Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2010Architecture of knowledge fusion within an integrated mobile security kit
Laudy, C.; Petersson, H.; Sandkuhl, K.
Conference Paper
2010Auswirkungen von BPMN 2.0 auf das ERP
Weissenberg, N.
Journal Article
2010Building AAL services using the MILEO context server
Wojciechowski, M.; Deiters, W.
Conference Paper
2010Building an infrastructure level context model in ambient assisted living
Wojciechowski, M.
Journal Article, Conference Paper
2010Compliance in clouds: A cloud computing security perspective
Beckers, Kristian; Hirsch, Martin; Jürjens, Jan
Presentation
2010Component criticality analysis to minimize soft errors risk
Sadi, M.S.; Myers, D.G.; Sanchez, C.O.; Jürjens, J.
Journal Article
2010Composition of semantic process fragments to domain-related process families
Reuter, C.
Conference Paper
2010Current state and solutions for future challenges in early warning systems and alerting technologies
Meissen, U.; Voisard, A.
Book Article
2010A custom approach for variability management in automotive applications
Kliemannel, F.; Rock, G.; Mann, S.
Conference Paper
2010Deklarative Sicherheit zur Spezifikation und Implementierung der elektronischen Fallakte
Kuhlisch, R.; Caumanns, J.
Conference Paper
2010Designing sensor-based event processing infrastructures
Voisard, A.; Ziekow, H.
Conference Paper
2010Deutsche Forschungsarbeiten im THESEUS-Umfeld
Mattauch, W.
Report
2010E-Training: Von Trainings- zu Patientendaten
Meister, Sven
Journal Article
2010Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
Houmb, S.H.; Islam, S.; Knauss, E.; Jürjens, J.; Schneider, K.
Journal Article, Conference Paper
2010An empirical evaluation of the quality of interoperability specifications for the web
Gottschick, J.; Restel, H.
Conference Paper
2010Engineering and assessment of variant-rich embedded software
Rock, G.; Kliemannel, F.; Mann, S.
Conference Paper
2010EU-Forschungsförderung im THESEUS-Umfeld
Weber, H.; Mattauch, W.
Report
2010Formally-based black-box monitoring of security protocols
Pironti, A.; Jürjens, J.
Conference Paper
2010Forschungsarbeiten im THESEUS-Umfeld in den USA
Weber, H.; Mattauch, W.
Report
2010Fraunhofer-Institut für Software- und Systemtechnik. Jahresbericht 2009
 
Annual Report
2010From goal-driven security requirements engineering to secure design
Mouratidis, H.; Jürjens, J.
Journal Article
2010Identification of vulnerabilities in web services using model-based security
Höhn, S.; Jürjens, J.; Lowis, L.; Accorsi, R.
Book Article
2010ILOG 2010 workshop chairs' message
Deiters, W.; Mirijamdotter, A.; Sandkuhl, K.
Conference Paper
2010Integrated collaborative knowledge work in emergency response to natural disasters
Fuchs-Kittowski, F.; Klafft, M.; Faust, D.
Conference Paper
2010An integration platform for heterogeneous sensor systems in GITEWS - Tsunami Service Bus
Fleischer, J.; Häner, R.; Herrnkind, S.; Kloth, A.; Kriegel, U.; Schwarting, H.; Wächter, J.
Journal Article
2010Das Internet der Dienste
Firyn, A.; Mattauch, W.
Report
2010Kontextorientierte Informationsversorgung in medizinischen Behandlungsprozessen
Koch, O.
Dissertation
2010A logistics demand forecasting model based on Grey neural network
Qi, F.; Yu, D.; Holtkamp, B.
Conference Paper
2010Model maturity levels for embedded systems development, or: Working with warnings
Große-Rhode, M.
Conference Paper
2010Model-based security engineering with UML
Jürjens, J.
Conference Paper
2010Outsourcing, SaaS & Clouds: Aber sicher ! (... und compliant)
Jürjens, J.
Presentation
2010Process Compliance und Process Intelligence
Hüning, N.; Gsell, H.; Weißenberg, N.; Hirsch, M.; Beckers, K.
Journal Article
2010Process Intelligence in der Finanzwirtschaft
Gsell, H.; Weißenberg, N.; Beckers, K.; Hirsch, M.
Book Article
2010Protokolle zur Anbindung kundenlokaler Infrastruktur an eine Cloud Umgebung
Steinbuß, S.; Kasmann, G.
Conference Paper
2010Quality check with DokuWiki for instant user feedback
Gohr, A.; Hüttemann, D.; Faust, D.; Fuchs-Kittowski, F.
Conference Paper
2010Runtime verification of cryptographic protocols
Bauer, A.; Jürjens, J.
Journal Article
2010Sichere und effiziente Aktensysteme auf Basis von elektronischer FallAkte (eFA) & EPA 2015
Suelmann, C.; Kuhlisch, R.
Journal Article
2010Tool support for code generation from a UMLsec property
Montrieux, L.; Jürjens, J.; Haley, C.B.; Yu, Y.; Schobbens, P.-Y.; Toussaint, H.
Conference Paper
2010Towards a logistics cloud
Holtkamp, B.; Steinbuss, S.; Gsell, H.; Loeffeler, T.; Springer, U.
Conference Paper
2010Towards a reference architecture for early warning systems
Meissen, U.; Voisard, A.
Conference Paper
2010Towards the secure modelling of OLAP users behaviour
Blanco, C.; Fernandez-Medina, E.; Trujillo, J.; Jürjens, J.
Conference Paper
2010The transfer-network "Easy.Going"
Rentzsch, M.; Dziekan, K.; Klafft, M.
Conference Paper
2010Using context to improve information supply in the medical sector
Koch, O.; Rotaru, E.
Conference Paper
2010Verifying authentication properties of C protocol code using VCC
Jürjens, Jan; Dupressoir; Gordon
Presentation
2010Was bringt die elektronische FallAkte? Konzept und Status Quo
Reuter, C.
Journal Article
2010Werkzeuggestützte Modell-basierte Sicherheitsanalyse für IT-Sicherheitsmanagement
Peschke, Marc
: Jürjens, Jan; Hirsch, Martin
Thesis