Currently browsing: Items authored or edited by Jan Jurjens

9 items in this list.
Generated on Fri Dec 6 13:42:56 2024 GMT.

ATo Top

Abadi, Martin and Jurjens, Jan (2001). Formal eavesdropping and its computational interpretation. In: Theoretical Aspects of Computer Software: 4th International Symposium, TACS 2001, Sendai, Japan, October 29-31, 2001, Proceedings (Kobayashi, Naoki and Pierce, Benjamin C. eds.), Lecture Notes In Computer Science, Springer, Berlin, pp. 82–94.

JTo Top

Jurjens, Jan (2009). A domain-specific language for cryptographic protocols based on streams. Journal of Logic and Algebraic Programming, 78(2) pp. 54–73.

Jurjens, Jan; Schreck, Jörg and Yu, Yijun (2008). Automated analysis of permission-based security using UMLsec (TOOL DEMO). In: ETAPS 2008, 29 Mar - 6 Apr 2008, Budapest, Hungary.

Jurjens, Jan (2007). Developing secure embedded systems: Pitfalls and how to avoid them. In: International Conference on Software Engineering : Companion to the proceedings of the 29th International Conference on Software Engineering, IEEE Computer Society, Washington, DC, pp. 182–183.

Jürjens, Jan and Yu, Yijun (2007). Tools for model-based security engineering: models vs. code. In: 22nd IEEE/ACM International Conference on Automated Software Engineering, 5-9 Nov 2007, Atlanta, Georgia, USA.

Jurjens, J (2006). Security analysis of crypto-based java programs using automated theorem provers. In: 21st IEEE International Conference on Automated Software Engineering (ASE'06), IEEE, Tokyo, pp. 167–176.

Jurjens, Jan (2001). On a problem of Gabriel and Ulmer. Journal of Pure and Applied Algebra, 158(2/3) pp. 183–196.

YTo Top

Yu, Yijun; Jurjens, Jan and Mylopoulos, John (2008). Traceability for the maintenance of secure software. In: 2008 IEEE International Conference on Software Maintenance, p. 297.

Export

Subscribe to these results

get details to embed this page in another page Embed as feed [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0