Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2019Reference Architecture Model. Version 3.0
Otto, Boris; Steinbuss, Sebastian; Teuscher, Andreas; Lohmann, Steffen; Bader, Sebastian; Birnstil, P.; Böhmer, M.; Brost, G.; Cirullies, J.; Eitel, A.; Ernst, T.; Geisler, S.; Gelhaar, J.; Gude, R.; Haas, C.; Huber, M.; Jung, C.; Jürjens, J.; Lange, C.; Lis, D.; Mader, C.; Menz, N.; Nagel, R.; Patzer, F.; Pettenpohl, H.; Pullmann, J.; Quix, C.; Schulz, D.; Schütte, J. et al.
Report
2018Data security and consumer trust in FinTech innovation in Germany
Stewart, Harrison; Jürjens, Jan
Journal Article
2018Detecting conflicts between data-minimization and security requirements in business process models
Ramadan, Qusai; Strüber, Daniel; Salnitri, Mattia; Riediger, Volker; Jürjens, Jan
Conference Paper
2018Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements
Ahmadian, Amir Shayan; Jürjens, Jan; Strüber, Daniel
Conference Paper
2018A framework for semi-automated co-evolution of security knowledge and system models
Bürger, Jens; Strüber, Daniel; Gärtner, Stefan; Ruhroth, Thomas; Jürjens, Jan; Schneider, Kurt
Journal Article
2018IDS Reference Architecture Model. Industrial Data Space. Version 2.0
Otto, Boris; Lohmann, Steffen; Steinbuss, Sebastian; Teuscher, Andreas; Auer, Soeren; Boehmer, Martin; Bohn, Juergen; Brost, Gerd; Cirullies, Jan; Ciureanu, Constantin; Corsi, Eva; Danielsen, Soeren; Eitel, Andreas; Ernst, Thilo; Geisler, Sandra; Gelhaar, Joshua; Gude, Roland; Haas, Christian; Heiles, Juergen; Hierro, Juanjo; Hoernle, Joachim; Huber, Manuel; Jung, Christian; Juerjens, Jan; Kasprzik, Anna; Ketterl, Markus; Koetzsch, Judith; Koehler, Jacob; Lange, Christoph; Langer, Dorothea; Langkau, Joerg; Lis, Dominik; Loeffler, Sven; Loewen, Ulrich; Mader, Christian; Menz, Nadja; Mueller, Andreas; Mueller, Bernhard; Nagel, Lars; Nagel, Ralf; Nieminen, Harri; Reitelbach, Thomas; Resetko, Aleksei; Pakkala, Daniel; Patzer, Florian; Pettenpohl, Heinrich; Pietzsch, Rene; Pullmann, Jaroslav; Punter, Matthijs; Quix, Christoph; Rohrmus, Dominik; Romer, Lena; Sandloehken, Joerg; Schoewe, Patrick; Schulz, Daniel; Schuette, Julian; Schweichhart, Karsten; Sol, Egbert-Jan; Sorowka, Peter; Spiegelberg, Gernot;
Report
2018Model-based discrimination analysis
Ramadan, Q.; Ahmadian, A.S.; Strüber, D.; Jürjens, J.; Staab, S.
Conference Paper
2018Supporting privacy impact assessment by model-based privacy analysis
Ahmadian, Amir Shayan; Strüber, Daniel; Riediger, Volker; Jürjens, Jan
Conference Paper
2018Taming multi-variability of software product line transformations
Strüber, Daniel; Peldzsus, Sven; Jürjens, Jan
Conference Paper
2017From secure business process modeling to design-level security verification
Ramadan, Q.; Salnitriy, M.; Strüber, D.; Jürjens, J.; Giorgini, P.
Conference Paper
2017Information security management and the human aspect in organizations
Stewart, H.; Jürjens, J.
Journal Article
2017Model-based privacy analysis in industrial ecosystems
Ahmadian, A.S.; Strüber, D.; Riediger, V.; Jürjens, J.
Conference Paper
2017Model-based privacy and security analysis with CARiSMA
Ahmadian, A.S.; Peldszus, S.; Ramadan, Q.; Jürjens, J.
Conference Paper
2017Privacy data management and awareness for public administrations: A case study from the healthcare domain
Diamantopoulou, V.; Angelopoulos, K.; Flake, J.; Praitano, A.; Ruiz, J.F.; Jürjens, J.; Pavlidis, M.; Bonutto, D.; Sanz, A.C.; Mouratidis, H.; Robles, J.G.; Tozzi, A.E.
Conference Paper
2017Reference Architecture Model for the Industrial Data Space
Otto, Boris; Lohmann, Steffen; Auer, Sören; Brost, Gerd; Cirullies, Jan; Eitel, Andreas; Ernst, Thilo; Haas, Christian; Huber, Manuel; Jung, Christian; Jürjens, Jan; Lange, Christoph; Mader, Christian; Menz, Nadja; Nagel, Ralf; Pettenpohl, Heinrich; Pullmann, Jaroslav; Quix, Christoph; Schon, Jochen; Schulz, Daniel; Schütte, Julian; Spiekermann, Markus; Wenzel, Sven
Report
2017Sicherheitszertifizierung für die Digitale Transformation. Anwendung auf den Industrial Data Space
Peldszus, Sven; Cirullies, Jan; Jürjens, Jan
Presentation
2017Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method)
Ahammed, S.; Sadi, M.S.; Rahman, M.S.; Jürjens, J.
Journal Article
2016Industrial Data Space. Digital Souvereignity Over Data
Otto, Boris; Jürjens, Jan; Schon, Jochen; Auer, Sören; Menz, Nadja; Wenzel, Sven; Cirullies, Jan
: Cirullies, Jan (Redaktion)
Report
2016Industrial Data Space. Digitale Souveränität über Daten
Otto, Boris; Jürjens, Jan; Schon, Jochen; Auer, Sören; Menz, Nadja; Wenzel, Sven; Cirullies, Jan
: Cirullies, Jan (Redaktion)
Report
2016Model-based security verification for evolving systems
Jürjens, J.; Wenzel, S.; Poggenpohl, D.; Ochoa, M.
Conference Paper
2016Programming in the Sleptsov net language for systems control
Zaitsev, D.; Jürjens, J.
Journal Article
2016STAGE: A software tool for automatic grading of testing exercises
Pape, S.; Flake, J.; Beckmann, A.; Jürjens, J.
Conference Paper
2016Supporting model-based privacy analysis by exploiting privacy level agreements
Ahmadian, A.S.; Jürjens, J.
Conference Paper
2016Supporting the security certification and privacy level agreements in the context of clouds
Ahmadian, A.S.; Coerschulte, F.; Jürjens, J.
Conference Paper
2016UMLchange - specifying model changes with to support security verification of potential evolution
Wenzel, S.; Poggenpohl, D.; Warzecha, D.; Jürjens, J.; Ochoa, M.
Conference Paper
2015Beyond one-shot security. Keeping software secure during evolution
Jürjens, J.
Presentation
2015Big Data mit Compliance. Konzepte für den Umgang mit Compliance beim Einsatz von Big Data in der Finanzbranche
Jürjens, J.
Presentation
2015The CoCoME platform: A research note on empirical studies in information system evolution
Heinrich, R.; Gärtner, S.; Hesse, T.-M.; Ruhroth, T.; Reussner, R.; Schneider, K.; Paech, B.; Jürjens, J.
Journal Article
2015Evolution of security engineering artifacts. A state of the art survey
Felderer, M.; Katt, B.; Kalb, P.; Jürjens, J.; Ochoa, M.; Paci, F.; Tran, M.S.L; Tun, T.T.; Yskout, K.; Scandariato, R.; Piessens, F.; Vanoverberghe, D.; Fourneret, E.; Gander, M.; Solhaug, B.; Breu, R.
Book Article
2015IT-Risiko-Check: Das Wissen um geschäftskritische IT-Risiken
Stocker, J.; Wenzel, S.; Jürjens, J.
Conference Paper
2015Model-based security analysis and applications to security economics
Jürjens, J.; Ahmadian, A.S.
Conference Paper
2015Modellbasiertes Sicherheits-Testen für Cloud-basierte Prozesse
Jürjens, J.
Presentation
2015A platform for empirical research on information system evolution
Heinrich, R.; Gärtner, S.; Hesse, T.-M.; Ruhroth, T.; Reussner, R.; Schneider, K.; Peach, B.; Jürjens, J.
Conference Paper
2015Preserving Validity of Batch-job Nets under Change at Runtime
Apfelbeck, C.; Fritz, M.; Jürjens, J.; Zweihoff, J.
Conference Paper
2015Restoring security of evolving software models using graph transformation
Bürger, J.; Jürjens, J.; Wenzel, S.
Journal Article
2015Restoring Security of Long-Living Systems by Co-Evolution
Bürger, J.; Gärtner, S.; Ruroth, T.; Zweihoff, J.; Jürjens, J.; Schneider, K.
Conference Paper
2015Soft error tolerance using Horizontal-Vertical-Double-Bit diagonal parity method
Rahman, M.S.; Sadi, M.S.; Ahammed, S.; Jürjens, J.
Conference Paper
2015Special Issue on Secure Information Systems Engineering
Rosado, D.G.; Lammari, N.; Jürjens, J.
Journal Article
2015Supporting the security certification of cloud-computing-infrastructures
Ahmadian, A.S.; Coerschulte, F.; Jürjens, J.
Conference Paper
2015Towards maintaining long-living information systems by incorporating security knowledge
Gärtner, S.; Ruhroth, T.; Bürger, J.; Schneider, K.; Jürjens, J.
Conference Paper
2015Werkzeug für Wirtschaftlichkeit und Effektivität von Sicherheitskonzepten
Jürjens, J.
Journal Article
2014Engineering Secure Software and Systems. 6th International Symposium, ESSoS 2014
Jürjens, Jan; Piessens, Frank; Bielova, Nataliia
Conference Proceedings
2014Entwicklung eines Werkzeugs zur Auswahl von Cloud-Anbietern und zum Monitoring der Entscheidungsgrundlagen
Gaidel, Dennis Jan
: Jürjens, Jan; Humberg, Thorsten
Bachelor Thesis
2014Foreword. 11th International Workshop on Security in Information Systems, WOSIS 2014
Rosado, D.G.; Blanco, C.; Mellado, D.; Sánchez, L.E.; Jürjens, J.
Conference Paper
2014Geschäftsprozesse in die Cloud - aber sicher ! (... und compliant)
Jürjens, Jan
Presentation
2014Guiding a general-purpose C verifier to prove cryptographic protocols
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan; Naumann, David A.
Journal Article
2014Maintaining requirements for long-living software systems by incorporating security knowledge
Gärtner, S.; Ruhroth, T.; Bürger, J.; Schneider, K.; Jürjens, J.
Conference Paper
2014Model-based security engineering: Managed co-evolution of security knowledge and software models
Bürger, Jens; Jürjens, Jan; Ruhroth, Thomas; Gärtner, Stefan; Schneider, Kurt
Book Article
2014Preface. 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014
Jürjens, J.; Piessens, F.; Bielova, N.
Conference Paper
2014The SecReq approach: From security requirements to secure design while managing software evolution
Jürjens, Jan; Schneider, Kurt
Conference Paper
2014Security Certification in the Presence of Evolution: Models vs. Code
Jürjens, Jan
Presentation
2014Security in information systems: Advances and new challenge
Blanco, C.; Rosado, D.G.; Sánchez, L.E.; Jürjens, J.
Journal Article
2014Specifying model changes with UMLchange to support security verification of potential evolution
Wenzel, Sven; Warzecha, Daniel; Jürjens, Jan; Ochoa, Martin; Poggenpohl, Daniel
Journal Article
2014Towards adaptation and evolution of domain-specific knowledge for maintaining secure systems
Ruhroth, T.; Gärtner, S.; Bürger, J.; Jürjens, J.; Schneider, K.
Conference Paper
2014Using ontologies to analyze compliance requirements of cloud-based processes
Humberg, T.; Wessel, C.; Poggenpohl, D.; Wenzel, S.; Ruhroth, T.; Jürjens, J.
Conference Paper
2014Versioning and evolution requirements for model-based system development
Ruhroth, Thomas; Gärtner, Stefan; Bürger, Jens; Jürjens, Jan; Schneider, Kurt
Conference Paper
2014Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen
Gärtner, Stefan; Bürger, Jens; Schneider, Kurt; Jürjens, Jan
Conference Paper
2013Berechnung einer optimalen Strategie in allgemeinen Risikoanalysen mit ARA
Michel, Marcel
: Jürjens, Jan; Schmitz, Andreas
Master Thesis
2013Engineering secure software and systems. 5th international symposium, ESSoS 2013
Jürjens, J.; Livshits, B.; Scandariato, R.
Conference Proceedings
2013Entwicklung einer Taxonomie von sicherheitstechnischen Gegenmaßnahmen für IT-Risiken in Cloud-Computing-Systemen
Stankovic, Marko
: Jürjens, Jan; Humberg, Thorsten
Bachelor Thesis
2013Erweiterung der Business Process Model and Notation für Return on Security Investment Analysen
Thalmann, Dominik
: Jürjens, Jan; Pape, Sebastian
Thesis
2013Evolution vs. semantische Konsistenz - Einige Resultate
Jürjens, Jan
Presentation
2013Foreword
Rosado, D.G.; Blanco, C.; Mellado, D.; Jürjens, J.; Crespo, L.E.S.
Conference Paper
2013Hot topics in model-based security
Jürjens, Jan
Presentation
2013IT-Architekturen für auditierbare Geschäftsprozessanwendungen
Jürjens, Jan; Wenzel, Sven; Humberg, Thorsten; Poggenpohl, Daniel; Schmitz, Andreas
Presentation
2013Mehrparteien-Signaturen für elektronische Dokumente im Bereich der Telemedizin
Hartwecker, Jannic
: Jürjens, Jan; Deiters, Wolfgang
Master Thesis
2013Model-centric security verification subject to evolution
Jürjens, Jan
Presentation
2013Modellbasiertes Sicherheits- und Compliance-Management
Jürjens, Jan
Presentation
2013Ontology-based analysis of compliance and regulatory requirements of business processes
Humberg, Thorsten; Wessel, Christian; Poggenpohl, Daniel; Wenzel, Sven; Ruhroth, Thomas; Jürjens, Jan
Conference Paper
2013Preface. International Symposium on Engineering Secure Software and Systems, ESSoS 2013
Jürjens, J.; Livshits, B.; Scandariato, R.
Conference Paper
2013Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models
Taubenberger, S.; Jürjens, J.; Yu, Y.; Nuseibeh, B.
Journal Article
2013Security for changing software and systems
Jürjens, Jan
Presentation
2013Sicherheit und Compliance in der Cloud
Jürjens, Jan
Presentation
2013Zertifizierung für sichere Cyber-Physikalische Systeme
Jürjens, Jan
Presentation
2012Beyond one-shot security
Jürjens, J.; Schneider, K.
Book Article
2012Computational verification of C protocol implementations by symbolic execution
Aizatulin, M.; Gordon, D.; Jürjens, J.
Conference Paper
2012Den Nebel lichten: Von Compliance-Regularien zu testbaren Sicherheitsanforderungen
Jürjens, Jan
Presentation
2012Enhancing security requirements engineering by organizational learning
Schneider, K.; Knauss, E.; Houmb, S.; Islam, S.; Jürjens, J.
Journal Article
2012Entwicklung eines Eclipse-Plugins für Matlab-unterstützte Auswertungen des Return on Security Investment
Schnitzler, Theodor
: Jürjens, Jan; Schmitz, Andreas
Bachelor Thesis
2012Foreword
Rosado, D.G.; Crespo, L.E.S.; Blanco, C.; Jürjens, J.
Conference Paper
2012Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen
Wessel, C.; Humberg, T.; Wenzel, S.; Jürjens, J.
Conference Paper
2012Informationssicherheit im Cloud Computing
Jürjens, Jan
Presentation
2012Model-based security engineering
Jürjens, Jan
Presentation
2012Non-interference on UML state-charts
Ochoa, M.; Jürjens, J.; Cuellar, J.
Conference Paper
2012Securing processes for outsourcing into the cloud
Wenzel, S.; Wessel, C.; Humberg, T.; Jürjens, J.
Conference Paper
2012Security in information systems: New challenges and opportunities
Jürjens, Jan; Rosado, David G.; Sánchez, Luis Enrique; Fernández-Medina, Eduardo
Journal Article, Conference Paper
2012A sound decision procedure for the compositionality of secrecy
Ochoa, M.; Jürjens, J.; Warzecha, D.
Conference Paper
2012Supporting security assurance in the context of evolution: Modular modeling and analysis with UMLsec
Ruhroth, T.; Jürjens, J.
Conference Paper
2012Vérification et Test pour des systèmes évolutifs
Fourneret, E.; Bouquet, F.; Ochoa, M.; Jürjens, J.; S. Wenzel
Conference Paper
2012Verifying cryptographic code in C: Some experience and the Csec challenge
Aizatulin, M.; Dupressoir, F.; Gordon, A.D.; Jürjens, J.
Conference Paper
2011Anwendung von Process-Mining-Ansätzen auf Log-Daten aus SAP-Systemen
Blyufshteyn, Igor
: Jürjens, Jan; Rehof, Jakob
Thesis
2011Automated security hardening for evolving UML models
Jürjens, J.
Conference Paper
2011Connecting security requirements analysis and secure design using patterns and UMLsec
Schmidt, H.; Jürjens, J.
Conference Paper
2011Extracting and verifying cryptographic models from C protocol code by symbolic execution
Aizatulin, M.; Gordon, A.D.; Jürjens, J.
Conference Paper
2011Formale Abbildung der regulatorischen Compliance auf Security Policies
Bostan, Elena-Crina
: Jürjens, Jan; Hirsch, Martin
Thesis
2011A framework to support alignment of secure software engineering with legal regulations
Islam, S.; Mouratidis, H.; Jürjens, J.
Journal Article
2011Guiding a general-purpose C verifier to prove cryptographic protocols
Dupressoir, F.; Gordon, A.D.; Jürjens, J.; Naumann, D.A.
Conference Paper
2011Incremental security verification for evolving UMLsec models
Jürjens, J.; Marchal, L.; Ochoa, M.; Schmidt, H.
Conference Paper
2011Konzeption und Umsetzung eines UMLsecTool-Plugins zur Prüfung von Authorization Constraints für die Prozessmodellierungssprache BPMN 2.0
Michel, Marcel
: Jürjens, Jan; Ruhroth, Thomas
Bachelor Thesis
2011Mitigating soft error risks through protecting critical variables and blocks
Sadi, M.S.; Uddin, M.N.; Khan, M.M.R.; Jürjens, J.
Conference Paper
2011Model-based security verification and testing for smart-cards
Fourneret, E.; Ochoa, M.; Bouquet, F.; Botella, J.; Jürjens, J.; Yousefi, P.
Conference Paper
2011Modelling secure systems evolution: Abstract and concrete change specifications
Jürjens, J.; Ochoa, M.; Schmidt, H.; Marchal, L.; Houmb, S.H.; Islam, S.
Conference Paper
2011Monitoring von Geschäftsprozessen mit Compliance relevanten Eigenschaften
Mensah, Kubi Josua
: Jürjens, Jan; Küster, Jan-Christoph
Bachelor Thesis
2011Ontologie-basierte Modellierung ausgewählter Compliance-Regelwerke mit Anforderungserhebung zur Toolauswahl
Stahl, Christine Sarah
: Jürjens, Jan; Wenzel, Sven
Thesis
2011Orchestrating security and system engineering for evolving systems
Massacci, F.; Bouquet, F.; Fourneret, E.; Jürjens, J.; Lund, M.S.; Madelénat, S.; Muehlberg, J.; Paci, F.; Paul, S.; Piessens, F.; Solhaug, B.; Wenzel, S.
Conference Paper
2011Problem analysis of traditional IT-security risk assessment methods - an experience report from the insurance and auditing domain
Taubenberger, S.; Jürjens, J.; Yu, Y.; Nuseibeh, B.
Conference Paper
2011Run-time security traceability for evolving systems
Bauer, A.; Jürjens, J.; Yu, Y.
Journal Article
2011Security and compliance in clouds
Beckers, K.; Jürjens, J.
Conference Paper
2011Security and Compliance in Clouds
Jürjens, Jan; Beckers, Kristian
Presentation
2011Security and compliance in clouds
Jürjens, Jan
Presentation
2011Security and compliance in clouds. Challenges and solutions
Jürjens, Jan
Presentation
2011Security and compliance in clouds. Pattern-based compliance and security requirements engineering
Jürjens, Jan; Hirsch, Martin; Küster, Jan-Christoph
Presentation
2011Security patterns: Comparing modeling approaches
Nhlabatsi, A.; Bandara, A.; Hayashi, S.; Haley, C.B.; Jürjens, J.; Kaiya, H.; Kubo, A.; Laney, R.; Mouratidis, H.; Nuseibeh, B.; Tahara, Y.; Tun, T.T.; Washizaki, H.; Yoshioka, N.; Yu, Y.
Book Article
2011Software engineering for secure systems. Pt.2: From design to implementation via model-based security engineering
Jürjens, Jan; Nuseibeh, Bashar
Presentation
2011Supporting requirements engineers in recognising security issues
Knauss, E.; Houmb, S.; Schneider, K.; Islam, S.; Jürjens, J.
Conference Paper
2011Systematic development of UMLsec design models based on security requirements
Hatebur, D.; Heisel, M.; Jürjens, J.; Schmidt, H.
Conference Paper
2011Using security patterns to develop secure systems
Fernandez, E.B.; Yoshioka, N.; Washizaki, H.; Jürjens, J.; Hilst, M. van; Pernul, G.
Book Article
2011Werkzeuggestützte Identifikation von IT-Sicherheitsrisiken
Peschke, M.; Hirsch, M.; Jürjens, J.; Braun, S.
Conference Paper
2010Compliance in clouds: A cloud computing security perspective
Beckers, Kristian; Hirsch, Martin; Jürjens, Jan
Presentation
2010Component criticality analysis to minimize soft errors risk
Sadi, M.S.; Myers, D.G.; Sanchez, C.O.; Jürjens, J.
Journal Article
2010Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
Houmb, S.H.; Islam, S.; Knauss, E.; Jürjens, J.; Schneider, K.
Journal Article, Conference Paper
2010Formally-based black-box monitoring of security protocols
Pironti, A.; Jürjens, J.
Conference Paper
2010From goal-driven security requirements engineering to secure design
Mouratidis, H.; Jürjens, J.
Journal Article
2010Identification of vulnerabilities in web services using model-based security
Höhn, S.; Jürjens, J.; Lowis, L.; Accorsi, R.
Book Article
2010Model-based security engineering with UML
Jürjens, J.
Conference Paper
2010Outsourcing, SaaS & Clouds: Aber sicher ! (... und compliant)
Jürjens, J.
Presentation
2010Runtime verification of cryptographic protocols
Bauer, A.; Jürjens, J.
Journal Article
2010Tool support for code generation from a UMLsec property
Montrieux, L.; Jürjens, J.; Haley, C.B.; Yu, Y.; Schobbens, P.-Y.; Toussaint, H.
Conference Paper
2010Towards the secure modelling of OLAP users behaviour
Blanco, C.; Fernandez-Medina, E.; Trujillo, J.; Jürjens, J.
Conference Paper
2010Verifying authentication properties of C protocol code using VCC
Jürjens, Jan; Dupressoir; Gordon
Presentation
2010Werkzeuggestützte Modell-basierte Sicherheitsanalyse für IT-Sicherheitsmanagement
Peschke, Marc
: Jürjens, Jan; Hirsch, Martin
Thesis
2009Finite models in FOL-based crypto-protocol verification
Jürjens, J.; Weber, T.
Conference Paper
2009The logical modularity of programs
Ratiu, D.; Marinescu, R.; Jürjens, J.
Conference Paper
2009A novel approach to minimizing the risks of soft errors in mobile and ubiquitous systems
Sadi, M.S.; Myers, D.G.; Ortega, C.; Jürjens, J.
Conference Paper
2009Secure database development
Jürjens, J.; Fernandez, E.B.
Book Article
2009Secure information systems engineering: Experiences and lessons learned from two health care projects
Mouratidis, H.; Sunyaev, A.; Jürjens, J.
Conference Paper
2009Security analysis of a biometric authentication system using UMLsec and JML
Lloyd, J.; Jürjens, J.
Conference Paper
2009Security and dependability engineering
Jürjens, J.
Book Article