroth and Jens B{\"{u}}rger and Kurt Schneider and Jan J{\"{u}}rjens}, editor = {Uwe A{\ss}mann and Birgit Demuth and Thorsten Spitta and Georg P{\"{u}}schel and Ronny Kaiser}, title = {Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge}, booktitle = {Software Engineering {\&} Management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik {(SWT)} und Wirtschaftsinformatik (WI), {FA} WI-MAW, 17. M{\"{a}}rz - 20. M{\"{a}}rz 2015, Dresden, Germany}, series = {{LNI}}, volume = {{P-239}}, pages = {83--84}, publisher = {{GI}}, year = {2015}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/GartnerRBSJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/HeinrichGHRRSPJ15, author = {Robert Heinrich and Stefan G{\"{a}}rtner and Tom{-}Michael Hesse and Thomas Ruhroth and Ralf H. Reussner and Kurt Schneider and Barbara Paech and Jan J{\"{u}}rjens}, editor = {Haiping Xu}, title = {A Platform for Empirical Research on Information System Evolution}, booktitle = {The 27th International Conference on Software Engineering and Knowledge Engineering, {SEKE} 2015, Wyndham Pittsburgh University Center, Pittsburgh, PA, USA, July 6-8, 2015}, pages = {415--420}, publisher = {{KSI} Research Inc. and Knowledge Systems Institute Graduate School}, year = {2015}, url = {https://doi.org/10.18293/SEKE2015-66}, doi = {10.18293/SEKE2015-66}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seke/HeinrichGHRRSPJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/BlancoRSJ14, author = {Carlos Blanco and David Garcia Rosado and Luis Enrique S{\'{a}}nchez and Jan J{\"{u}}rjens}, title = {Security in information systems: Advances and new challenges}, journal = {Comput. Stand. Interfaces}, volume = {36}, number = {4}, pages = {687--688}, year = {2014}, url = {https://doi.org/10.1016/j.csi.2013.12.003}, doi = {10.1016/J.CSI.2013.12.003}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/BlancoRSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/WenzelPJO14, author = {Sven Wenzel and Daniel Poggenpohl and Jan J{\"{u}}rjens and Mart{\'{\i}}n Ochoa}, title = {Specifying model changes with UMLchange to support security verification of potential evolution}, journal = {Comput. Stand. Interfaces}, volume = {36}, number = {4}, pages = {776--791}, year = {2014}, url = {https://doi.org/10.1016/j.csi.2013.12.011}, doi = {10.1016/J.CSI.2013.12.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/WenzelPJO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/FeldererKKJOPTT14, author = {Michael Felderer and Basel Katt and Philipp Kalb and Jan J{\"{u}}rjens and Mart{\'{\i}}n Ochoa and Federica Paci and Le Minh Sang Tran and Thein Than Tun and Koen Yskout and Riccardo Scandariato and Frank Piessens and Dries Vanoverberghe and Elizabeta Fourneret and Matthias Gander and Bj{\o}rnar Solhaug and Ruth Breu}, title = {Evolution of Security Engineering Artifacts: {A} State of the Art Survey}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {4}, pages = {48--98}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014100103}, doi = {10.4018/IJSSE.2014100103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/FeldererKKJOPTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DupressoirGJN14, author = {Fran{\c{c}}ois Dupressoir and Andrew D. Gordon and Jan J{\"{u}}rjens and David A. Naumann}, title = {Guiding a general-purpose {C} verifier to prove cryptographic protocols}, journal = {J. Comput. Secur.}, volume = {22}, number = {5}, pages = {823--866}, year = {2014}, url = {https://doi.org/10.3233/JCS-140508}, doi = {10.3233/JCS-140508}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DupressoirGJN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stt/RuhrothGBJS14, author = {Thomas Ruhroth and Stefan G{\"{a}}rtner and Jens B{\"{u}}rger and Jan J{\"{u}}rjens and Kurt Schneider}, title = {Versioning and Evolution Requirements for Model-Based System Development}, journal = {Softwaretechnik-Trends}, volume = {34}, number = {2}, year = {2014}, url = {http://pi.informatik.uni-siegen.de/stt/34\_2/01\_Fachgruppenberichte/CVSM2014/RuhrothCVSM2014.pdf}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stt/RuhrothGBJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/profes/RuhrothGBJS14, author = {Thomas Ruhroth and Stefan G{\"{a}}rtner and Jens B{\"{u}}rger and Jan J{\"{u}}rjens and Kurt Schneider}, editor = {Andreas Jedlitschka and Pasi Kuvaja and Marco Kuhrmann and Tomi M{\"{a}}nnist{\"{o}} and J{\"{u}}rgen M{\"{u}}nch and Mikko Raatikainen}, title = {Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems}, booktitle = {Product-Focused Software Process Improvement - 15th International Conference, {PROFES} 2014, Helsinki, Finland, December 10-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8892}, pages = {239--253}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13835-0\_17}, doi = {10.1007/978-3-319-13835-0\_17}, timestamp = {Mon, 03 Jan 2022 22:29:18 +0100}, biburl = {https://dblp.org/rec/conf/profes/RuhrothGBJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GartnerRBSJ14, author = {Stefan G{\"{a}}rtner and Thomas Ruhroth and Jens B{\"{u}}rger and Kurt Schneider and Jan J{\"{u}}rjens}, editor = {Tony Gorschek and Robyn R. Lutz}, title = {Maintaining requirements for long-living software systems by incorporating security knowledge}, booktitle = {{IEEE} 22nd International Requirements Engineering Conference, {RE} 2014, Karlskrona, Sweden, August 25-29, 2014}, pages = {103--112}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/RE.2014.6912252}, doi = {10.1109/RE.2014.6912252}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/GartnerRBSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/GartnerBSJ14, author = {Stefan G{\"{a}}rtner and Jens B{\"{u}}rger and Kurt Schneider and Jan J{\"{u}}rjens}, editor = {Klaus Schmid and Wolfgang B{\"{o}}hm and Robert Heinrich and Andrea Herrmann and Anne Hoffmann and Dieter Landes and Marco Konersmann and Thomas Ruhroth and Oliver Sander and Volker Stolz and Baltasar Tranc{\'{o}}n y Widemann and R{\"{u}}diger Wei{\ss}bach}, title = {Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen}, booktitle = {Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2014, 25.-26. Februar 2014 in Kiel, Deutschland}, series = {{CEUR} Workshop Proceedings}, volume = {1129}, pages = {6--7}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1129/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:19 +0100}, biburl = {https://dblp.org/rec/conf/se/GartnerBSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/JurjensS14, author = {Jan J{\"{u}}rjens and Kurt Schneider}, editor = {Wilhelm Hasselbring and Nils Christian Ehmke}, title = {The SecReq approach: From Security Requirements to Secure Design while Managing Software Evolution}, booktitle = {Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar - 28. Februar 2014, Kiel, Germany}, series = {{LNI}}, volume = {{P-227}}, pages = {89--90}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/30975}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/JurjensS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/essos/2014, editor = {Jan J{\"{u}}rjens and Frank Piessens and Nataliia Bielova}, title = {Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8364}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04897-0}, doi = {10.1007/978-3-319-04897-0}, isbn = {978-3-319-04896-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sis/2014, editor = {David Garcia Rosado and Carlos Blanco and Daniel Mellado and Jan J{\"{u}}rjens and Luis Enrique S{\'{a}}nchez}, title = {{WOSIS} 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014}, publisher = {SciTePress}, year = {2014}, isbn = {978-989-758-031-4}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sis/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JurjensFFRH14, author = {Jan J{\"{u}}rjens and Eduardo B. Fern{\'{a}}ndez and Robert B. France and Bernhard Rumpe and Constance L. Heitmeyer}, title = {Critical Systems Development Using Modeling Languages. {(CSDUML-04):} Current Developments and Future Challenges (Report on the Third International Workshop)}, journal = {CoRR}, volume = {abs/1409.6608}, year = {2014}, url = {http://arxiv.org/abs/1409.6608}, eprinttype = {arXiv}, eprint = {1409.6608}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JurjensFFRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TaubenbergerJYN13, author = {Stefan Taubenberger and Jan J{\"{u}}rjens and Yijun Yu and Bashar Nuseibeh}, title = {Resolving vulnerability identification errors using security requirements on business process models}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {3}, pages = {202--223}, year = {2013}, url = {https://doi.org/10.1108/IMCS-09-2012-0054}, doi = {10.1108/IMCS-09-2012-0054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TaubenbergerJYN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/HumbergWPWRJ13a, author = {Thorsten Humberg and Christian Wessel and Daniel Poggenpohl and Sven Wenzel and Thomas Ruhroth and Jan J{\"{u}}rjens}, editor = {Markus Helfert and Fr{\'{e}}d{\'{e}}ric Desprez and Donald Ferguson and Frank Leymann}, title = {Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes}, booktitle = {Cloud Computing and Services Science - Third International Conference, {CLOSER} 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {453}, pages = {36--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-11561-0\_3}, doi = {10.1007/978-3-319-11561-0\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/closer/HumbergWPWRJ13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/HumbergWPWRJ13, author = {Thorsten Humberg and Christian Wessel and Daniel Poggenpohl and Sven Wenzel and Thomas Ruhroth and Jan J{\"{u}}rjens}, editor = {Fr{\'{e}}d{\'{e}}ric Desprez and Donald Ferguson and Ethan Hadar and Frank Leymann and Matthias Jarke and Markus Helfert}, title = {Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes}, booktitle = {{CLOSER} 2013 - Proceedings of the 3rd International Conference on Cloud Computing and Services Science, Aachen, Germany, 8-10 May, 2013}, pages = {553--561}, publisher = {SciTePress}, year = {2013}, timestamp = {Wed, 29 Mar 2017 16:45:24 +0200}, biburl = {https://dblp.org/rec/conf/closer/HumbergWPWRJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/BurgerJRGS13, author = {Jens B{\"{u}}rger and Jan J{\"{u}}rjens and Thomas Ruhroth and Stefan G{\"{a}}rtner and Kurt Schneider}, editor = {Alessandro Aldini and Javier L{\'{o}}pez and Fabio Martinelli}, title = {Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models}, booktitle = {Foundations of Security Analysis and Design {VII} - {FOSAD} 2012/2013 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {8604}, pages = {34--53}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-10082-1\_2}, doi = {10.1007/978-3-319-10082-1\_2}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fosad/BurgerJRGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/essos/2013, editor = {Jan J{\"{u}}rjens and Benjamin Livshits and Riccardo Scandariato}, title = {Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7781}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36563-8}, doi = {10.1007/978-3-642-36563-8}, isbn = {978-3-642-36562-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DupressoirGJN13, author = {Fran{\c{c}}ois Dupressoir and Andrew D. Gordon and Jan J{\"{u}}rjens and David A. Naumann}, title = {Guiding a General-Purpose {C} Verifier to Prove Cryptographic Protocols}, journal = {CoRR}, volume = {abs/1312.6532}, year = {2013}, url = {http://arxiv.org/abs/1312.6532}, eprinttype = {arXiv}, eprint = {1312.6532}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/DupressoirGJN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/RosadoSFJ12, author = {David Garcia Rosado and Luis Enrique S{\'{a}}nchez and Eduardo Fern{\'{a}}ndez{-}Medina and Jan J{\"{u}}rjens}, title = {Security in Information Systems: New Challenges and Opportunities}, journal = {J. Univers. Comput. Sci.}, volume = {18}, number = {6}, pages = {728--731}, year = {2012}, url = {http://www.jucs.org/jucs\_18\_6/security\_in\_information\_systems}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/RosadoSFJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/SchneiderKHIJ12, author = {Kurt Schneider and Eric Knauss and Siv Hilde Houmb and Shareeful Islam and Jan J{\"{u}}rjens}, title = {Enhancing security requirements engineering by organizational learning}, journal = {Requir. Eng.}, volume = {17}, number = {1}, pages = {35--56}, year = {2012}, url = {https://doi.org/10.1007/s00766-011-0141-0}, doi = {10.1007/S00766-011-0141-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/SchneiderKHIJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AizatulinGJ12, author = {Mihhail Aizatulin and Andrew D. Gordon and Jan J{\"{u}}rjens}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Computational verification of {C} protocol implementations by symbolic execution}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {712--723}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382271}, doi = {10.1145/2382196.2382271}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AizatulinGJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/WenzelWHJ12, author = {Sven Wenzel and Christian Wessel and Thorsten Humberg and Jan J{\"{u}}rjens}, editor = {Frank Leymann and Ivan I. Ivanov and Marten van Sinderen and Tony Shan}, title = {Securing Processes for Outsourcing into the Cloud}, booktitle = {{CLOSER} 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April, 2012}, pages = {675--680}, publisher = {SciTePress}, year = {2012}, timestamp = {Wed, 29 Mar 2017 16:45:24 +0200}, biburl = {https://dblp.org/rec/conf/closer/WenzelWHJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/OchoaJW12, author = {Mart{\'{\i}}n Ochoa and Jan J{\"{u}}rjens and Daniel Warzecha}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {A Sound Decision Procedure for the Compositionality of Secrecy}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {97--105}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_10}, doi = {10.1007/978-3-642-28166-2\_10}, timestamp = {Sat, 19 Oct 2019 20:24:21 +0200}, biburl = {https://dblp.org/rec/conf/essos/OchoaJW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/RuhrothJ12, author = {Thomas Ruhroth and Jan J{\"{u}}rjens}, title = {Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec}, booktitle = {14th International {IEEE} Symposium on High-Assurance Systems Engineering, {HASE} 2012, Omaha, NE, USA, October 25-27, 2012}, pages = {177--184}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HASE.2012.35}, doi = {10.1109/HASE.2012.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/RuhrothJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/WesselHWJ12, author = {Christian Wessel and Thorsten Humberg and Sven Wenzel and Jan J{\"{u}}rjens}, editor = {Stefan J{\"{a}}hnichen and Bernhard Rumpe and Holger Schlingloff}, title = {Fr{\"{u}}hzeitige modellbasierte Risikoanalyse f{\"{u}}r mobile, verteilte Anwendungen}, booktitle = {Software Engineering 2012 - Workshopband, Fachtagung des GI-Fachbereichs Softwaretechnik, 27. Februar - 2. M{\"{a}}rz 2012 in Berlin}, series = {{LNI}}, volume = {{P-199}}, pages = {175--181}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18372}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/WesselHWJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tools/OchoaJC12, author = {Mart{\'{\i}}n Ochoa and Jan J{\"{u}}rjens and Jorge Cu{\'{e}}llar}, editor = {Carlo A. Furia and Sebastian Nanz}, title = {Non-interference on {UML} State-Charts}, booktitle = {Objects, Models, Components, Patterns - 50th International Conference, {TOOLS} 2012, Prague, Czech Republic, May 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7304}, pages = {219--235}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30561-0\_16}, doi = {10.1007/978-3-642-30561-0\_16}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/tools/OchoaJC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BauerJY11, author = {Andreas Bauer and Jan J{\"{u}}rjens and Yijun Yu}, title = {Run-Time Security Traceability for Evolving Systems}, journal = {Comput. J.}, volume = {54}, number = {1}, pages = {58--87}, year = {2011}, url = {https://doi.org/10.1093/comjnl/bxq042}, doi = {10.1093/COMJNL/BXQ042}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/BauerJY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/IslamMJ11, author = {Shareeful Islam and Haralambos Mouratidis and Jan J{\"{u}}rjens}, title = {A framework to support alignment of secure software engineering with legal regulations}, journal = {Softw. Syst. Model.}, volume = {10}, number = {3}, pages = {369--394}, year = {2011}, url = {https://doi.org/10.1007/s10270-010-0154-z}, doi = {10.1007/S10270-010-0154-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/IslamMJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FourneretOBBJY11, author = {Elizabeta Fourneret and Mart{\'{\i}}n Ochoa and Fabrice Bouquet and Julien Botella and Jan J{\"{u}}rjens and Parvaneh Yousefi}, title = {Model-Based Security Verification and Testing for Smart-cards}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {272--279}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.46}, doi = {10.1109/ARES.2011.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/FourneretOBBJY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/SchmidtJ11, author = {Holger Schmidt and Jan J{\"{u}}rjens}, editor = {Haralambos Mouratidis and Colette Rolland}, title = {Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec}, booktitle = {Advanced Information Systems Engineering - 23rd International Conference, CAiSE 2011, London, UK, June 20-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6741}, pages = {367--382}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21640-4\_28}, doi = {10.1007/978-3-642-21640-4\_28}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/caise/SchmidtJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AizatulinGJ11, author = {Mihhail Aizatulin and Andrew D. Gordon and Jan J{\"{u}}rjens}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Extracting and verifying cryptographic models from {C} protocol code by symbolic execution}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {331--340}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046745}, doi = {10.1145/2046707.2046745}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AizatulinGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DupressoirGJN11, author = {Fran{\c{c}}ois Dupressoir and Andrew D. Gordon and Jan J{\"{u}}rjens and David A. Naumann}, title = {Guiding a General-Purpose {C} Verifier to Prove Cryptographic Protocols}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {3--17}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.8}, doi = {10.1109/CSF.2011.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DupressoirGJN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecmdafa/JurjensMOS11, author = {Jan J{\"{u}}rjens and Lo{\"{\i}}c Marchal and Mart{\'{\i}}n Ochoa and Holger Schmidt}, editor = {Robert B. France and Jochen Malte K{\"{u}}ster and Behzad Bordbar and Richard F. Paige}, title = {Incremental Security Verification for Evolving UMLsec models}, booktitle = {Modelling Foundations and Applications - 7th European Conference, {ECMFA} 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6698}, pages = {52--68}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21470-7\_5}, doi = {10.1007/978-3-642-21470-7\_5}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/ecmdafa/JurjensMOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/HateburHJS11, author = {Denis Hatebur and Maritta Heisel and Jan J{\"{u}}rjens and Holger Schmidt}, editor = {Dimitra Giannakopoulou and Fernando Orejas}, title = {Systematic Development of UMLsec Design Models Based on Security Requirements}, booktitle = {Fundamental Approaches to Software Engineering - 14th International Conference, {FASE} 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2011, Saarbr{\"{u}}cken, Germany, March 26-April 3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6603}, pages = {232--246}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19811-3\_17}, doi = {10.1007/978-3-642-19811-3\_17}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fase/HateburHJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Jurjens11, author = {Jan J{\"{u}}rjens}, editor = {Richard N. Taylor and Harald C. Gall and Nenad Medvidovic}, title = {Automated security hardening for evolving {UML} models}, booktitle = {Proceedings of the 33rd International Conference on Software Engineering, {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011}, pages = {986--988}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1985793.1985968}, doi = {10.1145/1985793.1985968}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Jurjens11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LeeMJ11, author = {Seok{-}Won Lee and Mattia Monga and Jan J{\"{u}}rjens}, editor = {Richard N. Taylor and Harald C. Gall and Nenad Medvidovic}, title = {Seventh international workshop on software engineering for secure systems: {(SESS} 2011)}, booktitle = {Proceedings of the 33rd International Conference on Software Engineering, {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011}, pages = {1200--1201}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1985793.1986045}, doi = {10.1145/1985793.1986045}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/LeeMJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/AizatulinDGJ11, author = {Mihhail Aizatulin and Fran{\c{c}}ois Dupressoir and Andrew D. Gordon and Jan J{\"{u}}rjens}, editor = {Gilles Barthe and Anupam Datta and Sandro Etalle}, title = {Verifying Cryptographic Code in {C:} Some Experience and the Csec Challenge}, booktitle = {Formal Aspects of Security and Trust - 8th International Workshop, {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7140}, pages = {1--20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29420-4\_1}, doi = {10.1007/978-3-642-29420-4\_1}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/AizatulinDGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refsq/KnaussHSIJ11, author = {Eric Knauss and Siv Hilde Houmb and Kurt Schneider and Shareeful Islam and Jan J{\"{u}}rjens}, editor = {Daniel M. Berry and Xavier Franch}, title = {Supporting Requirements Engineers in Recognising Security Issues}, booktitle = {Requirements Engineering: Foundation for Software Quality - 17th International Working Conference, {REFSQ} 2011, Essen, Germany, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6606}, pages = {4--18}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19858-8\_2}, doi = {10.1007/978-3-642-19858-8\_2}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/refsq/KnaussHSIJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/TaubenbergerJYN11, author = {Stefan Taubenberger and Jan J{\"{u}}rjens and Yijun Yu and Bashar Nuseibeh}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {259--270}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_21}, doi = {10.1007/978-3-642-21424-0\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/TaubenbergerJYN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/servicewave/MassacciBFJLMMPPPSW11, author = {Fabio Massacci and Fabrice Bouquet and Elizabeta Fourneret and Jan J{\"{u}}rjens and Mass Soldal Lund and S{\'{e}}bastien Madel{\'{e}}nat and Jan Tobias M{\"{u}}hlberg and Federica Paci and St{\'{e}}phane Paul and Frank Piessens and Bj{\o}rnar Solhaug and Sven Wenzel}, editor = {Witold Abramowicz and Ignacio Mart{\'{\i}}n Llorente and Mike Surridge and Andrea Zisman and Julien Vayssi{\`{e}}re}, title = {Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper)}, booktitle = {Towards a Service-Based Internet - 4th European Conference, ServiceWave 2011, Poznan, Poland, October 26-28, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6994}, pages = {134--143}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24755-2\_12}, doi = {10.1007/978-3-642-24755-2\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/servicewave/MassacciBFJLMMPPPSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sfm/JurjensOSMHI11, author = {Jan J{\"{u}}rjens and Mart{\'{\i}}n Ochoa and Holger Schmidt and Lo{\"{\i}}c Marchal and Siv Hilde Houmb and Shareeful Islam}, editor = {Marco Bernardo and Val{\'{e}}rie Issarny}, title = {Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications}, booktitle = {Formal Methods for Eternal Networked Software Systems - 11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, {SFM} 2011, Bertinoro, Italy, June 13-18, 2011. Advanced Lectures}, series = {Lecture Notes in Computer Science}, volume = {6659}, pages = {504--526}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21455-4\_15}, doi = {10.1007/978-3-642-21455-4\_15}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/sfm/JurjensOSMHI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse/2011sess, editor = {Jan J{\"{u}}rjens and Seok{-}Won Lee and Mattia Monga}, title = {Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, {SESS} 2011, Waikiki, Honolulu, HI, USA, May 22, 2011}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=1988630}, isbn = {978-1-4503-0581-5}, timestamp = {Thu, 13 Aug 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/2011sess.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sis/2011, editor = {David Garcia Rosado and Luis Enrique S{\'{a}}nchez and Jan J{\"{u}}rjens}, title = {{WOSIS} 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with {ICEIS} 2011, Beijing, China, 8-9 June, 2011}, publisher = {SciTePress}, year = {2011}, isbn = {978-989-8425-61-4}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sis/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-1017, author = {Mihhail Aizatulin and Andrew D. Gordon and Jan J{\"{u}}rjens}, title = {Extracting and Verifying Cryptographic Models from {C} Protocol Code by Symbolic Execution}, journal = {CoRR}, volume = {abs/1107.1017}, year = {2011}, url = {http://arxiv.org/abs/1107.1017}, eprinttype = {arXiv}, eprint = {1107.1017}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-1017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1110-3969, author = {Muhammad Sheikh Sadi and Md. Mizanur Rahman Khan and Md. Nazim Uddin and Jan J{\"{u}}rjens}, title = {An Efficient Approach towards Mitigating Soft Errors Risks}, journal = {CoRR}, volume = {abs/1110.3969}, year = {2011}, url = {http://arxiv.org/abs/1110.3969}, eprinttype = {arXiv}, eprint = {1110.3969}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1110-3969.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BauerJ10, author = {Andreas Bauer and Jan J{\"{u}}rjens}, title = {Runtime verification of cryptographic protocols}, journal = {Comput. Secur.}, volume = {29}, number = {3}, pages = {315--330}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.09.003}, doi = {10.1016/J.COSE.2009.09.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BauerJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/SadiMSJ10, author = {Muhammad Sheikh Sadi and D. G. Myers and Cesar Ortega{-}Sanchez and Jan J{\"{u}}rjens}, title = {Component criticality analysis to minimize soft errors risk}, journal = {Comput. Syst. Sci. Eng.}, volume = {25}, number = {5}, year = {2010}, timestamp = {Mon, 15 Apr 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/SadiMSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/MouratidisJ10, author = {Haralambos Mouratidis and Jan J{\"{u}}rjens}, title = {From goal-driven security requirements engineering to secure design}, journal = {Int. J. Intell. Syst.}, volume = {25}, number = {8}, pages = {813--840}, year = {2010}, url = {https://doi.org/10.1002/int.20432}, doi = {10.1002/INT.20432}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/MouratidisJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/HoumbIKJS10, author = {Siv Hilde Houmb and Shareeful Islam and Eric Knauss and Jan J{\"{u}}rjens and Kurt Schneider}, title = {Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec}, journal = {Requir. Eng.}, volume = {15}, number = {1}, pages = {63--93}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0093-9}, doi = {10.1007/S00766-009-0093-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/HoumbIKJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/PirontiJ10, author = {Alfredo Pironti and Jan J{\"{u}}rjens}, editor = {Fabio Massacci and Dan S. Wallach and Nicola Zannone}, title = {Formally-Based Black-Box Monitoring of Security Protocols}, booktitle = {Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5965}, pages = {79--95}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11747-3\_7}, doi = {10.1007/978-3-642-11747-3\_7}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/PirontiJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LeeMJ10, author = {Seok{-}Won Lee and Mattia Monga and Jan J{\"{u}}rjens}, editor = {Jeff Kramer and Judith Bishop and Premkumar T. Devanbu and Sebasti{\'{a}}n Uchitel}, title = {The 6\({}^{\mbox{th}}\) International Workshop on Software Engineering for Secure Systems (SESS'10)}, booktitle = {Proceedings of the 32nd {ACM/IEEE} International Conference on Software Engineering - Volume 2, {ICSE} 2010, Cape Town, South Africa, 1-8 May 2010}, pages = {433--434}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1810295.1810415}, doi = {10.1145/1810295.1810415}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/LeeMJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BeckersJ10, author = {Kristian Beckers and Jan J{\"{u}}rjens}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Security and Compliance in Clouds}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {91--100}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_9}, doi = {10.1007/978-3-8348-9788-6\_9}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/BeckersJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/MontrieuxJHYST10, author = {Lionel Montrieux and Jan J{\"{u}}rjens and Charles B. Haley and Yijun Yu and Pierre{-}Yves Schobbens and Hubert Toussaint}, editor = {Charles Pecheur and Jamie Andrews and Elisabetta Di Nitto}, title = {Tool support for code generation from a UMLsec property}, booktitle = {{ASE} 2010, 25th {IEEE/ACM} International Conference on Automated Software Engineering, Antwerp, Belgium, September 20-24, 2010}, pages = {357--358}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1858996.1859074}, doi = {10.1145/1858996.1859074}, timestamp = {Tue, 06 Nov 2018 16:58:23 +0100}, biburl = {https://dblp.org/rec/conf/kbse/MontrieuxJHYST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BlancoFTJ10, author = {Carlos Blanco and Eduardo Fern{\'{a}}ndez{-}Medina and Juan Trujillo and Jan J{\"{u}}rjens}, editor = {Willem Jonker and Milan Petkovic}, title = {Towards the Secure Modelling of {OLAP} Users' Behaviour}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {101--112}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_8}, doi = {10.1007/978-3-642-15546-8\_8}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BlancoFTJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vl/Jurjens10, author = {Jan J{\"{u}}rjens}, editor = {Christopher D. Hundhausen and Emmanuel Pietriga and Paloma D{\'{\i}}az and Mary Beth Rosson}, title = {Model-Based Security Engineering with {UML:} The Last Decade and towards the Future (Keynote)}, booktitle = {{IEEE} Symposium on Visual Languages and Human-Centric Computing, {VL/HCC} 2010, Legan{\'{e}}s-Madrid, Spain, 21-25 September 2010, Proceedings}, pages = {4}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/VLHCC.2010.10}, doi = {10.1109/VLHCC.2010.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vl/Jurjens10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse/2010sess, editor = {Seok{-}Won Lee and Mattia Monga and Jan J{\"{u}}rjens}, title = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS} 2010, May 2, 2010, Cape Town, South Africa}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1809100}, isbn = {978-1-60558-965-7}, timestamp = {Tue, 01 Jul 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/2010sess.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/Fernandez-MedinaJTJ09, author = {Eduardo Fern{\'{a}}ndez{-}Medina and Jan J{\"{u}}rjens and Juan Trujillo and Sushil Jajodia}, title = {Model-Driven Development for secure information systems}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {5}, pages = {809--814}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2008.05.010}, doi = {10.1016/J.INFSOF.2008.05.010}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/Fernandez-MedinaJTJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/Jurjens09, author = {Jan J{\"{u}}rjens}, title = {A domain-specific language for cryptographic protocols based on streams}, journal = {J. Log. Algebraic Methods Program.}, volume = {78}, number = {2}, pages = {54--73}, year = {2009}, url = {https://doi.org/10.1016/j.jlap.2008.08.006}, doi = {10.1016/J.JLAP.2008.08.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/Jurjens09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WoodsidePPXIGFBHJ09, author = {C. Murray Woodside and Dorina C. Petriu and Dorin Bogdan Petriu and Jing Xu and Tauseef A. Israr and Geri Georg and Robert B. France and James M. Bieman and Siv Hilde Houmb and Jan J{\"{u}}rjens}, title = {Performance analysis of security aspects by weaving scenarios extracted from {UML} models}, journal = {J. Syst. Softw.}, volume = {82}, number = {1}, pages = {56--74}, year = {2009}, url = {https://doi.org/10.1016/j.jss.2008.03.067}, doi = {10.1016/J.JSS.2008.03.067}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/WoodsidePPXIGFBHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/MouratidisSJ09, author = {Haralambos Mouratidis and Ali Sunyaev and Jan J{\"{u}}rjens}, editor = {Pascal van Eck and Jaap Gordijn and Roel J. Wieringa}, title = {Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects}, booktitle = {Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, June 8-12, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5565}, pages = {231--245}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02144-2\_21}, doi = {10.1007/978-3-642-02144-2\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/MouratidisSJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/JurjensW09, author = {Jan J{\"{u}}rjens and Tjark Weber}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Finite Models in FOL-Based Crypto-Protocol Verification}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {155--172}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_11}, doi = {10.1007/978-3-642-03459-6\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/JurjensW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/LloydJ09, author = {John Lloyd and Jan J{\"{u}}rjens}, editor = {Andy Sch{\"{u}}rr and Bran Selic}, title = {Security Analysis of a Biometric Authentication System Using UMLsec and {JML}}, booktitle = {Model Driven Engineering Languages and Systems, 12th International Conference, {MODELS} 2009, Denver, CO, USA, October 4-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5795}, pages = {77--91}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04425-0\_7}, doi = {10.1007/978-3-642-04425-0\_7}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/models/LloydJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/WashizakiYFJ09, author = {Hironori Washizaki and Nobukazu Yoshioka and Eduardo B. Fern{\'{a}}ndez and Jan J{\"{u}}rjens}, editor = {Shail Arora and Gary T. Leavens}, title = {Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09)}, booktitle = {Companion to the 24th Annual {ACM} {SIGPLAN} Conference on Object-Oriented Programming, Systems, Languages, and Applications, {OOPSLA} 2009, October 25-29, 2009, Orlando, Florida, {USA}}, pages = {713--714}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1639950.1639978}, doi = {10.1145/1639950.1639978}, timestamp = {Mon, 12 Jul 2021 15:34:15 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/WashizakiYFJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/RatiuMJ99a, author = {Daniel Ratiu and Radu Marinescu and Jan J{\"{u}}rjens}, editor = {Andy Zaidman and Giuliano Antoniol and St{\'{e}}phane Ducasse}, title = {The Logical Modularity of Programs}, booktitle = {16th Working Conference on Reverse Engineering, {WCRE} 2009, 13-16 October 2009, Lille, France}, pages = {123--127}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/WCRE.2009.29}, doi = {10.1109/WCRE.2009.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/RatiuMJ99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Jurjens09, author = {Jan J{\"{u}}rjens}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Security and Dependability Engineering}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {21--36}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_2}, doi = {10.1007/978-0-387-88775-3\_2}, timestamp = {Fri, 09 Jun 2017 11:04:31 +0200}, biburl = {https://dblp.org/rec/series/ais/Jurjens09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/JurjensF09, author = {Jan J{\"{u}}rjens and Eduardo B. Fern{\'{a}}ndez}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Secure Database Development}, booktitle = {Encyclopedia of Database Systems}, pages = {2528--2534}, publisher = {Springer {US}}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-39940-9\_329}, doi = {10.1007/978-0-387-39940-9\_329}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/db/JurjensF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcs/JurjensYB08, author = {Jan J{\"{u}}rjens and Yijun Yu and Andreas Bauer}, editor = {Erol Gelenbe and Samson Abramsky and Vladimiro Sassone}, title = {Tools for Traceable Security Verification}, booktitle = {Visions of Computer Science - {BCS} International Academic Conference, Imperial College, London, UK, 22-24 September 2008}, pages = {367--390}, publisher = {British Computer Society}, year = {2008}, url = {http://www.bcs.org/server.php?show=ConWebDoc.22980}, timestamp = {Mon, 21 Sep 2009 12:13:42 +0200}, biburl = {https://dblp.org/rec/conf/bcs/JurjensYB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csmr/RatiuFJ08, author = {Daniel Ratiu and Martin Feilkas and Jan J{\"{u}}rjens}, title = {Extracting Domain Ontologies from Domain Specific APIs}, booktitle = {12th European Conference on Software Maintenance and Reengineering, {CSMR} 2008, April 1-4, 2008, Athens, Greece}, pages = {203--212}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSMR.2008.4493315}, doi = {10.1109/CSMR.2008.4493315}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csmr/RatiuFJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/FernandezJYW08, author = {Eduardo B. Fern{\'{a}}ndez and Jan J{\"{u}}rjens and Nobukazu Yoshioka and Hironori Washizaki}, title = {Incorporating Database Systems into a Secure Software Development Methodology}, booktitle = {19th International Workshop on Database and Expert Systems Applications {(DEXA} 2008), 1-5 September 2008, Turin, Italy}, pages = {310--314}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/DEXA.2008.100}, doi = {10.1109/DEXA.2008.100}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexaw/FernandezJYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/JurjensSY08, author = {Jan J{\"{u}}rjens and J{\"{o}}rg Schreck and Yijun Yu}, editor = {Jos{\'{e}} Luiz Fiadeiro and Paola Inverardi}, title = {Automated Analysis of Permission-Based Security Using UMLsec}, booktitle = {Fundamental Approaches to Software Engineering, 11th International Conference, {FASE} 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4961}, pages = {292--295}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78743-3\_21}, doi = {10.1007/978-3-540-78743-3\_21}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fase/JurjensSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BauerJ08, author = {Andreas Bauer and Jan J{\"{u}}rjens}, editor = {Bart De Win and Seok{-}Won Lee and Mattia Monga}, title = {Security protocols, properties, and their monitoring}, booktitle = {Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, {SESS} 2008, Leipzig, Germany, May 17-18, 2008}, pages = {33--40}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1370905.1370910}, doi = {10.1145/1370905.1370910}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/BauerJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/JurjensSB08, author = {Jan J{\"{u}}rjens and J{\"{o}}rg Schreck and Peter Bartmann}, editor = {Wilhelm Sch{\"{a}}fer and Matthew B. Dwyer and Volker Gruhn}, title = {Model-based security analysis for mobile communications}, booktitle = {30th International Conference on Software Engineering {(ICSE} 2008), Leipzig, Germany, May 10-18, 2008}, pages = {683--692}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368088.1368186}, doi = {10.1145/1368088.1368186}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/JurjensSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/HohnJ08, author = {Sebastian H{\"{o}}hn and Jan J{\"{u}}rjens}, editor = {Wilhelm Sch{\"{a}}fer and Matthew B. Dwyer and Volker Gruhn}, title = {Rubacon: automated support for model-based compliance engineering}, booktitle = {30th International Conference on Software Engineering {(ICSE} 2008), Leipzig, Germany, May 10-18, 2008}, pages = {875--878}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368088.1368228}, doi = {10.1145/1368088.1368228}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/HohnJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/YuJM08, author = {Yijun Yu and Jan J{\"{u}}rjens and John Mylopoulos}, title = {Traceability for the maintenance of secure software}, booktitle = {24th {IEEE} International Conference on Software Maintenance {(ICSM} 2008), September 28 - October 4, 2008, Beijing, China}, pages = {297--306}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICSM.2008.4658078}, doi = {10.1109/ICSM.2008.4658078}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icsm/YuJM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/RatiuJ08, author = {Daniel Ratiu and Jan J{\"{u}}rjens}, editor = {Ren{\'{e}} L. Krikhaar and Ralf L{\"{a}}mmel and Chris Verhoef}, title = {Evaluating the Reference and Representation of Domain Concepts in APIs}, booktitle = {The 16th {IEEE} International Conference on Program Comprehension, {ICPC} 2008, Amsterdam, The Netherlands, June 10-13, 2008}, pages = {242--247}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICPC.2008.11}, doi = {10.1109/ICPC.2008.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/RatiuJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/YuJS08, author = {Yijun Yu and Jan J{\"{u}}rjens and J{\"{o}}rg Schreck}, title = {Tools for Traceability in Secure Software Development}, booktitle = {23rd {IEEE/ACM} International Conference on Automated Software Engineering {(ASE} 2008), 15-19 September 2008, L'Aquila, Italy}, pages = {503--504}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ASE.2008.92}, doi = {10.1109/ASE.2008.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/YuJS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/IslamJ08, author = {Shareeful Islam and Jan J{\"{u}}rjens}, editor = {Jon Whittle and Jan J{\"{u}}rjens and Bashar Nuseibeh and Glen Dobson}, title = {Incorporating Security Requirements from Legal Regulations into UMLsec model}, booktitle = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)} held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France, September 28, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {413}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-413/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:21 +0100}, biburl = {https://dblp.org/rec/conf/models/IslamJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/WhittleJND08, author = {Jon Whittle and Jan J{\"{u}}rjens and Bashar Nuseibeh and Glen Dobson}, editor = {Michel R. V. Chaudron}, title = {First International Modeling Security Workshop}, booktitle = {Models in Software Engineering, Workshops and Symposia at {MODELS} 2008, Toulouse, France, September 28 - October 3, 2008. Reports and Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5421}, pages = {181--184}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01648-6\_19}, doi = {10.1007/978-3-642-01648-6\_19}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/models/WhittleJND08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/JurjensRT08, author = {Jan J{\"{u}}rjens and Daniel Rei{\ss} and David Trachtenherz}, editor = {Krzysztof Czarnecki and Ileana Ober and Jean{-}Michel Bruel and Axel Uhl and Markus V{\"{o}}lter}, title = {Model-Based Quality Assurance of Automotive Software}, booktitle = {Model Driven Engineering Languages and Systems, 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5301}, pages = {858--873}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87875-9\_59}, doi = {10.1007/978-3-540-87875-9\_59}, timestamp = {Fri, 30 Dec 2022 23:08:54 +0100}, biburl = {https://dblp.org/rec/conf/models/JurjensRT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/TaubenbergerJ08, author = {Stefan Taubenberger and Jan J{\"{u}}rjens}, editor = {Jon Whittle and Jan J{\"{u}}rjens and Bashar Nuseibeh and Glen Dobson}, title = {{IT} Security Risk Analysis based on Business Process Models enhanced with Security Requirements}, booktitle = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)} held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France, September 28, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {413}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-413/paper16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/models/TaubenbergerJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/Jurjens08, author = {Jan J{\"{u}}rjens}, editor = {Martin Leucker}, title = {Model-Based Run-Time Checking of Security Permissions Using Guarded Objects}, booktitle = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest, Hungary, March 30, 2008. Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5289}, pages = {36--50}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89247-2\_3}, doi = {10.1007/978-3-540-89247-2\_3}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/rv/Jurjens08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Jurjens08, author = {Jan J{\"{u}}rjens}, editor = {Bernd Finkbeiner and Yuri Gurevich and Alexander K. Petrenko}, title = {Model-based Security Testing Using UMLsec: {A} Case Study}, booktitle = {Proceedings of the Fourth Workshop on Model Based Testing, MBT@ETAPS 2008, Budapest, Hungary, March 30, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {220}, number = {1}, pages = {93--104}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2008.11.008}, doi = {10.1016/J.ENTCS.2008.11.008}, timestamp = {Fri, 17 Feb 2023 11:06:30 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Jurjens08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/models/2008modsec, editor = {Jon Whittle and Jan J{\"{u}}rjens and Bashar Nuseibeh and Glen Dobson}, title = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)} held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France, September 28, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {413}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-413}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/models/2008modsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/JurjensS07, author = {Jan J{\"{u}}rjens and Pasha Shabalin}, title = {Tools for secure systems development with {UML}}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {9}, number = {5-6}, pages = {527--544}, year = {2007}, url = {https://doi.org/10.1007/s10009-007-0048-8}, doi = {10.1007/S10009-007-0048-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/JurjensS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csmr/RatiuJ07, author = {Daniel Ratiu and Jan J{\"{u}}rjens}, editor = {Ren{\'{e}} L. Krikhaar and Chris Verhoef and Giuseppe A. Di Lucca}, title = {The Reality of Libraries}, booktitle = {11th European Conference on Software Maintenance and Reengineering, Software Evolution in Complex Software Intensive Systems, {CSMR} 2007, 21-23 March 2007, Amsterdam, The Netherlands}, pages = {307--318}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CSMR.2007.48}, doi = {10.1109/CSMR.2007.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csmr/RatiuJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Jurjens07, author = {Jan J{\"{u}}rjens}, title = {Developing Secure Embedded Systems: Pitfalls and How to Avoid Them}, booktitle = {29th International Conference on Software Engineering {(ICSE} 2007), Minneapolis, MN, USA, May 20-26, 2007, Companion Volume}, pages = {182--183}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICSECOMPANION.2007.30}, doi = {10.1109/ICSECOMPANION.2007.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Jurjens07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BestJN07, author = {Bastian Best and Jan J{\"{u}}rjens and Bashar Nuseibeh}, title = {Model-Based Security Engineering of Distributed Information Systems Using UMLsec}, booktitle = {29th International Conference on Software Engineering {(ICSE} 2007), Minneapolis, MN, USA, May 20-26, 2007}, pages = {581--590}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICSE.2007.55}, doi = {10.1109/ICSE.2007.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/BestJN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/JurjensY07, author = {Jan J{\"{u}}rjens and Yijun Yu}, editor = {R. E. Kurt Stirewalt and Alexander Egyed and Bernd Fischer}, title = {Tools for model-based security engineering: models vs. code}, booktitle = {22nd {IEEE/ACM} International Conference on Automated Software Engineering {(ASE} 2007), November 5-9, 2007, Atlanta, Georgia, {USA}}, pages = {545--546}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1321631.1321736}, doi = {10.1145/1321631.1321736}, timestamp = {Tue, 06 Nov 2018 16:58:23 +0100}, biburl = {https://dblp.org/rec/conf/kbse/JurjensY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wosp/PetriuWPXIGFBHJ07, author = {Dorina C. Petriu and C. Murray Woodside and Dorin Bogdan Petriu and Jing Xu and Toqeer Israr and Geri Georg and Robert B. France and James M. Bieman and Siv Hilde Houmb and Jan J{\"{u}}rjens}, editor = {Vittorio Cortellessa and Sebasti{\'{a}}n Uchitel and Daniel Yankelevich}, title = {Performance analysis of security aspects in {UML} models}, booktitle = {Proceedings of the 6th International Workshop on Software and Performance, {WOSP} 2007, Buenes Aires, Argentina, February 5-8, 2007}, pages = {91--102}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1216993.1217010}, doi = {10.1145/1216993.1217010}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wosp/PetriuWPXIGFBHJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Jurjens09, author = {Jan J{\"{u}}rjens}, editor = {Michael Goldsmith and Bill Roscoe}, title = {Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project}, booktitle = {Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, AVoCS 2007, Oxford, UK, September 10-12, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {250}, number = {1}, pages = {123--136}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2009.08.009}, doi = {10.1016/J.ENTCS.2009.08.009}, timestamp = {Fri, 24 Feb 2023 13:48:46 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Jurjens09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/MouratidisJF06, author = {Haralambos Mouratidis and Jan J{\"{u}}rjens and Jorge Fox}, editor = {Eric Dubois and Klaus Pohl}, title = {Towards a Comprehensive Framework for Secure Systems Development}, booktitle = {Advanced Information Systems Engineering, 18th International Conference, CAiSE 2006, Luxembourg, Luxembourg, June 5-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4001}, pages = {48--62}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11767138\_5}, doi = {10.1007/11767138\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/MouratidisJF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/Jurjens06, author = {Jan J{\"{u}}rjens}, editor = {Jayadev Misra and Tobias Nipkow and Emil Sekerinski}, title = {Model-Based Security Engineering for Real}, booktitle = {{FM} 2006: Formal Methods, 14th International Symposium on Formal Methods, Hamilton, Canada, August 21-27, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4085}, pages = {600--606}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11813040\_42}, doi = {10.1007/11813040\_42}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/Jurjens06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/JurjensF06, author = {Jan J{\"{u}}rjens and Jorge Fox}, editor = {Leon J. Osterweil and H. Dieter Rombach and Mary Lou Soffa}, title = {Tools for model-based security engineering}, booktitle = {28th International Conference on Software Engineering {(ICSE} 2006), Shanghai, China, May 20-28, 2006}, pages = {819--822}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134285.1134423}, doi = {10.1145/1134285.1134423}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/JurjensF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/Jurjens06, author = {Jan J{\"{u}}rjens}, title = {Security Analysis of Crypto-based Java Programs using Automated Theorem Provers}, booktitle = {21st {IEEE/ACM} International Conference on Automated Software Engineering {(ASE} 2006), 18-22 September 2006, Tokyo, Japan}, pages = {167--176}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ASE.2006.60}, doi = {10.1109/ASE.2006.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/Jurjens06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/GeorgHFZPJ06, author = {Geri Georg and Siv Hilde Houmb and Robert B. France and Steffen Zschaler and Dorina C. Petriu and Jan J{\"{u}}rjens}, editor = {Thomas K{\"{u}}hne}, title = {Critical Systems Development Using Modeling Languages - {CSDUML} 2006 Workshop Report}, booktitle = {Models in Software Engineering, Workshops and Symposia at MoDELS 2006, Genoa, Italy, October 1-6, 2006, Reports and Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4364}, pages = {27--31}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-69489-2\_4}, doi = {10.1007/978-3-540-69489-2\_4}, timestamp = {Wed, 23 Feb 2022 12:58:00 +0100}, biburl = {https://dblp.org/rec/conf/models/GeorgHFZPJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Jurjens06, author = {Jan J{\"{u}}rjens}, editor = {Manu Malek and Eduardo Fern{\'{a}}ndez{-}Medina and Javier Hernando}, title = {Model-Based Security Engineering}, booktitle = {{SECRYPT} 2006, Proceedings of the International Conference on Security and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {{INSTICC} Press}, year = {2006}, timestamp = {Thu, 28 Sep 2006 10:10:32 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Jurjens06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/FoxJ06, author = {Jorge Fox and Jan J{\"{u}}rjens}, editor = {Ed Brinksma and David Harel and Angelika Mader and Perdita Stevens and Roel J. Wieringa}, title = {A Framework for Analyzing Composition of Security Aspects}, booktitle = {Methods for Modelling Software Systems (MMOSS), 27.08. - 01.09.2006}, series = {Dagstuhl Seminar Proceedings}, volume = {06351}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2006}, url = {http://drops.dagstuhl.de/opus/volltexte/2007/859}, timestamp = {Thu, 10 Jun 2021 13:02:07 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/FoxJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0015258, author = {Jan J{\"{u}}rjens}, title = {Secure systems development with {UML}}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137706}, doi = {10.1007/B137706}, isbn = {978-3-540-00701-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0015258.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Jurjens05, author = {Jan J{\"{u}}rjens}, title = {Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {138--149}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.15}, doi = {10.1109/CSAC.2005.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Jurjens05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/BotaschanjanJ05, author = {Jewgenij Botaschanjan and Jan J{\"{u}}rjens}, title = {MoDeII: Modeling and Analyzing Time-Constraints}, booktitle = {12th {IEEE} International Conference on the Engineering of Computer-Based Systems {(ECBS} 2005), 4-7 April 2005, Greenbelt, MD, {USA}}, pages = {299--306}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ECBS.2005.52}, doi = {10.1109/ECBS.2005.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/BotaschanjanJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/FoxJ05, author = {Jorge Fox and Jan J{\"{u}}rjens}, title = {Introducing Security Aspects with Model Transformations}, booktitle = {12th {IEEE} International Conference on the Engineering of Computer-Based Systems {(ECBS} 2005), 4-7 April 2005, Greenbelt, MD, {USA}}, pages = {543--549}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ECBS.2005.48}, doi = {10.1109/ECBS.2005.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/FoxJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/WagnerJ05, author = {Stefan Wagner and Jan J{\"{u}}rjens}, editor = {Mario Dal Cin and Mohamed Ka{\^{a}}niche and Andr{\'{a}}s Pataricza}, title = {Model-Based Identification of Fault-Prone Components}, booktitle = {Dependable Computing - EDCC-5, 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3463}, pages = {435--452}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11408901\_32}, doi = {10.1007/11408901\_32}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/WagnerJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/JurjensS05, author = {Jan J{\"{u}}rjens and Pasha Shabalin}, editor = {Maura Cerioli}, title = {Tools for Secure Systems Development with {UML:} Security Analysis with ATPs}, booktitle = {Fundamental Approaches to Software Engineering, 8th International Conference, {FASE} 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3442}, pages = {305--309}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31984-9\_23}, doi = {10.1007/978-3-540-31984-9\_23}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fase/JurjensS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmco/Jurjens05, author = {Jan J{\"{u}}rjens}, editor = {Frank S. de Boer and Marcello M. Bonsangue and Susanne Graf and Willem P. de Roever}, title = {Model-Based Security Engineering with {UML:} Introducing Security Aspects}, booktitle = {Formal Methods for Components and Objects, 4th International Symposium, {FMCO} 2005, Amsterdam, The Netherlands, November 1-4, 2005, Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {4111}, pages = {64--87}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11804192\_4}, doi = {10.1007/11804192\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fmco/Jurjens05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/galop/Jurjens05, author = {Jan J{\"{u}}rjens}, editor = {Dan R. Ghica and Guy McCusker}, title = {Towards using game semantics for crypto protocol verification: Lorenzen games}, booktitle = {1st Workshop on Games for Logic and Programming Languages, GALOP@ETAPS 2005, Edinburgh, UK, 2-3 April 2005}, pages = {241--257}, year = {2005}, timestamp = {Thu, 25 Jun 2020 16:30:03 +0200}, biburl = {https://dblp.org/rec/conf/galop/Jurjens05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/HoumbGFBJ05, author = {Siv Hilde Houmb and Geri Georg and Robert B. France and James M. Bieman and Jan J{\"{u}}rjens}, title = {Cost-Benefit Trade-Off Analysis Using {BBN} for Aspect-Oriented Risk-Driven Development}, booktitle = {10th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2005), 16-20 June 2005, Shanghai, China}, pages = {195--204}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICECCS.2005.30}, doi = {10.1109/ICECCS.2005.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/HoumbGFBJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/JurjensLW05, author = {Jan J{\"{u}}rjens and Markus Lehrhuber and Guido Wimmel}, title = {Model-Based Design and Analysis of Permission-Based Security}, booktitle = {10th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2005), 16-20 June 2005, Shanghai, China}, pages = {224--233}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICECCS.2005.61}, doi = {10.1109/ICECCS.2005.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/JurjensLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Jurjens05, author = {Jan J{\"{u}}rjens}, editor = {Gruia{-}Catalin Roman and William G. Griswold and Bashar Nuseibeh}, title = {Sound methods and effective tools for model-based security engineering with {UML}}, booktitle = {27th International Conference on Software Engineering {(ICSE} 2005), 15-21 May 2005, St. Louis, Missouri, {USA}}, pages = {322--331}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1062455.1062519}, doi = {10.1145/1062455.1062519}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Jurjens05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/Jurjens05, author = {Jan J{\"{u}}rjens}, title = {Understanding Security Goals Provided by Crypto-Protocol Implementations}, booktitle = {21st {IEEE} International Conference on Software Maintenance {(ICSM} 2005), 25-30 September 2005, Budapest, Hungary}, pages = {643--646}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICSM.2005.97}, doi = {10.1109/ICSM.2005.97}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/Jurjens05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/JurjensY05, author = {Jan J{\"{u}}rjens and Mark Yampolskiy}, editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman}, title = {Code security analysis with assertions}, booktitle = {20th {IEEE/ACM} International Conference on Automated Software Engineering {(ASE} 2005), November 7-11, 2005, Long Beach, CA, {USA}}, pages = {392--395}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1101908.1101978}, doi = {10.1145/1101908.1101978}, timestamp = {Tue, 06 Nov 2018 16:58:23 +0100}, biburl = {https://dblp.org/rec/conf/kbse/JurjensY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/memocode/Jurjens05, author = {Jan J{\"{u}}rjens}, title = {Verification of low-level crypto-protocol implementations using automated theorem proving}, booktitle = {3rd {ACM} {\&} {IEEE} International Conference on Formal Methods and Models for Co-Design {(MEMOCODE} 2005), 11-14 July 2005, Verona, Italy, Proceedings}, pages = {89--98}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MEMCOD.2005.1487898}, doi = {10.1109/MEMCOD.2005.1487898}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/memocode/Jurjens05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pts/WagnerJKT05, author = {Stefan Wagner and Jan J{\"{u}}rjens and Claudia Koller and Peter Trischberger}, editor = {Ferhat Khendek and Rachida Dssouli}, title = {Comparing Bug Finding Tools with Reviews and Tests}, booktitle = {Testing of Communicating Systems, 17th {IFIP} {TC6/WG} 6.1 International Conference, TestCom 2005, Montreal, Canada, May 31 - June 2, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3502}, pages = {40--55}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11430230\_4}, doi = {10.1007/11430230\_4}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pts/WagnerJKT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uml/JurjensH05, author = {Jan J{\"{u}}rjens and Siv Hilde Houmb}, editor = {Lionel C. Briand and Clay Williams}, title = {Dynamic Secure Aspect Modeling with {UML:} From Models to Code}, booktitle = {Model Driven Engineering Languages and Systems, 8th International Conference, MoDELS 2005, Montego Bay, Jamaica, October 2-7, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3713}, pages = {142--155}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11557432\_11}, doi = {10.1007/11557432\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/uml/JurjensH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/05/JurjensS05, author = {Jan J{\"{u}}rjens and Pasha Shabalin}, editor = {Sami Beydeda and Matthias Book and Volker Gruhn}, title = {Tool Support for Model-Driven Development of Security-Critical Systems with {UML}}, booktitle = {Model-Driven Software Development}, pages = {35--55}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/3-540-28554-7\_3}, doi = {10.1007/3-540-28554-7\_3}, timestamp = {Mon, 16 Sep 2019 14:43:26 +0200}, biburl = {https://dblp.org/rec/books/sp/05/JurjensS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Jurjens005, author = {Jan J{\"{u}}rjens and Stefan Wagner}, editor = {Colin Atkinson and Christian Bunse and Hans{-}Gerhard Gross and Christian Peper}, title = {Component-Based Development of Dependable Systems with {UML}}, booktitle = {Component-Based Software Development for Embedded Systems - An Overview of Current Research Trends}, series = {Lecture Notes in Computer Science}, volume = {3778}, pages = {320--344}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11591962\_16}, doi = {10.1007/11591962\_16}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Jurjens005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/Jurjens04, author = {Jan J{\"{u}}rjens}, title = {Componentware for Critical Systems}, journal = {J. Object Technol.}, volume = {3}, number = {4}, pages = {47--50}, year = {2004}, url = {https://doi.org/10.5381/jot.2004.3.4.a3}, doi = {10.5381/JOT.2004.3.4.A3}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jot/Jurjens04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/JurjensS04, author = {Jan J{\"{u}}rjens and Pasha Shabalin}, title = {A Foundation for Tool-Supported Critical Systems Development with {UML}}, booktitle = {11th {IEEE} International Conference on the Engineering of Computer-Based Systems {(ECBS} 2004), 24-27 May 2004, Brno, Czech Republic}, pages = {398--405}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ECBS.2004.1316724}, doi = {10.1109/ECBS.2004.1316724}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/JurjensS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/Jurjens04, author = {Jan J{\"{u}}rjens}, editor = {Alessandro Aldini and Roberto Gorrieri and Fabio Martinelli}, title = {Model-Based Security Engineering with {UML}}, booktitle = {Foundations of Security Analysis and Design III, {FOSAD} 2004/2005 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {3655}, pages = {42--77}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11554578\_2}, doi = {10.1007/11554578\_2}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/fosad/Jurjens04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/Jurjens04, author = {Jan J{\"{u}}rjens}, title = {Developing High-Assurance Secure Systems with {UML:} {A} Smartcard-Based Purchase Protocol}, booktitle = {8th {IEEE} International Symposium on High-Assurance Systems Engineering {(HASE} 2004), 25-26 March 2004, Tampa, FL, {USA}}, pages = {231--240}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/HASE.2004.1281747}, doi = {10.1109/HASE.2004.1281747}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/Jurjens04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/DeublerGJW04, author = {Martin R. Deubler and Johannes Gr{\"{u}}nbauer and Jan J{\"{u}}rjens and Guido Wimmel}, editor = {Marco Aiello and Mikio Aoyama and Francisco Curbera and Mike P. Papazoglou}, title = {Sound development of secure service-based systems}, booktitle = {Service-Oriented Computing - {ICSOC} 2004, Second International Conference, New York, NY, USA, November 15-19, 2004, Proceedings}, pages = {115--124}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1035167.1035185}, doi = {10.1145/1035167.1035185}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/DeublerGJW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/JurjensH04, author = {Jan J{\"{u}}rjens and Siv Hilde Houmb}, editor = {Ricardo Reis}, title = {Risk-Driven Development Of Security-Critical Systems Using UMLsec}, booktitle = {Information Technology, Selected Tutorials, {IFIP} 18th World Computer Congress, Tutorials, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {157}, pages = {21--53}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8159-6\_2}, doi = {10.1007/1-4020-8159-6\_2}, timestamp = {Tue, 22 Oct 2019 15:21:17 +0200}, biburl = {https://dblp.org/rec/conf/ifip/JurjensH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/modellierung/GrunbauerJW04, author = {Johannes Gr{\"{u}}nbauer and Jan J{\"{u}}rjens and Guido Wimmel}, editor = {Bernhard Rumpe and Wolfgang Hesse}, title = {Modelling Secure {IT} Systems - {A} Survey}, booktitle = {Modellierung 2004, Proceedings zur Tagung, 23.-26. M{\"{a}}rz 2004, Marburg, Proceedings}, series = {{LNI}}, volume = {{P-45}}, pages = {307--308}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/29253}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/modellierung/GrunbauerJW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/modellierung/SchmidtJ04, author = {Robert Schmidt and Jan J{\"{u}}rjens}, editor = {Bernhard Rumpe and Wolfgang Hesse}, title = {Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem}, booktitle = {Modellierung 2004, Proceedings zur Tagung, 23.-26. M{\"{a}}rz 2004, Marburg, Proceedings}, series = {{LNI}}, volume = {{P-45}}, pages = {309--310}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/29254}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/modellierung/SchmidtJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uml/JurjensFFRH04, author = {Jan J{\"{u}}rjens and Eduardo B. Fern{\'{a}}ndez and Robert B. France and Bernhard Rumpe and Constance L. Heitmeyer}, editor = {Nuno Jardim Nunes and Bran Selic and Alberto Rodrigues da Silva and Jos{\'{e}} Ambrosio Toval {\'{A}}lvarez}, title = {Critical Systems Development Using Modeling Languages {(CSDUML-04):} Current Developments and Future Challenges (Report on the Third International Workshop)}, booktitle = {{UML} Modeling Languages and Applications, {\guillemotleft}UML{\guillemotright} 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3297}, pages = {76--84}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31797-5\_9}, doi = {10.1007/978-3-540-31797-5\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uml/JurjensFFRH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uml/JurjensS04a, author = {Jan J{\"{u}}rjens and Pasha Shabalin}, editor = {Nuno Jardim Nunes and Bran Selic and Alberto Rodrigues da Silva and Jos{\'{e}} Ambrosio Toval {\'{A}}lvarez}, title = {Tools for Critical Systems Development with {UML} (Tool Demo)}, booktitle = {{UML} Modeling Languages and Applications, {\guillemotleft}UML{\guillemotright} 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3297}, pages = {250--253}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31797-5\_27}, doi = {10.1007/978-3-540-31797-5\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uml/JurjensS04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uml/JurjensS04, author = {Jan J{\"{u}}rjens and Pasha Shabalin}, editor = {Thomas Baar and Alfred Strohmeier and Ana M. D. Moreira and Stephen J. Mellor}, title = {Automated Verification of UMLsec Models for Security Requirements}, booktitle = {{\guillemotleft}UML{\guillemotright} 2004 - The Unified Modelling Language: Modelling Languages and Applications. 7th International Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3273}, pages = {365--379}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30187-5\_26}, doi = {10.1007/978-3-540-30187-5\_26}, timestamp = {Mon, 15 Jun 2020 17:02:11 +0200}, biburl = {https://dblp.org/rec/conf/uml/JurjensS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Jurjens06, author = {Jan J{\"{u}}rjens}, editor = {Maurice H. ter Beek and Fabio Gadducci}, title = {Foundations for Designing Secure Architectures}, booktitle = {Proceedings of the First International Workshop on Views on Designing Complex Architectures, VODCA@FOSAD 2004, Bertinoro, Italy, September 11-12, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {142}, pages = {31--46}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2005.07.012}, doi = {10.1016/J.ENTCS.2005.07.012}, timestamp = {Thu, 15 Dec 2022 14:30:44 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Jurjens06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stt/Jurjens03, author = {Jan J{\"{u}}rjens}, title = {Bericht {\"{u}}ber die erste Jahrestagung der GI-Fachgruppe FoMSESS vom 12. bis 13. Mai 2003 in Karlsruhe}, journal = {Softwaretechnik-Trends}, volume = {23}, number = {3}, year = {2003}, url = {http://pi.informatik.uni-siegen.de/stt/23\_3/09\_Konferenzberichte/FoMSESS.ps}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stt/Jurjens03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsd/RombergJWSH03, author = {Jan Romberg and Jan J{\"{u}}rjens and Guido Wimmel and Oscar Slotosch and Gabor Hahn}, title = {AutoFOCUS and the MoDe Tool}, booktitle = {3rd International Conference on Application of Concurrency to System Design {(ACSD} 2003), 18-20 June 2003, Guimaraes, Portugal}, pages = {249--250}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSD.2003.1207727}, doi = {10.1109/CSD.2003.1207727}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsd/RombergJWSH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/PoppJWB03, author = {Gerhard Popp and Jan J{\"{u}}rjens and Guido Wimmel and Ruth Breu}, title = {Security-Critical System Development with Extended Use Cases}, booktitle = {10th Asia-Pacific Software Engineering Conference {(APSEC} 2003), 10-12 December 2003, Chiang Mai, Thailand}, pages = {478--487}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/APSEC.2003.1254403}, doi = {10.1109/APSEC.2003.1254403}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsec/PoppJWB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/HoumbJ03, author = {Siv Hilde Houmb and Jan J{\"{u}}rjens}, title = {Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec}, booktitle = {10th Asia-Pacific Software Engineering Conference {(APSEC} 2003), 10-12 December 2003, Chiang Mai, Thailand}, pages = {488}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/APSEC.2003.1254404}, doi = {10.1109/APSEC.2003.1254404}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsec/HoumbJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ershov/Jurjens03, author = {Jan J{\"{u}}rjens}, editor = {Manfred Broy and Alexandre V. Zamulin}, title = {Algebraic State Machines: Concepts and Applications to Security}, booktitle = {Perspectives of Systems Informatics, 5th International Andrei Ershov Memorial Conference, {PSI} 2003, Akademgorodok, Novosibirsk, Russia, July 9-12, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2890}, pages = {338--343}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39866-0\_33}, doi = {10.1007/978-3-540-39866-0\_33}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/ershov/Jurjens03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ladc/JurjensH03, author = {Jan J{\"{u}}rjens and Siv Hilde Houmb}, editor = {Rog{\'{e}}rio de Lemos and Taisy Silva Weber and Jo{\~{a}}o Batista Camargo Jr.}, title = {Development of Safety-Critical Systems and Model-Based Risk Analysis with {UML}}, booktitle = {Dependable Computing, First Latin-American Symposium, {LADC} 2003, Sao Paulo, Brazil, October 21-24, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2847}, pages = {364--365}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45214-0\_28}, doi = {10.1007/978-3-540-45214-0\_28}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ladc/JurjensH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/GrunbauerHJW03, author = {Johannes Gr{\"{u}}nbauer and Helia Hollmann and Jan J{\"{u}}rjens and Guido Wimmel}, editor = {Stuart Anderson and Massimo Felici and Bev Littlewood}, title = {Modelling and Verification of Layered Security Protocols: {A} Bank Application}, booktitle = {Computer Safety, Reliability, and Security, 22nd International Conference, {SAFECOMP} 2003, Edinburgh, UK, September 23-26, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2788}, pages = {116--129}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39878-3\_10}, doi = {10.1007/978-3-540-39878-3\_10}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/GrunbauerHJW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/JurjensG03, author = {Jan J{\"{u}}rjens and Johannes Gr{\"{u}}nbauer}, editor = {Walter Dosch and Roger Y. Lee}, title = {Critical Systems Development with {UML:} Overview with Automatic Case Study}, booktitle = {Proceedings of the {ACIS} Fourth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD'03), October 16-18, 2003, L{\"{u}}beck, Germany}, pages = {512--517}, publisher = {{ACIS}}, year = {2003}, timestamp = {Wed, 26 Nov 2003 12:28:17 +0100}, biburl = {https://dblp.org/rec/conf/snpd/JurjensG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/HohnJ03, author = {Sebastian H{\"{o}}hn and Jan J{\"{u}}rjens}, editor = {Sushil Jajodia and Leon Strous}, title = {Automated Checking of {SAP} Security Permisisons}, booktitle = {Integrity and Internal Control in Information Systems {VI} - {IFIP} {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland}, series = {{IFIP}}, volume = {140}, pages = {13--30}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/1-4020-7901-X\_2}, doi = {10.1007/1-4020-7901-X\_2}, timestamp = {Tue, 23 May 2017 01:07:20 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/HohnJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uml/Jurjens03, author = {Jan J{\"{u}}rjens}, editor = {Perdita Stevens and Jon Whittle and Grady Booch}, title = {Developing Safety-Critical Systems with {UML}}, booktitle = {{\guillemotleft}UML{\guillemotright} 2003 - The Unified Modeling Language, Modeling Languages and Applications, 6th International Conference, San Francisco, CA, USA, October 20-24, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2863}, pages = {360--372}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45221-8\_31}, doi = {10.1007/978-3-540-45221-8\_31}, timestamp = {Tue, 24 May 2022 15:28:50 +0200}, biburl = {https://dblp.org/rec/conf/uml/Jurjens03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/JuIrjens02, author = {Jan J{\"{u}}rjens}, title = {Principles for secure system design}, school = {University of Oxford, {UK}}, year = {2002}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.400047}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/JuIrjens02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/synthese/Jurjens02, author = {Jan J{\"{u}}rjens}, title = {Games In The Semantics Of Programming Languages - An Elementary Introduction}, journal = {Synth.}, volume = {133}, number = {1-2}, pages = {131--158}, year = {2002}, url = {https://doi.org/10.1023/A:1020883810034}, doi = {10.1023/A:1020883810034}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/synthese/Jurjens02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmoods/Jurjens02, author = {Jan J{\"{u}}rjens}, editor = {Bart Jacobs and Arend Rensink}, title = {Formal Semantics for Interacting {UML} subsystems}, booktitle = {Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands}, series = {{IFIP} Conference Proceedings}, volume = {209}, pages = {29--43}, publisher = {Kluwer}, year = {2002}, timestamp = {Thu, 09 Jul 2015 16:49:48 +0200}, biburl = {https://dblp.org/rec/conf/fmoods/Jurjens02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/WimmelJ02, author = {Guido Wimmel and Jan J{\"{u}}rjens}, editor = {Chris George and Huaikou Miao}, title = {Specification-Based Test Generation for Security-Critical Systems Using Mutations}, booktitle = {Formal Methods and Software Engineering, 4th International Conference on Formal Engineering Methods, {ICFEM} 2002 Shanghai, China, October 21-25, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2495}, pages = {471--482}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36103-0\_48}, doi = {10.1007/3-540-36103-0\_48}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/icfem/WimmelJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/Jurjens02, author = {Jan J{\"{u}}rjens}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {A {UML} statecharts semantics with message-passing}, booktitle = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain}, pages = {1009--1013}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/508791.508987}, doi = {10.1145/508791.508987}, timestamp = {Tue, 06 Nov 2018 11:06:47 +0100}, biburl = {https://dblp.org/rec/conf/sac/Jurjens02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/Jurjens02a, author = {Jan J{\"{u}}rjens}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {Using UMLsec and goal trees for secure systems development}, booktitle = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain}, pages = {1026--1030}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/508791.508990}, doi = {10.1145/508791.508990}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/Jurjens02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uml/Jurjens02, author = {Jan J{\"{u}}rjens}, editor = {Jean{-}Marc J{\'{e}}z{\'{e}}quel and Heinrich Hu{\ss}mann and Stephen Cook}, title = {UMLsec: Extending {UML} for Secure Systems Development}, booktitle = {{UML} 2002 - The Unified Modeling Language, 5th International Conference, Dresden, Germany, September 30 - October 4, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2460}, pages = {412--425}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45800-X\_32}, doi = {10.1007/3-540-45800-X\_32}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/uml/Jurjens02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsd/Jurjens01, author = {Jan J{\"{u}}rjens}, title = {Abstracting from Failure Probabilities}, booktitle = {2nd International Conference on Application of Concurrency to System Design {(ACSD} 2001), 25-30 June 2001, Newcastle upon Tyne, {UK}}, pages = {53}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CSD.2001.981764}, doi = {10.1109/CSD.2001.981764}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsd/Jurjens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ershov/JurjensW01, author = {Jan J{\"{u}}rjens and Guido Wimmel}, editor = {Dines Bj{\o}rner and Manfred Broy and Alexandre V. Zamulin}, title = {Specification-Based Testing of Firewalls}, booktitle = {Perspectives of System Informatics, 4th International Andrei Ershov Memorial Conference, {PSI} 2001, Akademgorodok, Novosibirsk, Russia, July 2-6, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2244}, pages = {308--316}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45575-2\_31}, doi = {10.1007/3-540-45575-2\_31}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/ershov/JurjensW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/Jurjens01, author = {Jan J{\"{u}}rjens}, editor = {Heinrich Hu{\ss}mann}, title = {Towards Development of Secure Systems Using UMLsec}, booktitle = {Fundamental Approaches to Software Engineering, 4th International Conference, {FASE} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2029}, pages = {187--200}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45314-8\_14}, doi = {10.1007/3-540-45314-8\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fase/Jurjens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/Jurjens01, author = {Jan J{\"{u}}rjens}, editor = {Jos{\'{e}} Nuno Oliveira and Pamela Zave}, title = {Secrecy-Preserving Refinement}, booktitle = {{FME} 2001: Formal Methods for Increasing Software Productivity, International Symposium of Formal Methods Europe, Berlin, Germany, March 12-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2021}, pages = {135--152}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45251-6\_8}, doi = {10.1007/3-540-45251-6\_8}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/Jurjens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/JurjensW01, author = {Jan J{\"{u}}rjens and Guido Wimmel}, editor = {Beat F. Schmid and Katarina Stanoevska{-}Slabeva and Volker Tschammer}, title = {Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications}, booktitle = {Towards The E-Society: E-Commerce, E-Business, and E-Government, The First {IFIP} Conference on E-Commerce, E-Business, E-Government {(I3E} 2001), October 3-5, Z{\"{u}}rich, Switzerland}, series = {{IFIP} Conference Proceedings}, volume = {202}, pages = {489--505}, publisher = {Kluwer}, year = {2001}, url = {https://doi.org/10.1007/0-306-47009-8\_36}, doi = {10.1007/0-306-47009-8\_36}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i3e/JurjensW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/JurjensW01, author = {Jan J{\"{u}}rjens and Guido Wimmel}, title = {Formally Testing Fail-Safety of Electronic Purse Protocols}, booktitle = {16th {IEEE} International Conference on Automated Software Engineering {(ASE} 2001), 26-29 November 2001, Coronado Island, San Diego, CA, {USA}}, pages = {408--411}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ASE.2001.989840}, doi = {10.1109/ASE.2001.989840}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/JurjensW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Jurjens01, author = {Jan J{\"{u}}rjens}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Composability of Secrecy}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {28--38}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_6}, doi = {10.1007/3-540-45116-1\_6}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Jurjens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsec/Jurgens01, author = {Jan J{\"{u}}rjens}, editor = {Bart De Decker and Frank Piessens and Jan Smits and Els Van Herreweghen}, title = {Secure Java Development with {UML}}, booktitle = {Advances in Network and Distributed Systems Security, {IFIP} {TC11} {WG11.4} First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {206}, pages = {107--124}, publisher = {Kluwer}, year = {2001}, url = {https://doi.org/10.1007/0-306-46958-8\_8}, doi = {10.1007/0-306-46958-8\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsec/Jurgens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Jurjens01, author = {Jan J{\"{u}}rjens}, editor = {Michel Dupuy and Pierre Paradinas}, title = {Modelling Audit Security for Smart-Cart Payment Schemes with {UML-SEC}}, booktitle = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France}, series = {{IFIP} Conference Proceedings}, volume = {193}, pages = {93--108}, publisher = {Kluwer}, year = {2001}, url = {https://doi.org/10.1007/0-306-46998-7\_7}, doi = {10.1007/0-306-46998-7\_7}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Jurjens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Jurjens01, author = {Jan J{\"{u}}rjens}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Encapsulating Rules of Prudent Security Engineering}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {95--101}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_15}, doi = {10.1007/3-540-45807-7\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Jurjens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Jurjens01a, author = {Jan J{\"{u}}rjens}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {102--106}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_16}, doi = {10.1007/3-540-45807-7\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Jurjens01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacs/AbadiJ01, author = {Mart{\'{\i}}n Abadi and Jan J{\"{u}}rjens}, editor = {Naoki Kobayashi and Benjamin C. Pierce}, title = {Formal Eavesdropping and Its Computational Interpretation}, booktitle = {Theoretical Aspects of Computer Software, 4th International Symposium, {TACS} 2001, Sendai, Japan, October 29-31, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2215}, pages = {82--94}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45500-0\_4}, doi = {10.1007/3-540-45500-0\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/tacs/AbadiJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vis/Jurjens01, author = {Jan J{\"{u}}rjens}, editor = {Dirk Fox and Marit K{\"{o}}hntopp and Andreas Pfitzmann}, title = {Developing Secure Systems with UMLsec - From Business Processes to Implementation}, booktitle = {Verl{\"{a}}ssliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, Proceedings der GI-Fachtagung {VIS} 2001, 12.-14.09.2001 in Kiel}, pages = {151--161}, publisher = {Vieweg+Teubner Verlag}, year = {2001}, url = {https://doi.org/10.1007/978-3-663-05918-9\_11}, doi = {10.1007/978-3-663-05918-9\_11}, timestamp = {Thu, 17 Nov 2022 13:36:41 +0100}, biburl = {https://dblp.org/rec/conf/vis/Jurjens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/Jurjens00, author = {Jan J{\"{u}}rjens}, editor = {Catuscia Palamidessi}, title = {Secure Information Flow for Concurrent Processes}, booktitle = {{CONCUR} 2000 - Concurrency Theory, 11th International Conference, University Park, PA, USA, August 22-25, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1877}, pages = {395--409}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44618-4\_29}, doi = {10.1007/3-540-44618-4\_29}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/Jurjens00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.