BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Belgium
1 × Czech Republic
1 × Greece
1 × Jamaica
1 × Japan
1 × Luxembourg
1 × Portugal
1 × Spain
1 × Sweden
10 × USA
2 × Canada
2 × China
2 × Hungary
3 × France
3 × Italy
3 × The Netherlands
3 × United Kingdom
6 × Germany
Collaborated with:
Y.Yu D.Ratiu H.Schmidt J.Schreck P.Shabalin S.Peldszus S.H.Houmb J.Fox M.Ochoa H.Mouratidis D.S.0001 D.Strüber Q.Ramadan K.Schneider J.Lloyd S.Höhn M.Yampolskiy G.Wimmel A.S.Ahmadian V.Riediger L.Marchal M.Salnitri S.Islam J.Cuéllar A.Sunyaev M.Feilkas P.Bartmann J.Mylopoulos D.Reiß D.Trachtenherz B.Best B.Nuseibeh R.Marinescu S.Gärtner T.Ruhroth D.Hatebur M.Heisel S.Wagner C.Koller P.Trischberger J.Bürger E.Knauss P.Giorgini L.Montrieux C.B.Haley P.Schobbens H.Toussaint R.Heinrich T.Hesse R.H.Reussner B.Paech
Talks about:
secur (36) model (22) base (15) system (13) lsec (12) analysi (10) develop (8) engin (8) use (8) uml (8)

♂ Person: Jan Jürjens

DBLP DBLP: J=uuml=rjens:Jan

Facilitated 2 volumes:

GTTSE 2011SciCo
MoDELS 2011PrCo

Contributed to:

SEKE 20152015
RE 20142014
TOOLS Europe 20122012
CAiSE 20112011
ECMFA 20112011
FASE 20112011
ICSE 20112011
REFSQ 20112011
SFM 20112011
ASE 20102010
CAiSE 20092009
MoDELS 20092009
ASE 20082008
CSMR 20082008
FASE 20082008
ICPC 20082008
ICSE 20082008
ICSM 20082008
MBT 20082008
MoDELS 20082008
ASE 20072007
CSMR 20072007
ICSE 20072007
ASE 20062006
CAiSE 20062006
FM 20062006
ICSE 20062006
ASE 20052005
FASE 20052005
ICSE 20052005
ICSM 20052005
MoDELS 20052005
TestCom 20052005
UML 20042004
TOOLS USA 20032004
UML 20032003
SAC 20022002
UML 20022002
ASE 20012001
FASE 20012001
FME 20012001
WCRE 20092009
ECMFA 20172017
MoDELS 20172017
ECMFA 20182018
ESEC/FSE 20172017
GPCE 20182018
FASE 20182018

Wrote 50 papers:

SEKE-2015-HeinrichGHRRSPJ #empirical #evolution #framework #information management #platform #research
A Platform for Empirical Research on Information System Evolution (RH, SG, TMH, TR, RHR, KS, BP, JJ), pp. 415–420.
RE-2014-GartnerRBSJ #maintenance #requirements #security
Maintaining requirements for long-living software systems by incorporating security knowledge (SG, TR, JB, KS, JJ), pp. 103–112.
TOOLS-EUROPE-2012-OchoaJC #uml
Non-interference on UML State-Charts (MO, JJ, JC), pp. 219–235.
CAiSE-2011-SchmidtJ #analysis #design #requirements #security #using
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
ECMFA-2011-JurjensMOS #evolution #incremental #modelling #security #verification
Incremental Security Verification for Evolving UMLsec models (JJ, LM, MO, HS), pp. 52–68.
FASE-2011-HateburHJS #design #development #modelling #requirements #security
Systematic Development of UMLsec Design Models Based on Security Requirements (DH, MH, JJ, HS), pp. 232–246.
ICSE-2011-Jurjens #automation #evolution #modelling #security #uml
Automated security hardening for evolving UML models (JJ), pp. 986–988.
REFSQ-2011-KnaussHSIJ #requirements #security
Supporting Requirements Engineers in Recognising Security Issues (EK, SHH, KS, SI, JJ), pp. 4–18.
SFM-2011-JurjensOSMHI #evolution #modelling #specification
Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications (JJ, MO, HS, LM, SHH, SI), pp. 504–526.
ASE-2010-MontrieuxJHYST #code generation #tool support
Tool support for code generation from a UMLsec property (LM, JJ, CBH, YY, PYS, HT), pp. 357–358.
CAiSE-2009-MouratidisSJ #case study #experience #health #information management #lessons learnt
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects (HM, AS, JJ), pp. 231–245.
MoDELS-2009-LloydJ #analysis #authentication #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
ASE-2008-YuJS #development #tool support #traceability
Tools for Traceability in Secure Software Development (YY, JJ, JS), pp. 503–504.
CSMR-2008-RatiuFJ #api #ontology
Extracting Domain Ontologies from Domain Specific APIs (DR, MF, JJ), pp. 203–212.
FASE-2008-JurjensSY #analysis #automation #security #using
Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
ICPC-2008-RatiuJ #api #concept #representation
Evaluating the Reference and Representation of Domain Concepts in APIs (DR, JJ), pp. 242–247.
ICSE-2008-HohnJ #automation #modelling #named
Rubacon: automated support for model-based compliance engineering (SH, JJ), pp. 875–878.
ICSE-2008-JurjensSB #analysis #mobile #modelling #security
Model-based security analysis for mobile communications (JJ, JS, PB), pp. 683–692.
ICSM-2008-YuJM #maintenance #traceability
Traceability for the maintenance of secure software (YY, JJ, JM), pp. 297–306.
MBT-2008-Jurjens #case study #modelling #security #testing #using
Model-based Security Testing Using UMLsec: A Case Study (JJ), pp. 93–104.
MoDELS-2008-JurjensRT #assurance #modelling #quality
Model-Based Quality Assurance of Automotive Software (JJ, DR, DT), pp. 858–873.
ASE-2007-JurjensY #modelling #security #tool support
Tools for model-based security engineering: models vs. code (JJ, YY), pp. 545–546.
CSMR-2007-RatiuJ #library
The Reality of Libraries (DR, JJ), pp. 307–318.
ICSE-2007-BestJN #distributed #information management #modelling #security #using
Model-Based Security Engineering of Distributed Information Systems Using UMLsec (BB, JJ, BN), pp. 581–590.
ASE-2006-Jurjens #analysis #automation #java #proving #security #source code #theorem proving #using
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
CAiSE-2006-MouratidisJF #development #framework #towards
Towards a Comprehensive Framework for Secure Systems Development (HM, JJ, JF), pp. 48–62.
FM-2006-Jurjens #modelling #security
Model-Based Security Engineering for Real (JJ), pp. 600–606.
ICSE-2006-JurjensF #modelling #security #tool support
Tools for model-based security engineering (JJ, JF), pp. 819–822.
ASE-2005-JurjensY #analysis #security
Code security analysis with assertions (JJ, MY), pp. 392–395.
FASE-2005-JurjensS #analysis #development #security #tool support #uml
Tools for Secure Systems Development with UML: Security Analysis with ATPs (JJ, PS), pp. 305–309.
ICSE-2005-Jurjens #effectiveness #modelling #security #tool support #uml
Sound methods and effective tools for model-based security engineering with UML (JJ), pp. 322–331.
ICSM-2005-Jurjens #comprehension #implementation #security
Understanding Security Goals Provided by Crypto-Protocol Implementations (JJ), pp. 643–646.
MoDELS-2005-JurjensH #modelling #uml
Dynamic Secure Aspect Modeling with UML: From Models to Code (JJ, SHH), pp. 142–155.
TestCom-2005-WagnerJKT #debugging #testing #tool support
Comparing Bug Finding Tools with Reviews and Tests (SW, JJ, CK, PT), pp. 40–55.
UML-2004-JurjensS #automation #modelling #requirements #security #verification
Automated Verification of UMLsec Models for Security Requirements (JJ, PS), pp. 365–379.
TOOLS-USA-2003-Jurjens04 #component
Componentware for Critical Systems (JJ), pp. 47–50.
UML-2003-Jurjens #safety #uml
Developing Safety-Critical Systems with UML (JJ), pp. 360–372.
SAC-2002-Jurjens #message passing #semantics #uml
A UML statecharts semantics with message-passing (JJ), pp. 1009–1013.
SAC-2002-Jurjens02a #development #using
Using UMLsec and goal trees for secure systems development (JJ), pp. 1026–1030.
UML-2002-Jurjens #development #named #uml
UMLsec: Extending UML for Secure Systems Development (JJ), pp. 412–425.
ASE-2001-JurjensW #protocol #testing
Formally Testing Fail-Safety of Electronic Purse Protocols (JJ, GW), pp. 408–411.
FASE-2001-Jurjens #development #towards #using
Towards Development of Secure Systems Using UMLsec (JJ), pp. 187–200.
FME-2001-Jurjens #refinement
Secrecy-Preserving Refinement (JJ), pp. 135–152.
WCRE-1999-RatiuMJ99a #composition #logic #source code
The Logical Modularity of Programs (DR, RM, JJ), pp. 123–127.
ECMFA-2017-AhmadianSRJ #analysis #ecosystem #industrial #modelling #privacy
Model-Based Privacy Analysis in Industrial Ecosystems (ASA, DS, VR, JJ), pp. 215–231.
MoDELS-2017-RamadanS0JG #modelling #process #security #verification
From Secure Business Process Modeling to Design-Level Security Verification (QR, MS, DS, JJ, PG), pp. 123–133.
ECMFA-2018-Ramadan0SRJ #detection #modelling #process #requirements #security
Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models (QR, DS, MS, VR, JJ), pp. 179–198.
ESEC-FSE-2017-AhmadianPRJ #analysis #modelling #privacy #security
Model-based privacy and security analysis with CARiSMA (ASA, SP, QR, JJ), pp. 989–993.
GPCE-2018-Peldszus0J #analysis #feature model #modelling #product line #security
Model-based security analysis of feature-oriented software product lines (SP, DS0, JJ), pp. 93–106.
FASE-2018-0001PJ #multi #product line #variability
Taming Multi-Variability of Software Product Line Transformations (DS0, SP, JJ), pp. 337–355.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.