|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 26 occurrences of 19 keywords
|
|
|
Results
Found 39 publication records. Showing 39 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
109 | Jan Jürjens, Pasha Shabalin |
Automated Verification of UMLsec Models for Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UML ![In: «UML» 2004 - The Unified Modelling Language: Modelling Languages and Applications. 7th International Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings, pp. 365-379, 2004, Springer, 3-540-23307-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
91 | Jan Jürjens, Jörg Schreck, Peter Bartmann |
Model-based security analysis for mobile communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, pp. 683-692, 2008, ACM, 978-1-60558-079-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile telecommunication systems, umlsec, uml, model-based software engineering |
89 | Bastian Best, Jan Jürjens, Bashar Nuseibeh |
Model-Based Security Engineering of Distributed Information Systems Using UMLsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 29th International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, USA, May 20-26, 2007, pp. 581-590, 2007, IEEE Computer Society, 0-7695-2828-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
89 | Siv Hilde Houmb, Jan Jürjens |
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 10-12 December 2003, Chiang Mai, Thailand, pp. 488-, 2003, IEEE Computer Society, 0-7695-2011-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
80 | John Lloyd, Jan Jürjens |
Security Analysis of a Biometric Authentication System Using UMLsec and JML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoDELS ![In: Model Driven Engineering Languages and Systems, 12th International Conference, MODELS 2009, Denver, CO, USA, October 4-9, 2009. Proceedings, pp. 77-91, 2009, Springer, 978-3-642-04424-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
UMLsec, Security analysis, biometric authentication, JML |
80 | Jan Jürjens |
Using UMLsec and goal trees for secure systems development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 1026-1030, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
UMLsec, goal trees, secure systems development, Unified Modeling Language (UML), UML, formal semantics |
69 | Jan Jürjens |
UMLsec: Extending UML for Secure Systems Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UML ![In: UML 2002 - The Unified Modeling Language, 5th International Conference, Dresden, Germany, September 30 - October 4, 2002, Proceedings, pp. 412-425, 2002, Springer, 3-540-44254-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Jan Jürjens |
Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 25-26 March 2004, Tampa, FL, USA, pp. 231-240, 2004, IEEE Computer Society, 0-7695-2094-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security software engineering, formal methods in security, electronic purses, cryptographic protocols, security models, security engineering, security evaluation, high assurance systems, security verification |
40 | Jan Jürjens, Pasha Shabalin |
Tools for secure systems development with UML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 9(5-6), pp. 527-544, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, UML, Formal verification, Tool-support, Model-based development |
40 | Jan Jürjens |
Model-Based Security Engineering with UML: Introducing Security Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMCO ![In: Formal Methods for Components and Objects, 4th International Symposium, FMCO 2005, Amsterdam, The Netherlands, November 1-4, 2005, Revised Lectures, pp. 64-87, 2005, Springer, 3-540-36749-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Jan Jürjens |
Sound methods and effective tools for model-based security engineering with UML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA, pp. 322-331, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
verification biometric authentication, verification framework, security, UML, unified modeling language, cryptographic protocol |
40 | Jan Jürjens, Pasha Shabalin |
Tools for Secure Systems Development with UML: Security Analysis with ATPs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASE ![In: Fundamental Approaches to Software Engineering, 8th International Conference, FASE 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005, Proceedings, pp. 305-309, 2005, Springer, 3-540-25420-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Jan Jürjens |
Model-Based Security Engineering with UML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 42-77, 2004, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Sven Smolka, Jan Laufer 0001, Zoltán Ádám Mann, Klaus Pohl |
UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.09358, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Shouki A. Ebad |
An Exploratory Study of Why UMLsec Is Not Adopted. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022., pp. 357-364, 2022, SCITEPRESS, 978-989-758-553-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Sven Smolka, Jan Laufer 0001, Zoltán Ádám Mann, Klaus Pohl |
UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEAA ![In: 48th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2022, Maspalomas, Gran Canaria, Spain, 31 August - 2 September 2022., pp. 418-425, 2022, IEEE, 978-1-6654-6153-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Jan Laufer 0001, Zoltán Ádám Mann, Andreas Metzger |
Modelling Data Protection in Fog Computing Systems using UMLsec and SysML-Sec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoDELS (Companion) ![In: ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion, MODELS 2021 Companion, Fukuoka, Japan, October 10-15, 2021, pp. 777-786, 2021, IEEE, 978-1-6654-2484-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Ibukun Fadahunsi, Oluwasefunmi 'Tale Arogundade, Adesina S. Sodiya, Bakai Olajuwon |
Towards a UMLsec-Based Proctored Examination Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Softw. Secur. Prot. ![In: Int. J. Syst. Softw. Secur. Prot. 10(2), pp. 44-67, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Thomas Ruhroth, Jan Jürjens |
Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 14th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2012, Omaha, NE, USA, October 25-27, 2012, pp. 177-184, 2012, IEEE Computer Society, 978-1-4673-4742-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Holger Schmidt 0001, Jan Jürjens |
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering - 23rd International Conference, CAiSE 2011, London, UK, June 20-24, 2011. Proceedings, pp. 367-382, 2011, Springer, 978-3-642-21639-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Jan Jürjens, Loïc Marchal, Martín Ochoa, Holger Schmidt 0001 |
Incremental Security Verification for Evolving UMLsec models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECMFA ![In: Modelling Foundations and Applications - 7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings, pp. 52-68, 2011, Springer, 978-3-642-21469-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Denis Hatebur, Maritta Heisel, Jan Jürjens, Holger Schmidt 0001 |
Systematic Development of UMLsec Design Models Based on Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASE ![In: Fundamental Approaches to Software Engineering - 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26-April 3, 2011. Proceedings, pp. 232-246, 2011, Springer, 978-3-642-19810-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jürjens, Kurt Schneider |
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 15(1), pp. 63-93, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Raimundas Matulevicius, Marlon Dumas |
Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DB&IS ![In: Databases and Information Systems VI - Selected Papers from the Ninth International Baltic Conference, DB&IS 2010, July 5-7, 2010, Riga, Latvia, pp. 339-352, 2010, IOS Press, 978-1-60750-687-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Lionel Montrieux, Jan Jürjens, Charles B. Haley, Yijun Yu, Pierre-Yves Schobbens, Hubert Toussaint |
Tool support for code generation from a UMLsec property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: ASE 2010, 25th IEEE/ACM International Conference on Automated Software Engineering, Antwerp, Belgium, September 20-24, 2010, pp. 357-358, 2010, ACM, 978-1-4503-0116-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Jan Jürjens |
Model-based Security Testing Using UMLsec: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MBT@ETAPS ![In: Proceedings of the Fourth Workshop on Model Based Testing, MBT@ETAPS 2008, Budapest, Hungary, March 30, 2008, pp. 93-104, 2008, Elsevier. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Ralph Herkenhöner |
Process Modeling for Privacy - Conformant Biobanking: Case Studies on Modeling in UMLsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 3-12, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
29 | Shareeful Islam, Jan Jürjens |
Incorporating Security Requirements from Legal Regulations into UMLsec model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MODSEC@MoDELS ![In: Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, France, September 28, 2008., 2008, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
29 | Jan Jürjens, Jörg Schreck, Yijun Yu |
Automated Analysis of Permission-Based Security Using UMLsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASE ![In: Fundamental Approaches to Software Engineering, 11th International Conference, FASE 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 292-295, 2008, Springer, 978-3-540-78742-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jan Jürjens, Siv Hilde Houmb |
Risk-Driven Development Of Security-Critical Systems Using UMLsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Congress Tutorials ![In: Information Technology, Selected Tutorials, IFIP 18th World Computer Congress, Tutorials, 22-27 August 2004, Toulouse, France, pp. 21-53, 2004, Kluwer/Springer, 1-4020-8158-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Robert Schmidt, Jan Jürjens |
Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Modellierung ![In: Modellierung 2004, Proceedings zur Tagung, 23.-26. März 2004, Marburg, Proceedings, pp. 309-310, 2004, GI. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
29 | Jan Jürjens |
Developing Secure Systems with UMLsec - From Business Processes to Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIS ![In: Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, Proceedings der GI-Fachtagung VIS 2001, 12.-14.09.2001 in Kiel, pp. 151-161, 2001, Vieweg+Teubner Verlag, 978-3-663-05918-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Jan Jürjens |
Towards Development of Secure Systems Using UMLsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASE ![In: Fundamental Approaches to Software Engineering, 4th International Conference, FASE 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genova, Italy, April 2-6, 2001, Proceedings, pp. 187-200, 2001, Springer, 3-540-41863-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Feng Chen 0002, Weihua Li, Dingyi Fang, Xiaojiang Chen |
Research on Integration of Safety Analysis in Model-Driven Software Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 303-306, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Haralambos Mouratidis, Ali Sunyaev, Jan Jürjens |
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, June 8-12, 2009. Proceedings, pp. 231-245, 2009, Springer, 978-3-642-02143-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Jan Jürjens |
Model-Based Run-Time Checking of Security Permissions Using Guarded Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RV ![In: Runtime Verification, 8th International Workshop, RV 2008, Budapest, Hungary, March 30, 2008. Selected Papers, pp. 36-50, 2008, Springer, 978-3-540-89246-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Jan Jürjens, Yijun Yu |
Tools for model-based security engineering: models vs. code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), November 5-9, 2007, Atlanta, Georgia, USA, pp. 545-546, 2007, ACM, 978-1-59593-882-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security hardening, verification framework, security, UML, refactoring, code analysis, model-based software engineering |
20 | Haralambos Mouratidis, Jan Jürjens, Jorge Fox |
Towards a Comprehensive Framework for Secure Systems Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 18th International Conference, CAiSE 2006, Luxembourg, Luxembourg, June 5-9, 2006, Proceedings, pp. 48-62, 2006, Springer, 3-540-34652-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Gerhard Popp, Jan Jürjens, Guido Wimmel, Ruth Breu |
Security-Critical System Development with Extended Use Cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 10-12 December 2003, Chiang Mai, Thailand, pp. 478-487, 2003, IEEE Computer Society, 0-7695-2011-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #39 of 39 (100 per page; Change: )
|
|