Travelled to:
1 × Belgium
1 × Czech Republic
1 × Greece
1 × Jamaica
1 × Japan
1 × Luxembourg
1 × Portugal
1 × Spain
1 × Sweden
10 × USA
2 × Canada
2 × China
2 × Hungary
3 × France
3 × Italy
3 × The Netherlands
3 × United Kingdom
6 × Germany
Collaborated with:
∅ Y.Yu D.Ratiu H.Schmidt J.Schreck P.Shabalin S.Peldszus S.H.Houmb J.Fox M.Ochoa H.Mouratidis D.S.0001 D.Strüber Q.Ramadan K.Schneider J.Lloyd S.Höhn M.Yampolskiy G.Wimmel A.S.Ahmadian V.Riediger L.Marchal M.Salnitri S.Islam J.Cuéllar A.Sunyaev M.Feilkas P.Bartmann J.Mylopoulos D.Reiß D.Trachtenherz B.Best B.Nuseibeh R.Marinescu S.Gärtner T.Ruhroth D.Hatebur M.Heisel S.Wagner C.Koller P.Trischberger J.Bürger E.Knauss P.Giorgini L.Montrieux C.B.Haley P.Schobbens H.Toussaint R.Heinrich T.Hesse R.H.Reussner B.Paech
Talks about:
secur (36) model (22) base (15) system (13) lsec (12) analysi (10) develop (8) engin (8) use (8) uml (8)
♂ Person: Jan Jürjens
DBLP: J=uuml=rjens:Jan
Facilitated 2 volumes:
Contributed to:
Wrote 50 papers:
- SEKE-2015-HeinrichGHRRSPJ #empirical #evolution #framework #information management #platform #research
- A Platform for Empirical Research on Information System Evolution (RH, SG, TMH, TR, RHR, KS, BP, JJ), pp. 415–420.
- RE-2014-GartnerRBSJ #maintenance #requirements #security
- Maintaining requirements for long-living software systems by incorporating security knowledge (SG, TR, JB, KS, JJ), pp. 103–112.
- TOOLS-EUROPE-2012-OchoaJC #uml
- Non-interference on UML State-Charts (MO, JJ, JC), pp. 219–235.
- CAiSE-2011-SchmidtJ #analysis #design #requirements #security #using
- Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
- ECMFA-2011-JurjensMOS #evolution #incremental #modelling #security #verification
- Incremental Security Verification for Evolving UMLsec models (JJ, LM, MO, HS), pp. 52–68.
- FASE-2011-HateburHJS #design #development #modelling #requirements #security
- Systematic Development of UMLsec Design Models Based on Security Requirements (DH, MH, JJ, HS), pp. 232–246.
- ICSE-2011-Jurjens #automation #evolution #modelling #security #uml
- Automated security hardening for evolving UML models (JJ), pp. 986–988.
- REFSQ-2011-KnaussHSIJ #requirements #security
- Supporting Requirements Engineers in Recognising Security Issues (EK, SHH, KS, SI, JJ), pp. 4–18.
- SFM-2011-JurjensOSMHI #evolution #modelling #specification
- Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications (JJ, MO, HS, LM, SHH, SI), pp. 504–526.
- ASE-2010-MontrieuxJHYST #code generation #tool support
- Tool support for code generation from a UMLsec property (LM, JJ, CBH, YY, PYS, HT), pp. 357–358.
- CAiSE-2009-MouratidisSJ #case study #experience #health #information management #lessons learnt
- Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects (HM, AS, JJ), pp. 231–245.
- MoDELS-2009-LloydJ #analysis #authentication #ml #security #using
- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
- ASE-2008-YuJS #development #tool support #traceability
- Tools for Traceability in Secure Software Development (YY, JJ, JS), pp. 503–504.
- CSMR-2008-RatiuFJ #api #ontology
- Extracting Domain Ontologies from Domain Specific APIs (DR, MF, JJ), pp. 203–212.
- FASE-2008-JurjensSY #analysis #automation #security #using
- Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
- ICPC-2008-RatiuJ #api #concept #representation
- Evaluating the Reference and Representation of Domain Concepts in APIs (DR, JJ), pp. 242–247.
- ICSE-2008-HohnJ #automation #modelling #named
- Rubacon: automated support for model-based compliance engineering (SH, JJ), pp. 875–878.
- ICSE-2008-JurjensSB #analysis #mobile #modelling #security
- Model-based security analysis for mobile communications (JJ, JS, PB), pp. 683–692.
- ICSM-2008-YuJM #maintenance #traceability
- Traceability for the maintenance of secure software (YY, JJ, JM), pp. 297–306.
- MBT-2008-Jurjens #case study #modelling #security #testing #using
- Model-based Security Testing Using UMLsec: A Case Study (JJ), pp. 93–104.
- MoDELS-2008-JurjensRT #assurance #modelling #quality
- Model-Based Quality Assurance of Automotive Software (JJ, DR, DT), pp. 858–873.
- ASE-2007-JurjensY #modelling #security #tool support
- Tools for model-based security engineering: models vs. code (JJ, YY), pp. 545–546.
- CSMR-2007-RatiuJ #library
- The Reality of Libraries (DR, JJ), pp. 307–318.
- ICSE-2007-BestJN #distributed #information management #modelling #security #using
- Model-Based Security Engineering of Distributed Information Systems Using UMLsec (BB, JJ, BN), pp. 581–590.
- ASE-2006-Jurjens #analysis #automation #java #proving #security #source code #theorem proving #using
- Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
- CAiSE-2006-MouratidisJF #development #framework #towards
- Towards a Comprehensive Framework for Secure Systems Development (HM, JJ, JF), pp. 48–62.
- FM-2006-Jurjens #modelling #security
- Model-Based Security Engineering for Real (JJ), pp. 600–606.
- ICSE-2006-JurjensF #modelling #security #tool support
- Tools for model-based security engineering (JJ, JF), pp. 819–822.
- ASE-2005-JurjensY #analysis #security
- Code security analysis with assertions (JJ, MY), pp. 392–395.
- FASE-2005-JurjensS #analysis #development #security #tool support #uml
- Tools for Secure Systems Development with UML: Security Analysis with ATPs (JJ, PS), pp. 305–309.
- ICSE-2005-Jurjens #effectiveness #modelling #security #tool support #uml
- Sound methods and effective tools for model-based security engineering with UML (JJ), pp. 322–331.
- ICSM-2005-Jurjens #comprehension #implementation #security
- Understanding Security Goals Provided by Crypto-Protocol Implementations (JJ), pp. 643–646.
- MoDELS-2005-JurjensH #modelling #uml
- Dynamic Secure Aspect Modeling with UML: From Models to Code (JJ, SHH), pp. 142–155.
- TestCom-2005-WagnerJKT #debugging #testing #tool support
- Comparing Bug Finding Tools with Reviews and Tests (SW, JJ, CK, PT), pp. 40–55.
- UML-2004-JurjensS #automation #modelling #requirements #security #verification
- Automated Verification of UMLsec Models for Security Requirements (JJ, PS), pp. 365–379.
- TOOLS-USA-2003-Jurjens04 #component
- Componentware for Critical Systems (JJ), pp. 47–50.
- UML-2003-Jurjens #safety #uml
- Developing Safety-Critical Systems with UML (JJ), pp. 360–372.
- SAC-2002-Jurjens #message passing #semantics #uml
- A UML statecharts semantics with message-passing (JJ), pp. 1009–1013.
- SAC-2002-Jurjens02a #development #using
- Using UMLsec and goal trees for secure systems development (JJ), pp. 1026–1030.
- UML-2002-Jurjens #development #named #uml
- UMLsec: Extending UML for Secure Systems Development (JJ), pp. 412–425.
- ASE-2001-JurjensW #protocol #testing
- Formally Testing Fail-Safety of Electronic Purse Protocols (JJ, GW), pp. 408–411.
- FASE-2001-Jurjens #development #towards #using
- Towards Development of Secure Systems Using UMLsec (JJ), pp. 187–200.
- FME-2001-Jurjens #refinement
- Secrecy-Preserving Refinement (JJ), pp. 135–152.
- WCRE-1999-RatiuMJ99a #composition #logic #source code
- The Logical Modularity of Programs (DR, RM, JJ), pp. 123–127.
- ECMFA-2017-AhmadianSRJ #analysis #ecosystem #industrial #modelling #privacy
- Model-Based Privacy Analysis in Industrial Ecosystems (ASA, DS, VR, JJ), pp. 215–231.
- MoDELS-2017-RamadanS0JG #modelling #process #security #verification
- From Secure Business Process Modeling to Design-Level Security Verification (QR, MS, DS, JJ, PG), pp. 123–133.
- ECMFA-2018-Ramadan0SRJ #detection #modelling #process #requirements #security
- Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models (QR, DS, MS, VR, JJ), pp. 179–198.
- ESEC-FSE-2017-AhmadianPRJ #analysis #modelling #privacy #security
- Model-based privacy and security analysis with CARiSMA (ASA, SP, QR, JJ), pp. 989–993.
- GPCE-2018-Peldszus0J #analysis #feature model #modelling #product line #security
- Model-based security analysis of feature-oriented software product lines (SP, DS0, JJ), pp. 93–106.
- FASE-2018-0001PJ #multi #product line #variability
- Taming Multi-Variability of Software Product Line Transformations (DS0, SP, JJ), pp. 337–355.