Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2012Beyond one-shot security
Jürjens, J.; Schneider, K.
Book Article
2012Computational verification of C protocol implementations by symbolic execution
Aizatulin, M.; Gordon, D.; Jürjens, J.
Conference Paper
2012Den Nebel lichten: Von Compliance-Regularien zu testbaren Sicherheitsanforderungen
Jürjens, Jan
Presentation
2012Enhancing security requirements engineering by organizational learning
Schneider, K.; Knauss, E.; Houmb, S.; Islam, S.; Jürjens, J.
Journal Article
2012Entwicklung eines Eclipse-Plugins für Matlab-unterstützte Auswertungen des Return on Security Investment
Schnitzler, Theodor
: Jürjens, Jan; Schmitz, Andreas
Bachelor Thesis
2012eTraining - Vernetzung von erstem und zweitem Gesundheitsmarkt über die HL7 Clinical Document Architecture (CDA)
Meister, Sven; Houta, Salima
Book Article
2012Foreword
Rosado, D.G.; Crespo, L.E.S.; Blanco, C.; Jürjens, J.
Conference Paper
2012Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen
Wessel, C.; Humberg, T.; Wenzel, S.; Jürjens, J.
Conference Paper
2012Ein Geschäftsmodellansatz für ein standardisiertes technikunterstütztes Dienstleistungsangebot im Wohnquartier - Das Projekt STADIWAMI
Dobernowsky, M.; Gauch, S.; Fahl, P.; Schoepe, L.; Trage, M.
Book Article
2012Guarded Process Spaces (GPS): A navigation system towards creation and dynamic change of healthcare processes from the end-user's perspective
Reuter, C.; Dadam, P.; Rudolph, S.; Deiters, W.; Trillsch, S.
Conference Paper
2012ICT infrastructures for telerehabilitation
Deiters, Wolfgang; Koch, Oliver; Königsmann, Thomas; Meister, Sven
Book Article
2012Information overload in telemedicine: Using complex event processing and context for intelligent information filtering and supply
Meister, Sven; Koch, Oliver
Conference Paper
2012Informationssicherheit im Cloud Computing
Jürjens, Jan
Presentation
2012IT as an enabler of sustainable use of data from innovative technical components for assisted living
Knaup, P.; Schöpe, L.
Conference Paper
2012Die Logistics Mall - Orchestrierung von Logistik-Applikationen in der Cloud
Weißenberg, Norbert; Harmuth, Nina
Journal Article
2012Mobilapplikationen und Management der Hypertonie
Becker, S.; Mitchell, A.; Königsmann, T.; Kribben, A.; Erbel, R.
Journal Article
2012Model-based development of context-aware applications using the MILEO-context server
Wojciechowski, Manfred; Wiedeler, Markus
Conference Paper
2012Model-based security engineering
Jürjens, Jan
Presentation
2012Modeling trade-offs in the design of sensor-based event processing infrastructures
Voisard, A.; Ziekow, H.
Journal Article
2012Non-interference on UML state-charts
Ochoa, M.; Jürjens, J.; Cuellar, J.
Conference Paper
2012P23R. Rahmenarchitektur
Gottschick, Jan; Baum, Jürgen; Clauder, Frank; Hartenstein, Heiko; Rosenmüller, Rainer
Report
2012P23R: Sicherheitsarchitektur
Caumanns, Jörg; Baum, Jürgen; Kraufmann, Ben; Kuhlisch, Raik; Restel, Hannes
Report
2012P23R: Sicherheitskonzept
Baum, Jürgen; Caumanns, Jörg; Eckstein, Levona; Kraft, Reiner; Stöwer, Mechthild
Report
2012P23R: Spezifikation des P23R-Protokolls
Rubinstein, Tatjana; Baum, Jürgen; Gottschick, Jan
Report
2012P23R: Spezifikationen zur Sicherheitsarchitektur
Caumanns, Jörg; Baum, Jürgen; Kraufmann, Ben; Kuhlisch, Raik; Restel, Hannes
Report
2012Securing processes for outsourcing into the cloud
Wenzel, S.; Wessel, C.; Humberg, T.; Jürjens, J.
Conference Paper
2012Security in information systems: New challenges and opportunities
Jürjens, Jan; Rosado, David G.; Sánchez, Luis Enrique; Fernández-Medina, Eduardo
Journal Article, Conference Paper
2012Service Design Studio (SDS) - the execution environment for the service design studio
Iscan, Hülya; Flake, Stephan; Tacken, Jürgen; Ley, Martin; Schmülling, Christian
Presentation
2012A sound decision procedure for the compositionality of secrecy
Ochoa, M.; Jürjens, J.; Warzecha, D.
Conference Paper
2012Supporting security assurance in the context of evolution: Modular modeling and analysis with UMLsec
Ruhroth, T.; Jürjens, J.
Conference Paper
2012Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches
Beckers, K.; Faßbender, S.; Heisel, M.; Küster, J.-C.; Schmidt, H.
Conference Paper
2012Telemedical events: Intelligent delivery of telemedical values using CEP and HL7
Meister, S.
Conference Paper
2012Telemedical ILOG listeners: Information logistics processing of telemedical values using CEP and HL7
Meister, Sven; Stahlmann, Valentin
Conference Paper
2012Telemedizinische ILOG Listener: Informationslogistische Verarbeitung telemedizinischer Werte unter Nutzung von CEP und HL7
Meister, Sven; Stahlmann, Valentin
Conference Paper
2012TiEE - Telemedizinische ILOG Event Engine
Meister, Sven; Schafer, Sven; Stahlmann, Valentin
Book Article
2012Vérification et Test pour des systèmes évolutifs
Fourneret, E.; Bouquet, F.; Ochoa, M.; Jürjens, J.; Wenzel, S.
Conference Paper
2012Verifying cryptographic code in C: Some experience and the Csec challenge
Aizatulin, M.; Dupressoir, F.; Gordon, A.D.; Jürjens, J.
Conference Paper