dblp.uni-trier.dewww.uni-trier.de

Jan Jürjens Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
86EEJan Jürjens, Tjark Weber: Finite Models in FOL-Based Crypto-Protocol Verification. ARSPA-WITS 2009: 155-172
85EEHaralambos Mouratidis, Ali Sunyaev, Jan Jürjens: Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. CAiSE 2009: 231-245
84EEJohn Lloyd, Jan Jürjens: Security Analysis of a Biometric Authentication System Using UMLsec and JML. MoDELS 2009: 77-91
83EEHironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Jan Jürjens: Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). OOPSLA Companion 2009: 713-714
82EEJan Jürjens: A domain-specific language for cryptographic protocols based on streams. J. Log. Algebr. Program. 78(2): 54-73 (2009)
81EEC. Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens: Performance analysis of security aspects by weaving scenarios extracted from UML models. Journal of Systems and Software 82(1): 56-74 (2009)
2008
80EEYijun Yu, Jan Jürjens, Jörg Schreck: Tools for Traceability in Secure Software Development. ASE 2008: 503-504
79EEJan Jürjens, Yijun Yu, Andreas Bauer: Tools for Traceable Security Verification. BCS Int. Acad. Conf. 2008: 367-390
78EEDaniel Ratiu, Martin Feilkas, Jan Jürjens: Extracting Domain Ontologies from Domain Specific APIs. CSMR 2008: 203-212
77EEEduardo B. Fernández, Jan Jürjens, Nobukazu Yoshioka, Hironori Washizaki: Incorporating Database Systems into a Secure Software Development Methodology. DEXA Workshops 2008: 310-314
76EEJan Jürjens, Jörg Schreck, Yijun Yu: Automated Analysis of Permission-Based Security Using UMLsec. FASE 2008: 292-295
75EEDaniel Ratiu, Jan Jürjens: Evaluating the Reference and Representation of Domain Concepts in APIs. ICPC 2008: 242-247
74EEJan Jürjens, Jörg Schreck, Peter Bartmann: Model-based security analysis for mobile communications. ICSE 2008: 683-692
73EESebastian Höhn, Jan Jürjens: Rubacon: automated support for model-based compliance engineering. ICSE 2008: 875-878
72EEYijun Yu, Jan Jürjens, John Mylopoulos: Traceability for the maintenance of secure software. ICSM 2008: 297-306
71EEJan Jürjens, Daniel Reiß, David Trachtenherz: Model-Based Quality Assurance of Automotive Software. MoDELS 2008: 858-873
70EEJon Whittle, Jan Jürjens, Bashar Nuseibeh, Glen Dobson: First International Modeling Security Workshop. MoDELS Workshops 2008: 181-184
69EEJan Jürjens: Model-Based Run-Time Checking of Security Permissions Using Guarded Objects. RV 2008: 36-50
68EEAndreas Bauer, Jan Jürjens: Security protocols, properties, and their monitoring. SESS 2008: 33-40
67EEJan Jürjens: Model-based Security Testing Using UMLsec: A Case Study. Electr. Notes Theor. Comput. Sci. 220(1): 93-104 (2008)
2007
66EEJan Jürjens, Yijun Yu: Tools for model-based security engineering: models vs. code. ASE 2007: 545-546
65EEDaniel Ratiu, Jan Jürjens: The Reality of Libraries. CSMR 2007: 307-318
64EEBastian Best, Jan Jürjens, Bashar Nuseibeh: Model-Based Security Engineering of Distributed Information Systems Using UMLsec. ICSE 2007: 581-590
63EEJan Jürjens: Developing Secure Embedded Systems: Pitfalls and How to Avoid Them. ICSE Companion 2007: 182-183
62EEDorina C. Petriu, C. Murray Woodside, Dorin Bogdan Petriu, Jing Xu, Toqeer Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens: Performance analysis of security aspects in UML models. WOSP 2007: 91-102
61EEJan Jürjens, Pasha Shabalin: Tools for secure systems development with UML. STTT 9(5-6): 527-544 (2007)
2006
60EEJan Jürjens: Security Analysis of Crypto-based Java Programs using Automated Theorem Provers. ASE 2006: 167-176
59EEHaralambos Mouratidis, Jan Jürjens, Jorge Fox: Towards a Comprehensive Framework for Secure Systems Development. CAiSE 2006: 48-62
58EEJan Jürjens: Model-Based Security Engineering for Real. FM 2006: 600-606
57EEJan Jürjens, Jorge Fox: Tools for model-based security engineering. ICSE 2006: 819-822
56EEJorge Fox, Jan Jürjens: A Framework for Analyzing Composition of Security Aspects. MMOSS 2006
55EEGeri Georg, Siv Hilde Houmb, Robert B. France, Steffen Zschaler, Dorina C. Petriu, Jan Jürjens: Critical Systems Development Using Modeling Languages - CSDUML 2006 Workshop Report. MoDELS Workshops 2006: 27-31
54 Jan Jürjens: Model-Based Security Engineering. SECRYPT 2006
53EEJan Jürjens: Foundations for Designing Secure Architectures. Electr. Notes Theor. Comput. Sci. 142: 31-46 (2006)
2005
52EEJan Jürjens: Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. ACSAC 2005: 138-149
51EEJan Jürjens, Mark Yampolskiy: Code security analysis with assertions. ASE 2005: 392-395
50EEJewgenij Botaschanjan, Jan Jürjens: MoDeII: Modeling and Analyzing Time-Constraints. ECBS 2005: 299-306
49EEJorge Fox, Jan Jürjens: Introducing Security Aspects with Model Transformations. ECBS 2005: 543-549
48EEStefan Wagner, Jan Jürjens: Model-Based Identification of Fault-Prone Components. EDCC 2005: 435-452
47EEJan Jürjens, Pasha Shabalin: Tools for Secure Systems Development with UML: Security Analysis with ATPs. FASE 2005: 305-309
46EEJan Jürjens: Model-Based Security Engineering with UML: Introducing Security Aspects. FMCO 2005: 64-87
45 Jan Jürjens: Towards using game semantics for crypto protocol verification: Lorenzen games. GALOP 2005: 241-257
44EESiv Hilde Houmb, Geri Georg, Robert B. France, James M. Bieman, Jan Jürjens: Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development. ICECCS 2005: 195-204
43EEJan Jürjens, Markus Lehrhuber, Guido Wimmel: Model-Based Design and Analysis of Permission-Based Security. ICECCS 2005: 224-233
42EEJan Jürjens: Sound methods and effective tools for model-based security engineering with UML. ICSE 2005: 322-331
41EEJan Jürjens: Understanding Security Goals Provided by Crypto-Protocol Implementations. ICSM 2005: 643-646
40EEJan Jürjens: Verification of low-level crypto-protocol implementations using automated theorem proving. MEMOCODE 2005: 89-98
39EEJan Jürjens, Siv Hilde Houmb: Dynamic Secure Aspect Modeling with UML: From Models to Code. MoDELS 2005: 142-155
38EEStefan Wagner, Jan Jürjens, Claudia Koller, Peter Trischberger: Comparing Bug Finding Tools with Reviews and Tests. TestCom 2005: 40-55
2004
37EEJan Jürjens, Pasha Shabalin: A Foundation for Tool-Supported Critical Systems Development with UML. ECBS 2004: 398-405
36EEJan Jürjens: Model-Based Security Engineering with UML. FOSAD 2004: 42-77
35EEJan Jürjens: Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol. HASE 2004: 231-240
34EEMartin Deubler, Johannes Grünbauer, Jan Jürjens, Guido Wimmel: Sound development of secure service-based systems. ICSOC 2004: 115-124
33 Jan Jürjens, Siv Hilde Houmb: Risk-Driven Development Of Security-Critical Systems Using UMLsec. IFIP Congress Tutorials 2004: 21-54
32 Johannes Grünbauer, Jan Jürjens, Guido Wimmel: Modelling Secure IT Systems - A Survey. Modellierung 2004: 307-308
31 Robert Schmidt, Jan Jürjens: Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem. Modellierung 2004: 309-310
30EEJan Jürjens, Pasha Shabalin: Automated Verification of UMLsec Models for Security Requirements. UML 2004: 365-379
29EEJan Jürjens, Pasha Shabalin: Tools for Critical Systems Development with UML (Tool Demo). UML Satellite Activities 2004: 250-253
28EEJan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer: Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). UML Satellite Activities 2004: 76-84
27EEJan Jürjens: Componentware for Critical Systems. Journal of Object Technology 3(4): 47-50 (2004)
2003
26EEJan Romberg, Jan Jürjens, Guido Wimmel, Oscar Slotosch, Gabor Hahn: AutoFOCUS and the MoDe Tool. ACSD 2003: 249-250
25EEGerhard Popp, Jan Jürjens, Guido Wimmel, Ruth Breu: Security-Critical System Development with Extended Use Cases. APSEC 2003: 478-487
24EESiv Hilde Houmb, Jan Jürjens: Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec. APSEC 2003: 488-
23EEJan Jürjens: Algebraic State Machines: Concepts and Applications to Security. Ershov Memorial Conference 2003: 338-343
22EEJan Jürjens, Siv Hilde Houmb: Development of Safety-Critical Systems and Model-Based Risk Analysis with UML. LADC 2003: 364-365
21EEJohannes Grünbauer, H. Hollmann, Jan Jürjens, Guido Wimmel: Modelling and Verification of Layered Security Protocols: A Bank Application. SAFECOMP 2003: 116-129
20 Jan Jürjens, Johannes Grünbauer: Critical Systems Development with UML: Overview with Automatic Case Study. SNPD 2003: 512-517
19EEJan Jürjens: Developing Safety-Critical Systems with UML. UML 2003: 360-372
2002
18 Jan Jürjens: Formal Semantics for Interacting UML subsystems. FMOODS 2002: 29-43
17EEGuido Wimmel, Jan Jürjens: Specification-Based Test Generation for Security-Critical Systems Using Mutations. ICFEM 2002: 471-482
16EEJan Jürjens: A UML statecharts semantics with message-passing. SAC 2002: 1009-1013
15EEJan Jürjens: Using UMLsec and goal trees for secure systems development. SAC 2002: 1026-1030
14EEJan Jürjens: UMLsec: Extending UML for Secure Systems Development. UML 2002: 412-425
2001
13EEJan Jürjens: Abstracting from Failure Probabilities. ACSD 2001: 53-
12EEJan Jürjens, Guido Wimmel: Formally Testing Fail-Safety of Electronic Purse Protocols. ASE 2001: 408-411
11EEJan Jürjens, Guido Wimmel: Specification-Based Testing of Firewalls. Ershov Memorial Conference 2001: 308-316
10EEJan Jürjens: Towards Development of Secure Systems Using UMLsec. FASE 2001: 187-200
9EEJan Jürjens: Secrecy-Preserving Refinement. FME 2001: 135-152
8 Jan Jürjens, Guido Wimmel: Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. I3E 2001: 489-506
7EEJan Jürjens: Composability of Secrecy. MMM-ACNS 2001: 28-38
6 Jan Jürjens: Secure Java Development with UML. Network Security 2001: 107-124
5 Jan Jürjens: Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC. SEC 2001: 93-108
4EEJan Jürjens: Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion). Security Protocols Workshop 2001: 102-106
3EEJan Jürjens: Encapsulating Rules of Prudent Security Engineering. Security Protocols Workshop 2001: 95-101
2EEMartín Abadi, Jan Jürjens: Formal Eavesdropping and Its Computational Interpretation. TACS 2001: 82-94
2000
1EEJan Jürjens: Secure Information Flow for Concurrent Processes. CONCUR 2000: 395-409

Coauthor Index

1Martín Abadi [2]
2Peter Bartmann [74]
3Andreas Bauer [68] [79]
4Bastian Best [64]
5James M. Bieman [44] [62] [81]
6Jewgenij Botaschanjan [50]
7Ruth Breu [25]
8Martin Deubler [34]
9Glen Dobson [70]
10Martin Feilkas [78]
11Eduardo B. Fernández [28] [77] [83]
12Jorge Fox [49] [56] [57] [59]
13Robert B. France [28] [44] [55] [62] [81]
14Geri Georg [44] [55] [62] [81]
15Johannes Grünbauer [20] [21] [32] [34]
16Gabor Hahn [26]
17Constance L. Heitmeyer (Connie Heitmeyer) [28]
18Sebastian Höhn [73]
19H. Hollmann [21]
20Siv Hilde Houmb [22] [24] [33] [39] [44] [55] [62] [81]
21Tauseef A. Israr [81]
22Toqeer Israr [62]
23Claudia Koller [38]
24Markus Lehrhuber [43]
25John Lloyd [84]
26Haralambos Mouratidis [59] [85]
27John Mylopoulos [72]
28Bashar Nuseibeh [64] [70]
29Dorin Bogdan Petriu [62] [81]
30Dorina C. Petriu [55] [62] [81]
31Gerhard Popp [25]
32Daniel Ratiu [65] [75] [78]
33Daniel Reiß [71]
34Jan Romberg [26]
35Bernhard Rumpe [28]
36Robert Schmidt [31]
37Jörg Schreck [74] [76] [80]
38Pasha Shabalin [29] [30] [37] [47] [61]
39Oscar Slotosch [26]
40Ali Sunyaev [85]
41David Trachtenherz [71]
42Peter Trischberger [38]
43Stefan Wagner [38] [48]
44Hironori Washizaki [77] [83]
45Tjark Weber [86]
46Jon Whittle (Jonathan Whittle) [70]
47Guido Wimmel [8] [11] [12] [17] [21] [25] [26] [32] [34] [43]
48C. Murray Woodside [62] [81]
49Jing Xu [62] [81]
50Mark Yampolskiy [51]
51Nobukazu Yoshioka [77] [83]
52Yijun Yu [66] [72] [76] [79] [80]
53Steffen Zschaler [55]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)