BibTeX records: Jan Jürjens

download as .bib file

@article{DBLP:journals/tse/PeldszusBJ24,
  author       = {Sven Peldszus and
                  Jens B{\"{u}}rger and
                  Jan J{\"{u}}rjens},
  title        = {UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip
                  Engineering},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {50},
  number       = {1},
  pages        = {16--47},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSE.2023.3326366},
  doi          = {10.1109/TSE.2023.3326366},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/PeldszusBJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/GrosserRJ24,
  author       = {Katharina Gro{\ss}er and
                  Marina Rukavitsyna and
                  Jan J{\"{u}}rjens},
  editor       = {Rick Rabiser and
                  Manuel Wimmer and
                  Iris Groher and
                  Andreas Wortmann and
                  Bianca Wiesmayr},
  title        = {A Comparative Evaluation of Requirement Template Systems (Summary)},
  booktitle    = {Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik,
                  Linz, Austria, February 26 - March 1, 2024},
  series       = {{LNI}},
  volume       = {{P-343}},
  pages        = {47--48},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sw2024\_10},
  doi          = {10.18420/SW2024\_10},
  timestamp    = {Mon, 11 Mar 2024 16:51:10 +0100},
  biburl       = {https://dblp.org/rec/conf/se/GrosserRJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-05987,
  author       = {Anselm von Gladiss and
                  Amir Shayan Ahmadian and
                  Jan J{\"{u}}rjens},
  title        = {Reconstruction as a service: a data space for off-site image reconstruction
                  in magnetic particle imaging},
  journal      = {CoRR},
  volume       = {abs/2401.05987},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.05987},
  doi          = {10.48550/ARXIV.2401.05987},
  eprinttype    = {arXiv},
  eprint       = {2401.05987},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-05987.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-09199,
  author       = {Qusai Ramadan and
                  Zeyd Boukhers and
                  Muath AlShaikh and
                  Christoph Lange and
                  Jan J{\"{u}}rjens},
  title        = {Data Trading and Monetization: Challenges and Open Research Directions},
  journal      = {CoRR},
  volume       = {abs/2401.09199},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.09199},
  doi          = {10.48550/ARXIV.2401.09199},
  eprinttype    = {arXiv},
  eprint       = {2401.09199},
  timestamp    = {Thu, 01 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-09199.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/HassoGAGJ23,
  author       = {Hussein Hasso and
                  Katharina Gro{\ss}er and
                  Iliass Aymaz and
                  Hanna Geppert and
                  Jan J{\"{u}}rjens},
  title        = {Enhanced abbreviation-expansion pair detection for glossary term extraction},
  journal      = {Inf. Softw. Technol.},
  volume       = {159},
  pages        = {107203},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.infsof.2023.107203},
  doi          = {10.1016/J.INFSOF.2023.107203},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/HassoGAGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/BoukhersGJ23,
  author       = {Zeyd Boukhers and
                  Prantik Goswami and
                  Jan J{\"{u}}rjens},
  title        = {Knowledge guided multi-filter residual convolutional neural network
                  for {ICD} coding from clinical text},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {24},
  pages        = {17633--17644},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-08581-2},
  doi          = {10.1007/S00521-023-08581-2},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/BoukhersGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/TumaPSSJ23,
  author       = {Katja Tuma and
                  Sven Peldszus and
                  Daniel Str{\"{u}}ber and
                  Riccardo Scandariato and
                  Jan J{\"{u}}rjens},
  title        = {Checking security compliance between models and code},
  journal      = {Softw. Syst. Model.},
  volume       = {22},
  number       = {1},
  pages        = {273--296},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10270-022-00991-5},
  doi          = {10.1007/S10270-022-00991-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/TumaPSSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/BoukhersBYJ23,
  author       = {Zeyd Boukhers and
                  Azeddine Bouabdallah and
                  Cong Yang and
                  Jan J{\"{u}}rjens},
  editor       = {Ingo Frommholz and
                  Frank Hopfgartner and
                  Mark Lee and
                  Michael Oakes and
                  Mounia Lalmas and
                  Min Zhang and
                  Rodrygo L. T. Santos},
  title        = {Beyond Trading Data: The Hidden Influence of Public Awareness and
                  Interest on Cryptocurrency Volatility},
  booktitle    = {Proceedings of the 32nd {ACM} International Conference on Information
                  and Knowledge Management, {CIKM} 2023, Birmingham, United Kingdom,
                  October 21-25, 2023},
  pages        = {142--151},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3583780.3614790},
  doi          = {10.1145/3583780.3614790},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/BoukhersBYJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GrosserRJ23,
  author       = {Katharina Gro{\ss}er and
                  Marina Rukavitsyna and
                  Jan J{\"{u}}rjens},
  editor       = {Kurt Schneider and
                  Fabiano Dalpiaz and
                  Jennifer Horkoff},
  title        = {A Comparative Evaluation of Requirement Template Systems},
  booktitle    = {31st {IEEE} International Requirements Engineering Conference, {RE}
                  2023, Hannover, Germany, September 4-8, 2023},
  pages        = {41--52},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/RE57278.2023.00014},
  doi          = {10.1109/RE57278.2023.00014},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/GrosserRJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/HassoGAGJ23,
  author       = {Hussein Hasso and
                  Katharina Gro{\ss}er and
                  Iliass Aymaz and
                  Hanna Geppert and
                  Jan J{\"{u}}rjens},
  editor       = {Kurt Schneider and
                  Fabiano Dalpiaz and
                  Jennifer Horkoff},
  title        = {{ILLOD} Replication Package: An Open-Source Framework for Abbreviation-Expansion
                  Pair Detection and Term Consolidation in Requirements},
  booktitle    = {31st {IEEE} International Requirements Engineering Conference, {RE}
                  2023, Hannover, Germany, September 4-8, 2023},
  pages        = {369--370},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/RE57278.2023.00056},
  doi          = {10.1109/RE57278.2023.00056},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/HassoGAGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/GrosserRJ23,
  author       = {Katharina Gro{\ss}er and
                  Volker Riediger and
                  Jan J{\"{u}}rjens},
  editor       = {Gregor Engels and
                  Regina Hebig and
                  Matthias Tichy},
  title        = {Requirements document relations: {A} reuse perspective on traceability
                  through standards},
  booktitle    = {Software Engineering 2023, Fachtagung des GI-Fachbereichs Softwaretechnik,
                  20.-24. Februar 2023, Paderborn},
  series       = {{LNI}},
  volume       = {{P-332}},
  pages        = {57--58},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2023},
  url          = {https://dl.gi.de/handle/20.500.12116/40079},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/se/GrosserRJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/KonersmannK0HKR23,
  author       = {Marco Konersmann and
                  Angelika Kaplan and
                  Thomas K{\"{u}}hn and
                  Robert Heinrich and
                  Anne Koziolek and
                  Ralf H. Reussner and
                  Jan J{\"{u}}rjens and
                  Mahmood al{-}Doori and
                  Nicolas Boltz and
                  Marco Ehl and
                  Dominik Fuch{\ss} and
                  Katharina Gro{\ss}er and
                  Sebastian Hahner and
                  Jan Keim and
                  Matthias Lohr and
                  Timur Saglam and
                  Sophie Schulz and
                  Jan{-}Philipp T{\"{o}}berg},
  editor       = {Gregor Engels and
                  Regina Hebig and
                  Matthias Tichy},
  title        = {Evaluation Methods and Replicability of Software Architecture Research
                  Objects},
  booktitle    = {Software Engineering 2023, Fachtagung des GI-Fachbereichs Softwaretechnik,
                  20.-24. Februar 2023, Paderborn},
  series       = {{LNI}},
  volume       = {{P-332}},
  pages        = {75--76},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2023},
  url          = {https://dl.gi.de/handle/20.500.12116/40089},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/se/KonersmannK0HKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bpmj/StockerHJ22,
  author       = {Joachim Stocker and
                  Nils Herda and
                  Jan J{\"{u}}rjens},
  title        = {Life cycle and metrics to measure the resilience of business processes
                  by considering resources},
  journal      = {Bus. Process. Manag. J.},
  volume       = {28},
  number       = {4},
  pages        = {1164--1182},
  year         = {2022},
  url          = {https://doi.org/10.1108/BPMJ-10-2021-0674},
  doi          = {10.1108/BPMJ-10-2021-0674},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bpmj/StockerHJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/BoukhersHJ22,
  author       = {Zeyd Boukhers and
                  Timo Hartmann and
                  Jan J{\"{u}}rjens},
  title        = {{COIN:} Counterfactual Image Generation for Visual Question Answering
                  Interpretation},
  journal      = {Sensors},
  volume       = {22},
  number       = {6},
  pages        = {2245},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22062245},
  doi          = {10.3390/S22062245},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/BoukhersHJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/GrosserRJ22,
  author       = {Katharina Gro{\ss}er and
                  Volker Riediger and
                  Jan J{\"{u}}rjens},
  title        = {Requirements document relations},
  journal      = {Softw. Syst. Model.},
  volume       = {21},
  number       = {6},
  pages        = {1--37},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10270-021-00958-y},
  doi          = {10.1007/S10270-021-00958-Y},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sosym/GrosserRJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/LohrSKJS22,
  author       = {Matthias Lohr and
                  Kenneth Skiba and
                  Marco Konersmann and
                  Jan J{\"{u}}rjens and
                  Steffen Staab},
  title        = {Formalizing Cost Fairness for Two-Party Exchange Protocols using Game
                  Theory and Applications to Blockchain},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2022, Shanghai, China, May 2-5, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICBC54727.2022.9805522},
  doi          = {10.1109/ICBC54727.2022.9805522},
  timestamp    = {Mon, 04 Jul 2022 17:06:16 +0200},
  biburl       = {https://dblp.org/rec/conf/icbc2/LohrSKJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsa/KonersmannK0HKR22,
  author       = {Marco Konersmann and
                  Angelika Kaplan and
                  Thomas K{\"{u}}hn and
                  Robert Heinrich and
                  Anne Koziolek and
                  Ralf H. Reussner and
                  Jan J{\"{u}}rjens and
                  Mahmood al{-}Doori and
                  Nicolas Boltz and
                  Marco Ehl and
                  Dominik Fuch{\ss} and
                  Katharina Gro{\ss}er and
                  Sebastian Hahner and
                  Jan Keim and
                  Matthias Lohr and
                  Timur Saglam and
                  Sophie Schulz and
                  Jan{-}Philipp T{\"{o}}berg},
  title        = {Replication Package of "Evaluation Methods and Replicability
                  of Software Architecture Research Objects"},
  booktitle    = {{IEEE} 19th International Conference on Software Architecture Companion,
                  {ICSA} Companion 2022, Honolulu, HI, USA, March 12-15, 2022},
  pages        = {58},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICSA-C54293.2022.00021},
  doi          = {10.1109/ICSA-C54293.2022.00021},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsa/KonersmannK0HKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsa/KonersmannKKHKR22,
  author       = {Marco Konersmann and
                  Angelika Kaplan and
                  Thomas K{\"{u}}hn and
                  Robert Heinrich and
                  Anne Koziolek and
                  Ralf H. Reussner and
                  Jan J{\"{u}}rjens and
                  Mahmood al{-}Doori and
                  Nicolas Boltz and
                  Marco Ehl and
                  Dominik Fuch{\ss} and
                  Katharina Gro{\ss}er and
                  Sebastian Hahner and
                  Jan Keim and
                  Matthias Lohr and
                  Timur Saglam and
                  Sophie Schulz and
                  Jan{-}Philipp T{\"{o}}berg},
  title        = {Evaluation Methods and Replicability of Software Architecture Research
                  Objects},
  booktitle    = {19th {IEEE} International Conference on Software Architecture, {ICSA}
                  2022, Honolulu, HI, USA, March 12-15, 2022},
  pages        = {157--168},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICSA53651.2022.00023},
  doi          = {10.1109/ICSA53651.2022.00023},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsa/KonersmannKKHKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieem/VernickelSKJ22,
  author       = {Kilian Vernickel and
                  M. Singh and
                  Marco Konersmann and
                  Jan J{\"{u}}rjens},
  title        = {Ontology-based Synchronization of Automated Production Systems and
                  Their Simulation Models},
  booktitle    = {{IEEE} International Conference on Industrial Engineering and Engineering
                  Management, {IEEM} 2022, Kuala Lumpur, Malaysia, December 7-10, 2022},
  pages        = {660--664},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IEEM55944.2022.9989593},
  doi          = {10.1109/IEEM55944.2022.9989593},
  timestamp    = {Thu, 05 Jan 2023 17:26:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ieem/VernickelSKJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/SamaKGTJ22,
  author       = {Malla Reddy Sama and
                  Wolfgang Kiess and
                  Riccardo Guerzoni and
                  Srisakul Thakolsri and
                  Jan J{\"{u}}rjens},
  title        = {Redefining the Trust Model for the Internet of Everything in the 6G
                  era},
  booktitle    = {2022 {IEEE} 33rd Annual International Symposium on Personal, Indoor
                  and Mobile Radio Communications (PIMRC), Kyoto, Japan, September 12-15,
                  2022},
  pages        = {1400--1406},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/PIMRC54779.2022.9977941},
  doi          = {10.1109/PIMRC54779.2022.9977941},
  timestamp    = {Tue, 09 May 2023 13:13:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/SamaKGTJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/HassoGAGJ22,
  author       = {Hussein Hasso and
                  Katharina Gro{\ss}er and
                  Iliass Aymaz and
                  Hanna Geppert and
                  Jan J{\"{u}}rjens},
  editor       = {Vincenzo Gervasi and
                  Andreas Vogelsang},
  title        = {Abbreviation-Expansion Pair Detection for Glossary Term Extraction},
  booktitle    = {Requirements Engineering: Foundation for Software Quality - 28th International
                  Working Conference, {REFSQ} 2022, Birmingham, UK, March 21-24, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13216},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98464-9\_6},
  doi          = {10.1007/978-3-030-98464-9\_6},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/refsq/HassoGAGJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/22/JurjensSY022,
  author       = {Jan J{\"{u}}rjens and
                  Simon Scheider and
                  Furkan Yildirim and
                  Michael Henke},
  editor       = {Boris Otto and
                  Michael ten Hompel and
                  Stefan Wrobel},
  title        = {Tokenomics: Decentralized Incentivization in the Context of Data Spaces},
  booktitle    = {Designing Data Spaces: The Ecosystem Approach to Competitive Advantage},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-93975-5\_6},
  doi          = {10.1007/978-3-030-93975-5\_6},
  timestamp    = {Wed, 07 Dec 2022 23:14:27 +0100},
  biburl       = {https://dblp.org/rec/books/sp/22/JurjensSY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/22/CaceresVPPGKBKMTKNMMLAJ22,
  author       = {Santiago C{\'{a}}ceres and
                  Francisco Valverde and
                  Carlos Enrique Palau and
                  Andreu Belsa Pellicer and
                  Christos A. Gizelis and
                  Dimosthenes Krassas and
                  Hanane Becha and
                  R{\'{e}}da Khouani and
                  Andreas Metzger and
                  Nikos Tzagkarakis and
                  Anthousa Karkoglou and
                  Anastasios Nikolakopoulos and
                  Achilleas Marinakis and
                  Vrettos Moulos and
                  Antonios Litke and
                  Amir Shayan Ahmadian and
                  Jan J{\"{u}}rjens},
  editor       = {Edward Curry and
                  S{\"{o}}ren Auer and
                  Arne J. Berre and
                  Andreas Metzger and
                  Mar{\'{\i}}a S. P{\'{e}}rez and
                  Sonja Zillner},
  title        = {Towards Cognitive Ports of the Future},
  booktitle    = {Technologies and Applications for Big Data Value},
  pages        = {453--474},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-78307-5\_20},
  doi          = {10.1007/978-3-030-78307-5\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/22/CaceresVPPGKBKMTKNMMLAJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-03342,
  author       = {Zeyd Boukhers and
                  Timo Hartmann and
                  Jan J{\"{u}}rjens},
  title        = {{COIN:} Counterfactual Image Generation for {VQA} Interpretation},
  journal      = {CoRR},
  volume       = {abs/2201.03342},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.03342},
  eprinttype    = {arXiv},
  eprint       = {2201.03342},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-03342.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-08967,
  author       = {Zeyd Boukhers and
                  Azeddine Bouabdallah and
                  Matthias Lohr and
                  Jan J{\"{u}}rjens},
  title        = {Ensemble and Multimodal Approach for Forecasting Cryptocurrency Price},
  journal      = {CoRR},
  volume       = {abs/2202.08967},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.08967},
  eprinttype    = {arXiv},
  eprint       = {2202.08967},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-08967.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-05925,
  author       = {Matthias Lohr and
                  Kenneth Skiba and
                  Marco Konersmann and
                  Jan J{\"{u}}rjens and
                  Steffen Staab},
  title        = {Formalizing Cost Fairness for Two-Party Exchange Protocols using Game
                  Theory and Applications to Blockchain (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2203.05925},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.05925},
  doi          = {10.48550/ARXIV.2203.05925},
  eprinttype    = {arXiv},
  eprint       = {2203.05925},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-05925.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/PeldszusBKJ21,
  author       = {Sven Peldszus and
                  Jens B{\"{u}}rger and
                  Timo Kehrer and
                  Jan J{\"{u}}rjens},
  title        = {Ontology-driven evolution of software security},
  journal      = {Data Knowl. Eng.},
  volume       = {134},
  pages        = {101907},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.datak.2021.101907},
  doi          = {10.1016/J.DATAK.2021.101907},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dke/PeldszusBKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/SadiAJ21,
  author       = {Muhammad Sheikh Sadi and
                  Waseem Ahmed and
                  Jan J{\"{u}}rjens},
  title        = {Towards Tolerating Soft Errors for Embedded Systems},
  journal      = {{SN} Comput. Sci.},
  volume       = {2},
  number       = {2},
  pages        = {101},
  year         = {2021},
  url          = {https://doi.org/10.1007/s42979-021-00497-9},
  doi          = {10.1007/S42979-021-00497-9},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sncs/SadiAJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/SamaGKTJ21,
  author       = {Malla Reddy Sama and
                  Riccardo Guerzoni and
                  Wolfgang Kiess and
                  Srisakul Thakolsri and
                  Jan J{\"{u}}rjens},
  title        = {Why is Application Reliability an Issue for an Ultra-Reliable 6G Network?},
  booktitle    = {Joint European Conference on Networks and Communications {\&}
                  6G Summit, EuCNC/6G Summit 2021, Porto, Portugal, June 8-11, 2021},
  pages        = {568--573},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuCNC/6GSummit51104.2021.9482540},
  doi          = {10.1109/EUCNC/6GSUMMIT51104.2021.9482540},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eucnc/SamaGKTJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-08579,
  author       = {Katja Tuma and
                  Sven Peldszus and
                  Daniel Str{\"{u}}ber and
                  Riccardo Scandariato and
                  Jan J{\"{u}}rjens},
  title        = {Checking Security Compliance between Models and Code},
  journal      = {CoRR},
  volume       = {abs/2108.08579},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.08579},
  eprinttype    = {arXiv},
  eprint       = {2108.08579},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-08579.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LohrSJS21,
  author       = {Matthias Lohr and
                  Benjamin Schlosser and
                  Jan J{\"{u}}rjens and
                  Steffen Staab},
  title        = {Cost Fairness for Blockchain-Based Two-Party Exchange Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/166},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LohrSJS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/PapePJM20,
  author       = {Sebastian Pape and
                  Federica Paci and
                  Jan J{\"{u}}rjens and
                  Fabio Massacci},
  title        = {Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria
                  Approach},
  journal      = {Inf.},
  volume       = {11},
  number       = {5},
  pages        = {261},
  year         = {2020},
  url          = {https://doi.org/10.3390/info11050261},
  doi          = {10.3390/INFO11050261},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/PapePJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/RamadanSSJRS20,
  author       = {Qusai Ramadan and
                  Daniel Str{\"{u}}ber and
                  Mattia Salnitri and
                  Jan J{\"{u}}rjens and
                  Volker Riediger and
                  Steffen Staab},
  title        = {A semi-automated BPMN-based framework for detecting conflicts between
                  security, data-minimization, and fairness requirements},
  journal      = {Softw. Syst. Model.},
  volume       = {19},
  number       = {5},
  pages        = {1191--1227},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10270-020-00781-x},
  doi          = {10.1007/S10270-020-00781-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/RamadanSSJRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/LohrSJS20,
  author       = {Matthias Lohr and
                  Benjamin Schlosser and
                  Jan J{\"{u}}rjens and
                  Steffen Staab},
  title        = {Cost Fairness for Blockchain-Based Two-Party Exchange Protocols},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes,
                  Greece, November 2-6, 2020},
  pages        = {428--435},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/Blockchain50366.2020.00062},
  doi          = {10.1109/BLOCKCHAIN50366.2020.00062},
  timestamp    = {Fri, 30 Apr 2021 12:35:39 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/LohrSJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcis/BurgerKJ20,
  author       = {Jens B{\"{u}}rger and
                  Timo Kehrer and
                  Jan J{\"{u}}rjens},
  editor       = {Fabiano Dalpiaz and
                  Jelena Zdravkovic and
                  Pericles Loucopoulos},
  title        = {Ontology Evolution in the Context of Model-Based Secure Software Engineering},
  booktitle    = {Research Challenges in Information Science - 14th International Conference,
                  {RCIS} 2020, Limassol, Cyprus, September 23-25, 2020, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {385},
  pages        = {437--454},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-50316-1\_26},
  doi          = {10.1007/978-3-030-50316-1\_26},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rcis/BurgerKJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/PeldszusT0JS20,
  author       = {Sven Peldszus and
                  Katja Tuma and
                  Daniel Str{\"{u}}ber and
                  Jan J{\"{u}}rjens and
                  Riccardo Scandariato},
  editor       = {Michael Felderer and
                  Wilhelm Hasselbring and
                  Rick Rabiser and
                  Reiner Jung},
  title        = {Secure Data-Flow Compliance Checks between Models and Code based on
                  Automated Mappings},
  booktitle    = {Software Engineering 2020, Fachtagung des GI-Fachbereichs Softwaretechnik,
                  24.-28. Februar 2020, Innsbruck, Austria},
  series       = {{LNI}},
  volume       = {{P-300}},
  pages        = {51--52},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/SE2020\_13},
  doi          = {10.18420/SE2020\_13},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/se/PeldszusT0JS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/AhmadianPJSGMR20,
  author       = {Amir Shayan Ahmadian and
                  Sven Peldszus and
                  Jan J{\"{u}}rjens and
                  Mattia Salnitri and
                  Paolo Giorgini and
                  Haralambos Mouratidis and
                  Jos{\'{e}} Fran. Ruiz},
  editor       = {Mattia Salnitri and
                  Jan J{\"{u}}rjens and
                  Haralambos Mouratidis and
                  Loredana Mancini and
                  Paolo Giorgini},
  title        = {The Architecture of VisiOn Privacy Platform},
  booktitle    = {Visual Privacy Management - Design and Applications of a Privacy-Enabling
                  Platform},
  series       = {Lecture Notes in Computer Science},
  volume       = {12030},
  pages        = {54--76},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59944-7\_3},
  doi          = {10.1007/978-3-030-59944-7\_3},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/AhmadianPJSGMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/PeldszusASJPM20,
  author       = {Sven Peldszus and
                  Amir Shayan Ahmadian and
                  Mattia Salnitri and
                  Jan J{\"{u}}rjens and
                  Michalis Pavlidis and
                  Haralambos Mouratidis},
  editor       = {Mattia Salnitri and
                  Jan J{\"{u}}rjens and
                  Haralambos Mouratidis and
                  Loredana Mancini and
                  Paolo Giorgini},
  title        = {Visual Privacy Management},
  booktitle    = {Visual Privacy Management - Design and Applications of a Privacy-Enabling
                  Platform},
  series       = {Lecture Notes in Computer Science},
  volume       = {12030},
  pages        = {77--108},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59944-7\_4},
  doi          = {10.1007/978-3-030-59944-7\_4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/PeldszusASJPM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/12030,
  editor       = {Mattia Salnitri and
                  Jan J{\"{u}}rjens and
                  Haralambos Mouratidis and
                  Loredana Mancini and
                  Paolo Giorgini},
  title        = {Visual Privacy Management - Design and Applications of a Privacy-Enabling
                  Platform},
  series       = {Lecture Notes in Computer Science},
  volume       = {12030},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59944-7},
  doi          = {10.1007/978-3-030-59944-7},
  isbn         = {978-3-030-59943-0},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/12030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/LohrHJS19,
  author       = {Matthias Lohr and
                  Jonathan Hund and
                  Jan J{\"{u}}rjens and
                  Steffen Staab},
  title        = {Ensuring Genuineness for Selectively Disclosed Confidential Data Using
                  Distributed Ledgers: Applications to Rail Wayside Monitoring},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {477--482},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00072},
  doi          = {10.1109/BLOCKCHAIN.2019.00072},
  timestamp    = {Wed, 08 Jan 2020 16:20:56 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/LohrHJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/PeldszusT0JS19,
  author       = {Sven Peldszus and
                  Katja Tuma and
                  Daniel Str{\"{u}}ber and
                  Jan J{\"{u}}rjens and
                  Riccardo Scandariato},
  editor       = {Marouane Kessentini and
                  Tao Yue and
                  Alexander Pretschner and
                  Sebastian Voss and
                  Loli Burgue{\~{n}}o},
  title        = {Secure Data-Flow Compliance Checks between Models and Code Based on
                  Automated Mappings},
  booktitle    = {22nd {ACM/IEEE} International Conference on Model Driven Engineering
                  Languages and Systems, {MODELS} 2019, Munich, Germany, September 15-20,
                  2019},
  pages        = {23--33},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/MODELS.2019.00-18},
  doi          = {10.1109/MODELS.2019.00-18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/models/PeldszusT0JS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Ahmadian0J19,
  author       = {Amir Shayan Ahmadian and
                  Daniel Str{\"{u}}ber and
                  Jan J{\"{u}}rjens},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {Privacy-enhanced system design modeling based on privacy features},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {1492--1499},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297431},
  doi          = {10.1145/3297280.3297431},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/Ahmadian0J19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/RamadanAJS019,
  author       = {Qusai Ramadan and
                  Amir Shayan Ahmadian and
                  Jan J{\"{u}}rjens and
                  Steffen Staab and
                  Daniel Str{\"{u}}ber},
  editor       = {Steffen Becker and
                  Ivan Bogicevic and
                  Georg Herzwurm and
                  Stefan Wagner},
  title        = {Explaining Algorithmic Decisions with respect to Fairness},
  booktitle    = {Software Engineering and Software Management, {SE/SWM} 2019, Stuttgart,
                  Germany, February 18-22, 2019},
  series       = {{LNI}},
  volume       = {{P-292}},
  pages        = {161--162},
  publisher    = {{GI}},
  year         = {2019},
  url          = {https://doi.org/10.18420/se2019-50},
  doi          = {10.18420/SE2019-50},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/se/RamadanAJS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/Burger00RJS19,
  author       = {Jens B{\"{u}}rger and
                  Daniel Str{\"{u}}ber and
                  Stefan G{\"{a}}rtner and
                  Thomas Ruhroth and
                  Jan J{\"{u}}rjens and
                  Kurt Schneider},
  editor       = {Steffen Becker and
                  Ivan Bogicevic and
                  Georg Herzwurm and
                  Stefan Wagner},
  title        = {A Framework for Semi-Automated Co-Evolution of Security Knowledge
                  and System Models (Summary)},
  booktitle    = {Software Engineering and Software Management, {SE/SWM} 2019, Stuttgart,
                  Germany, February 18-22, 2019},
  series       = {{LNI}},
  volume       = {{P-292}},
  pages        = {179--180},
  publisher    = {{GI}},
  year         = {2019},
  url          = {https://doi.org/10.18420/se2019-57},
  doi          = {10.18420/SE2019-57},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/se/Burger00RJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/JurjensSBV0GRHTKFLLH19,
  author       = {Jan J{\"{u}}rjens and
                  Kurt Schneider and
                  Jens B{\"{u}}rger and
                  Fabien Patrick Viertel and
                  Daniel Str{\"{u}}ber and
                  Michael Goedicke and
                  Ralf H. Reussner and
                  Robert Heinrich and
                  Emre Taspolatoglu and
                  Marco Konersmann and
                  Alexander Fay and
                  Winfried Lamersdorf and
                  Jan Ladiges and
                  Christopher Haubeck},
  editor       = {Ralf H. Reussner and
                  Michael Goedicke and
                  Wilhelm Hasselbring and
                  Birgit Vogel{-}Heuser and
                  Jan Keim and
                  Lukas M{\"{a}}rtin},
  title        = {Maintaining Security in Software Evolution},
  booktitle    = {Managed Software Evolution},
  pages        = {207--253},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-13499-0\_9},
  doi          = {10.1007/978-3-030-13499-0\_9},
  timestamp    = {Sat, 30 Sep 2023 09:32:41 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/JurjensSBV0GRHTKFLLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StewartJ18,
  author       = {Harrison Stewart and
                  Jan J{\"{u}}rjens},
  title        = {Data security and consumer trust in FinTech innovation in Germany},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {109--128},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-06-2017-0039},
  doi          = {10.1108/ICS-06-2017-0039},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StewartJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/BurgerSGRJS18,
  author       = {Jens B{\"{u}}rger and
                  Daniel Str{\"{u}}ber and
                  Stefan G{\"{a}}rtner and
                  Thomas Ruhroth and
                  Jan J{\"{u}}rjens and
                  Kurt Schneider},
  title        = {A framework for semi-automated co-evolution of security knowledge
                  and system models},
  journal      = {J. Syst. Softw.},
  volume       = {139},
  pages        = {142--160},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jss.2018.02.003},
  doi          = {10.1016/J.JSS.2018.02.003},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/BurgerSGRJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wm/JurjensRH18,
  author       = {Jan J{\"{u}}rjens and
                  Stefan Ruf and
                  Nils Herda},
  title        = {Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen
                  ins digitale Zeitalter?},
  journal      = {Wirtschaftsinformatik Manag.},
  volume       = {10},
  number       = {3},
  pages        = {74--79},
  year         = {2018},
  url          = {https://doi.org/10.1007/s35764-018-0062-5},
  doi          = {10.1007/S35764-018-0062-5},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wm/JurjensRH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecmdafa/Ramadan0SRJ18,
  author       = {Qusai Ramadan and
                  Daniel Str{\"{u}}ber and
                  Mattia Salnitri and
                  Volker Riediger and
                  Jan J{\"{u}}rjens},
  editor       = {Alfonso Pierantonio and
                  Salvador Trujillo},
  title        = {Detecting Conflicts Between Data-Minimization and Security Requirements
                  in Business Process Models},
  booktitle    = {Modelling Foundations and Applications - 14th European Conference,
                  ECMFA@STAF 2018, Toulouse, France, June 26-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10890},
  pages        = {179--198},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-92997-2\_12},
  doi          = {10.1007/978-3-319-92997-2\_12},
  timestamp    = {Fri, 20 Nov 2020 13:15:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ecmdafa/Ramadan0SRJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fase/0001PJ18,
  author       = {Daniel Str{\"{u}}ber and
                  Sven Peldszus and
                  Jan J{\"{u}}rjens},
  editor       = {Alessandra Russo and
                  Andy Sch{\"{u}}rr},
  title        = {Taming Multi-Variability of Software Product Line Transformations},
  booktitle    = {Fundamental Approaches to Software Engineering, 21st International
                  Conference, {FASE} 2018, Held as Part of the European Joint Conferences
                  on Theory and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece,
                  April 14-20, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10802},
  pages        = {337--355},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89363-1\_19},
  doi          = {10.1007/978-3-319-89363-1\_19},
  timestamp    = {Fri, 31 Jan 2020 21:32:22 +0100},
  biburl       = {https://dblp.org/rec/conf/fase/0001PJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpce/Peldszus0J18,
  author       = {Sven Peldszus and
                  Daniel Str{\"{u}}ber and
                  Jan J{\"{u}}rjens},
  editor       = {Eric Van Wyk and
                  Tiark Rompf},
  title        = {Model-based security analysis of feature-oriented software product
                  lines},
  booktitle    = {Proceedings of the 17th {ACM} {SIGPLAN} International Conference on
                  Generative Programming: Concepts and Experiences, {GPCE} 2018, Boston,
                  MA, USA, November 5-6, 2018},
  pages        = {93--106},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3278122.3278126},
  doi          = {10.1145/3278122.3278126},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gpce/Peldszus0J18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/RamadanA0JS18,
  author       = {Qusai Ramadan and
                  Amir Shayan Ahmadian and
                  Daniel Str{\"{u}}ber and
                  Jan J{\"{u}}rjens and
                  Steffen Staab},
  editor       = {Yuriy Brun and
                  Brittany Johnson and
                  Alexandra Meliou},
  title        = {Model-based discrimination analysis: a position paper},
  booktitle    = {Proceedings of the International Workshop on Software Fairness, FairWare@ICSE
                  2018, Gothenburg, Sweden, May 29, 2018},
  pages        = {22--28},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3194770.3194775},
  doi          = {10.1145/3194770.3194775},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/RamadanA0JS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/AhmadianJ018,
  author       = {Amir Shayan Ahmadian and
                  Jan J{\"{u}}rjens and
                  Daniel Str{\"{u}}ber},
  editor       = {Hisham M. Haddad and
                  Roger L. Wainwright and
                  Richard Chbeir},
  title        = {Extending model-based privacy analysis for the industrial data space
                  by exploiting privacy level agreements},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing,
                  {SAC} 2018, Pau, France, April 09-13, 2018},
  pages        = {1142--1149},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167132.3167256},
  doi          = {10.1145/3167132.3167256},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/AhmadianJ018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Ahmadian0RJ18,
  author       = {Amir Shayan Ahmadian and
                  Daniel Str{\"{u}}ber and
                  Volker Riediger and
                  Jan J{\"{u}}rjens},
  editor       = {Hisham M. Haddad and
                  Roger L. Wainwright and
                  Richard Chbeir},
  title        = {Supporting privacy impact assessment by model-based privacy analysis},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing,
                  {SAC} 2018, Pau, France, April 09-13, 2018},
  pages        = {1467--1474},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167132.3167288},
  doi          = {10.1145/3167132.3167288},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/Ahmadian0RJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/RamadanS0JG18,
  author       = {Qusai Ramadan and
                  Mattia Salnitri and
                  Daniel Str{\"{u}}ber and
                  Jan J{\"{u}}rjens and
                  Paolo Giorgini},
  editor       = {Matthias Tichy and
                  Eric Bodden and
                  Marco Kuhrmann and
                  Stefan Wagner and
                  Jan{-}Philipp Stegh{\"{o}}fer},
  title        = {Integrating {BPMN-} and UML-based Security Engineering via Model Transformation},
  booktitle    = {Software Engineering und Software Management 2018, Fachtagung des
                  GI-Fachbereichs Softwaretechnik, {SE} 2018, 5.-9. M{\"{a}}rz
                  2018, Ulm, Germany},
  series       = {{LNI}},
  volume       = {{P-279}},
  pages        = {63--64},
  publisher    = {Gesellschaft f{\"{u}}r Informatik},
  year         = {2018},
  url          = {https://dl.gi.de/handle/20.500.12116/16320},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/se/RamadanS0JG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/JurjensF18,
  author       = {Jan J{\"{u}}rjens and
                  Eduardo B. Fern{\'{a}}ndez},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Secure Database Development},
  booktitle    = {Encyclopedia of Database Systems, Second Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4614-8265-9\_329},
  doi          = {10.1007/978-1-4614-8265-9\_329},
  timestamp    = {Thu, 14 Feb 2019 09:43:36 +0100},
  biburl       = {https://dblp.org/rec/reference/db/JurjensF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/AhammedSRJ17,
  author       = {Sakib Ahammed and
                  Muhammad Sheikh Sadi and
                  Md Shamimur Rahman and
                  Jan J{\"{u}}rjens},
  title        = {Soft error tolerance using {HVDQ} (Horizontal-Vertical-Diagonal-Queen
                  parity method)},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {32},
  number       = {1},
  year         = {2017},
  timestamp    = {Wed, 15 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/AhammedSRJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StewartJ17,
  author       = {Harrison Stewart and
                  Jan J{\"{u}}rjens},
  title        = {Information security management and the human aspect in organizations},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {494--534},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-07-2016-0054},
  doi          = {10.1108/ICS-07-2016-0054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StewartJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/DiamantopoulouA17,
  author       = {Vasiliki Diamantopoulou and
                  Konstantinos Angelopoulos and
                  Julian Flake and
                  Andrea Praitano and
                  Jos{\'{e}} Fran. Ruiz and
                  Jan J{\"{u}}rjens and
                  Michalis Pavlidis and
                  Dimitri Bonutto and
                  Andr{\`{e}}s Castillo Sanz and
                  Haralambos Mouratidis and
                  Javier Garcia{-}Robles and
                  Alberto Eugenio Tozzi},
  editor       = {Erich Schweighofer and
                  Herbert Leitold and
                  Andreas Mitrakas and
                  Kai Rannenberg},
  title        = {Privacy Data Management and Awareness for Public Administrations:
                  {A} Case Study from the Healthcare Domain},
  booktitle    = {Privacy Technologies and Policy - 5th Annual Privacy Forum, {APF}
                  2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10518},
  pages        = {192--209},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67280-9\_11},
  doi          = {10.1007/978-3-319-67280-9\_11},
  timestamp    = {Thu, 05 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apf/DiamantopoulouA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecmdafa/AhmadianSRJ17,
  author       = {Amir Shayan Ahmadian and
                  Daniel Str{\"{u}}ber and
                  Volker Riediger and
                  Jan J{\"{u}}rjens},
  editor       = {Anthony Anjorin and
                  Hu{\'{a}}scar Espinoza},
  title        = {Model-Based Privacy Analysis in Industrial Ecosystems},
  booktitle    = {Modelling Foundations and Applications - 13th European Conference,
                  ECMFA@STAF 2017, Marburg, Germany, July 19-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10376},
  pages        = {215--231},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61482-3\_13},
  doi          = {10.1007/978-3-319-61482-3\_13},
  timestamp    = {Fri, 20 Nov 2020 13:14:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ecmdafa/AhmadianSRJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/RamadanS0JG17,
  author       = {Qusai Ramadan and
                  Mattia Salnitri and
                  Daniel Str{\"{u}}ber and
                  Jan J{\"{u}}rjens and
                  Paolo Giorgini},
  title        = {From Secure Business Process Modeling to Design-Level Security Verification},
  booktitle    = {20th {ACM/IEEE} International Conference on Model Driven Engineering
                  Languages and Systems, {MODELS} 2017, Austin, TX, USA, September 17-22,
                  2017},
  pages        = {123--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MODELS.2017.10},
  doi          = {10.1109/MODELS.2017.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/models/RamadanS0JG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/AhmadianPRJ17,
  author       = {Amir Shayan Ahmadian and
                  Sven Peldszus and
                  Qusai Ramadan and
                  Jan J{\"{u}}rjens},
  editor       = {Eric Bodden and
                  Wilhelm Sch{\"{a}}fer and
                  Arie van Deursen and
                  Andrea Zisman},
  title        = {Model-based privacy and security analysis with CARiSMA},
  booktitle    = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
  pages        = {989--993},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3106237.3122823},
  doi          = {10.1145/3106237.3122823},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/AhmadianPRJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/se/2017,
  editor       = {Jan J{\"{u}}rjens and
                  Kurt Schneider},
  title        = {Software Engineering 2017, Fachtagung des GI-Fachbereichs Softwaretechnik,
                  21.-24. Februar 2017, Hannover, Deutschland},
  series       = {{LNI}},
  volume       = {{P-267}},
  publisher    = {{GI}},
  year         = {2017},
  url          = {https://dl.gi.de/handle/20.500.12116/19973},
  isbn         = {978-3-88579-661-9},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/se/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-05019,
  author       = {Stefan Wagner and
                  Jan J{\"{u}}rjens and
                  Claudia Koller and
                  Peter Trischberger},
  title        = {Comparing Bug Finding Tools with Reviews and Tests},
  journal      = {CoRR},
  volume       = {abs/1711.05019},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.05019},
  eprinttype    = {arXiv},
  eprint       = {1711.05019},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-05019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/AhmadianJ16,
  author       = {Amir Shayan Ahmadian and
                  Jan J{\"{u}}rjens},
  title        = {Supporting Model-Based Privacy Analysis by Exploiting Privacy Level
                  Agreements},
  booktitle    = {2016 {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2016, Luxembourg, December 12-15, 2016},
  pages        = {360--365},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CloudCom.2016.0063},
  doi          = {10.1109/CLOUDCOM.2016.0063},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/AhmadianJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/PapeFBJ16,
  author       = {Sebastian Pape and
                  Julian Flake and
                  Andreas Beckmann and
                  Jan J{\"{u}}rjens},
  editor       = {Laura K. Dillon and
                  Willem Visser and
                  Laurie A. Williams},
  title        = {{STAGE:} a software tool for automatic grading of testing exercises:
                  case study paper},
  booktitle    = {Proceedings of the 38th International Conference on Software Engineering,
                  {ICSE} 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume},
  pages        = {491--500},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2889160.2889203},
  doi          = {10.1145/2889160.2889203},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/PapeFBJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/WenzelPJO16,
  author       = {Sven Wenzel and
                  Daniel Poggenpohl and
                  Jan J{\"{u}}rjens and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Jens Knoop and
                  Uwe Zdun},
  title        = {Umlchange - specifying model changes to support security verification
                  of potential evolution},
  booktitle    = {Software Engineering 2016, Fachtagung des GI-Fachbereichs Softwaretechnik,
                  23.-26. Februar 2016, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-252}},
  pages        = {91--92},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/738},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/se/WenzelPJO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/RosadoLJ15,
  author       = {David Garcia Rosado and
                  Nadira Lammari and
                  Jan J{\"{u}}rjens},
  title        = {Special Issue on Secure Information Systems Engineering},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2193--2194},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxv020},
  doi          = {10.1093/COMJNL/BXV020},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/RosadoLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/HeinrichGHRRSPJ15,
  author       = {Robert Heinrich and
                  Stefan G{\"{a}}rtner and
                  Tom{-}Michael Hesse and
                  Thomas Ruhroth and
                  Ralf H. Reussner and
                  Kurt Schneider and
                  Barbara Paech and
                  Jan J{\"{u}}rjens},
  title        = {The CoCoME Platform: {A} Research Note on Empirical Studies in Information
                  System Evolution},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {25},
  number       = {9-10},
  pages        = {1715--1720},
  year         = {2015},
  url          = {https://doi.org/10.1142/S0218194015710059},
  doi          = {10.1142/S0218194015710059},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/HeinrichGHRRSPJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/BurgerJW15,
  author       = {Jens B{\"{u}}rger and
                  Jan J{\"{u}}rjens and
                  Sven Wenzel},
  title        = {Restoring security of evolving software models using graph transformation},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {17},
  number       = {3},
  pages        = {267--289},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10009-014-0364-8},
  doi          = {10.1007/S10009-014-0364-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/BurgerJW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmsd/AhmadianCJ15,
  author       = {Amir Shayan Ahmadian and
                  Fabian Coerschulte and
                  Jan J{\"{u}}rjens},
  editor       = {Boris Shishkov},
  title        = {Supporting the Security Certification and Privacy Level Agreements
                  in the Context of Clouds},
  booktitle    = {Business Modeling and Software Design - 5th International Symposium,
                  {BMSD} 2015, Milan, Italy, July 6-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {257},
  pages        = {80--95},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-40512-4\_5},
  doi          = {10.1007/978-3-319-40512-4\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bmsd/AhmadianCJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/BurgerGRZJS15,
  author       = {Jens B{\"{u}}rger and
                  Stefan G{\"{a}}rtner and
                  Thomas Ruhroth and
                  Johannes Zweihoff and
                  Jan J{\"{u}}rjens and
                  Kurt Schneider},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Restoring Security of Long-Living Systems by Co-evolution},
  booktitle    = {39th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2015, Taichung, Taiwan, July 1-5, 2015. Volume 2},
  pages        = {153--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.72},
  doi          = {10.1109/COMPSAC.2015.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/BurgerGRZJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ApfelbeckFJZ15,
  author       = {Chris Apfelbeck and
                  Martin Fritz and
                  Jan J{\"{u}}rjens and
                  Johannes Zweihoff},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Preserving Validity of Batch-Job Nets under Change at Run-Time},
  booktitle    = {39th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2015, Taichung, Taiwan, July 1-5, 2015. Volume 2},
  pages        = {169--178},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.100},
  doi          = {10.1109/COMPSAC.2015.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ApfelbeckFJZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/modelsward/JurjensA15,
  author       = {Jan J{\"{u}}rjens and
                  Amir Shayan Ahmadian},
  editor       = {Slimane Hammoudi and
                  Lu{\'{\i}}s Ferreira Pires and
                  Philippe Desfray and
                  Joaquim Filipe},
  title        = {Model-based Security Analysis and Applications to Security Economics},
  booktitle    = {{MODELSWARD} 2015 - Proceedings of the 3rd International Conference
                  on Model-Driven Engineering and Software Development, ESEO, Angers,
                  Loire Valley, France, 9-11 February, 2015},
  pages        = {674--677},
  publisher    = {SciTePress},
  year         = {2015},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/modelsward/JurjensA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/GartnerRBSJ15,
  author       = {Stefan G{\"{a}}rtner and
                  Thomas Ruhroth and
                  Jens B{\"{u}}rger and
                  Kurt Schneider and
                  Jan J{\"{u}}rjens},
  editor       = {Uwe A{\ss}mann and
                  Birgit Demuth and
                  Thorsten Spitta and
                  Georg P{\"{u}}schel and
                  Ronny Kaiser},
  title        = {Towards Maintaining Long-Living Information Systems by Incorporating
                  Security Knowledge},
  booktitle    = {Software Engineering {\&} Management 2015, Multikonferenz der
                  GI-Fachbereiche Softwaretechnik {(SWT)} und Wirtschaftsinformatik
                  (WI), {FA} WI-MAW, 17. M{\"{a}}rz - 20. M{\"{a}}rz 2015,
                  Dresden, Germany},
  series       = {{LNI}},
  volume       = {{P-239}},
  pages        = {83--84},
  publisher    = {{GI}},
  year         = {2015},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/se/GartnerRBSJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/HeinrichGHRRSPJ15,
  author       = {Robert Heinrich and
                  Stefan G{\"{a}}rtner and
                  Tom{-}Michael Hesse and
                  Thomas Ruhroth and
                  Ralf H. Reussner and
                  Kurt Schneider and
                  Barbara Paech and
                  Jan J{\"{u}}rjens},
  editor       = {Haiping Xu},
  title        = {A Platform for Empirical Research on Information System Evolution},
  booktitle    = {The 27th International Conference on Software Engineering and Knowledge
                  Engineering, {SEKE} 2015, Wyndham Pittsburgh University Center, Pittsburgh,
                  PA, USA, July 6-8, 2015},
  pages        = {415--420},
  publisher    = {{KSI} Research Inc. and Knowledge Systems Institute Graduate School},
  year         = {2015},
  url          = {https://doi.org/10.18293/SEKE2015-66},
  doi          = {10.18293/SEKE2015-66},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seke/HeinrichGHRRSPJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/BlancoRSJ14,
  author       = {Carlos Blanco and
                  David Garcia Rosado and
                  Luis Enrique S{\'{a}}nchez and
                  Jan J{\"{u}}rjens},
  title        = {Security in information systems: Advances and new challenges},
  journal      = {Comput. Stand. Interfaces},
  volume       = {36},
  number       = {4},
  pages        = {687--688},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.csi.2013.12.003},
  doi          = {10.1016/J.CSI.2013.12.003},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/BlancoRSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/WenzelPJO14,
  author       = {Sven Wenzel and
                  Daniel Poggenpohl and
                  Jan J{\"{u}}rjens and
                  Mart{\'{\i}}n Ochoa},
  title        = {Specifying model changes with UMLchange to support security verification
                  of potential evolution},
  journal      = {Comput. Stand. Interfaces},
  volume       = {36},
  number       = {4},
  pages        = {776--791},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.csi.2013.12.011},
  doi          = {10.1016/J.CSI.2013.12.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/WenzelPJO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/FeldererKKJOPTT14,
  author       = {Michael Felderer and
                  Basel Katt and
                  Philipp Kalb and
                  Jan J{\"{u}}rjens and
                  Mart{\'{\i}}n Ochoa and
                  Federica Paci and
                  Le Minh Sang Tran and
                  Thein Than Tun and
                  Koen Yskout and
                  Riccardo Scandariato and
                  Frank Piessens and
                  Dries Vanoverberghe and
                  Elizabeta Fourneret and
                  Matthias Gander and
                  Bj{\o}rnar Solhaug and
                  Ruth Breu},
  title        = {Evolution of Security Engineering Artifacts: {A} State of the Art
                  Survey},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {4},
  pages        = {48--98},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014100103},
  doi          = {10.4018/IJSSE.2014100103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/FeldererKKJOPTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DupressoirGJN14,
  author       = {Fran{\c{c}}ois Dupressoir and
                  Andrew D. Gordon and
                  Jan J{\"{u}}rjens and
                  David A. Naumann},
  title        = {Guiding a general-purpose {C} verifier to prove cryptographic protocols},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {823--866},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140508},
  doi          = {10.3233/JCS-140508},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DupressoirGJN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stt/RuhrothGBJS14,
  author       = {Thomas Ruhroth and
                  Stefan G{\"{a}}rtner and
                  Jens B{\"{u}}rger and
                  Jan J{\"{u}}rjens and
                  Kurt Schneider},
  title        = {Versioning and Evolution Requirements for Model-Based System Development},
  journal      = {Softwaretechnik-Trends},
  volume       = {34},
  number       = {2},
  year         = {2014},
  url          = {http://pi.informatik.uni-siegen.de/stt/34\_2/01\_Fachgruppenberichte/CVSM2014/RuhrothCVSM2014.pdf},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/stt/RuhrothGBJS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/profes/RuhrothGBJS14,
  author       = {Thomas Ruhroth and
                  Stefan G{\"{a}}rtner and
                  Jens B{\"{u}}rger and
                  Jan J{\"{u}}rjens and
                  Kurt Schneider},
  editor       = {Andreas Jedlitschka and
                  Pasi Kuvaja and
                  Marco Kuhrmann and
                  Tomi M{\"{a}}nnist{\"{o}} and
                  J{\"{u}}rgen M{\"{u}}nch and
                  Mikko Raatikainen},
  title        = {Towards Adaptation and Evolution of Domain-Specific Knowledge for
                  Maintaining Secure Systems},
  booktitle    = {Product-Focused Software Process Improvement - 15th International
                  Conference, {PROFES} 2014, Helsinki, Finland, December 10-12, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8892},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13835-0\_17},
  doi          = {10.1007/978-3-319-13835-0\_17},
  timestamp    = {Mon, 03 Jan 2022 22:29:18 +0100},
  biburl       = {https://dblp.org/rec/conf/profes/RuhrothGBJS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GartnerRBSJ14,
  author       = {Stefan G{\"{a}}rtner and
                  Thomas Ruhroth and
                  Jens B{\"{u}}rger and
                  Kurt Schneider and
                  Jan J{\"{u}}rjens},
  editor       = {Tony Gorschek and
                  Robyn R. Lutz},
  title        = {Maintaining requirements for long-living software systems by incorporating
                  security knowledge},
  booktitle    = {{IEEE} 22nd International Requirements Engineering Conference, {RE}
                  2014, Karlskrona, Sweden, August 25-29, 2014},
  pages        = {103--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/RE.2014.6912252},
  doi          = {10.1109/RE.2014.6912252},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/GartnerRBSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/GartnerBSJ14,
  author       = {Stefan G{\"{a}}rtner and
                  Jens B{\"{u}}rger and
                  Kurt Schneider and
                  Jan J{\"{u}}rjens},
  editor       = {Klaus Schmid and
                  Wolfgang B{\"{o}}hm and
                  Robert Heinrich and
                  Andrea Herrmann and
                  Anne Hoffmann and
                  Dieter Landes and
                  Marco Konersmann and
                  Thomas Ruhroth and
                  Oliver Sander and
                  Volker Stolz and
                  Baltasar Tranc{\'{o}}n y Widemann and
                  R{\"{u}}diger Wei{\ss}bach},
  title        = {Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem
                  Wissen},
  booktitle    = {Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering
                  2014, 25.-26. Februar 2014 in Kiel, Deutschland},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1129},
  pages        = {6--7},
  publisher    = {CEUR-WS.org},
  year         = {2014},
  url          = {https://ceur-ws.org/Vol-1129/paper13.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:19 +0100},
  biburl       = {https://dblp.org/rec/conf/se/GartnerBSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/JurjensS14,
  author       = {Jan J{\"{u}}rjens and
                  Kurt Schneider},
  editor       = {Wilhelm Hasselbring and
                  Nils Christian Ehmke},
  title        = {The SecReq approach: From Security Requirements to Secure Design while
                  Managing Software Evolution},
  booktitle    = {Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik,
                  25. Februar - 28. Februar 2014, Kiel, Germany},
  series       = {{LNI}},
  volume       = {{P-227}},
  pages        = {89--90},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/30975},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/se/JurjensS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/essos/2014,
  editor       = {Jan J{\"{u}}rjens and
                  Frank Piessens and
                  Nataliia Bielova},
  title        = {Engineering Secure Software and Systems - 6th International Symposium,
                  ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8364},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04897-0},
  doi          = {10.1007/978-3-319-04897-0},
  isbn         = {978-3-319-04896-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sis/2014,
  editor       = {David Garcia Rosado and
                  Carlos Blanco and
                  Daniel Mellado and
                  Jan J{\"{u}}rjens and
                  Luis Enrique S{\'{a}}nchez},
  title        = {{WOSIS} 2014 - Proceedings of the 11th International Workshop on Security
                  in Information Systems, Lisbon, Portugal, 27 April, 2014},
  publisher    = {SciTePress},
  year         = {2014},
  isbn         = {978-989-758-031-4},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sis/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JurjensFFRH14,
  author       = {Jan J{\"{u}}rjens and
                  Eduardo B. Fern{\'{a}}ndez and
                  Robert B. France and
                  Bernhard Rumpe and
                  Constance L. Heitmeyer},
  title        = {Critical Systems Development Using Modeling Languages. {(CSDUML-04):}
                  Current Developments and Future Challenges (Report on the Third International
                  Workshop)},
  journal      = {CoRR},
  volume       = {abs/1409.6608},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.6608},
  eprinttype    = {arXiv},
  eprint       = {1409.6608},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JurjensFFRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TaubenbergerJYN13,
  author       = {Stefan Taubenberger and
                  Jan J{\"{u}}rjens and
                  Yijun Yu and
                  Bashar Nuseibeh},
  title        = {Resolving vulnerability identification errors using security requirements
                  on business process models},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {202--223},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-09-2012-0054},
  doi          = {10.1108/IMCS-09-2012-0054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TaubenbergerJYN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/HumbergWPWRJ13a,
  author       = {Thorsten Humberg and
                  Christian Wessel and
                  Daniel Poggenpohl and
                  Sven Wenzel and
                  Thomas Ruhroth and
                  Jan J{\"{u}}rjens},
  editor       = {Markus Helfert and
                  Fr{\'{e}}d{\'{e}}ric Desprez and
                  Donald Ferguson and
                  Frank Leymann},
  title        = {Using Ontologies to Analyze Compliance Requirements of Cloud-Based
                  Processes},
  booktitle    = {Cloud Computing and Services Science - Third International Conference,
                  {CLOSER} 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {453},
  pages        = {36--51},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-11561-0\_3},
  doi          = {10.1007/978-3-319-11561-0\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/HumbergWPWRJ13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/HumbergWPWRJ13,
  author       = {Thorsten Humberg and
                  Christian Wessel and
                  Daniel Poggenpohl and
                  Sven Wenzel and
                  Thomas Ruhroth and
                  Jan J{\"{u}}rjens},
  editor       = {Fr{\'{e}}d{\'{e}}ric Desprez and
                  Donald Ferguson and
                  Ethan Hadar and
                  Frank Leymann and
                  Matthias Jarke and
                  Markus Helfert},
  title        = {Ontology-based Analysis of Compliance and Regulatory Requirements
                  of Business Processes},
  booktitle    = {{CLOSER} 2013 - Proceedings of the 3rd International Conference on
                  Cloud Computing and Services Science, Aachen, Germany, 8-10 May, 2013},
  pages        = {553--561},
  publisher    = {SciTePress},
  year         = {2013},
  timestamp    = {Wed, 29 Mar 2017 16:45:24 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/HumbergWPWRJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/BurgerJRGS13,
  author       = {Jens B{\"{u}}rger and
                  Jan J{\"{u}}rjens and
                  Thomas Ruhroth and
                  Stefan G{\"{a}}rtner and
                  Kurt Schneider},
  editor       = {Alessandro Aldini and
                  Javier L{\'{o}}pez and
                  Fabio Martinelli},
  title        = {Model-Based Security Engineering: Managed Co-evolution of Security
                  Knowledge and Software Models},
  booktitle    = {Foundations of Security Analysis and Design {VII} - {FOSAD} 2012/2013
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {8604},
  pages        = {34--53},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-10082-1\_2},
  doi          = {10.1007/978-3-319-10082-1\_2},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/BurgerJRGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/essos/2013,
  editor       = {Jan J{\"{u}}rjens and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {Engineering Secure Software and Systems - 5th International Symposium,
                  ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7781},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36563-8},
  doi          = {10.1007/978-3-642-36563-8},
  isbn         = {978-3-642-36562-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DupressoirGJN13,
  author       = {Fran{\c{c}}ois Dupressoir and
                  Andrew D. Gordon and
                  Jan J{\"{u}}rjens and
                  David A. Naumann},
  title        = {Guiding a General-Purpose {C} Verifier to Prove Cryptographic Protocols},
  journal      = {CoRR},
  volume       = {abs/1312.6532},
  year         = {2013},
  url          = {http://arxiv.org/abs/1312.6532},
  eprinttype    = {arXiv},
  eprint       = {1312.6532},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/DupressoirGJN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/RosadoSFJ12,
  author       = {David Garcia Rosado and
                  Luis Enrique S{\'{a}}nchez and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Jan J{\"{u}}rjens},
  title        = {Security in Information Systems: New Challenges and Opportunities},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {18},
  number       = {6},
  pages        = {728--731},
  year         = {2012},
  url          = {http://www.jucs.org/jucs\_18\_6/security\_in\_information\_systems},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/RosadoSFJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/SchneiderKHIJ12,
  author       = {Kurt Schneider and
                  Eric Knauss and
                  Siv Hilde Houmb and
                  Shareeful Islam and
                  Jan J{\"{u}}rjens},
  title        = {Enhancing security requirements engineering by organizational learning},
  journal      = {Requir. Eng.},
  volume       = {17},
  number       = {1},
  pages        = {35--56},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00766-011-0141-0},
  doi          = {10.1007/S00766-011-0141-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/SchneiderKHIJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AizatulinGJ12,
  author       = {Mihhail Aizatulin and
                  Andrew D. Gordon and
                  Jan J{\"{u}}rjens},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Computational verification of {C} protocol implementations by symbolic
                  execution},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {712--723},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382271},
  doi          = {10.1145/2382196.2382271},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AizatulinGJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/WenzelWHJ12,
  author       = {Sven Wenzel and
                  Christian Wessel and
                  Thorsten Humberg and
                  Jan J{\"{u}}rjens},
  editor       = {Frank Leymann and
                  Ivan I. Ivanov and
                  Marten van Sinderen and
                  Tony Shan},
  title        = {Securing Processes for Outsourcing into the Cloud},
  booktitle    = {{CLOSER} 2012 - Proceedings of the 2nd International Conference on
                  Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April,
                  2012},
  pages        = {675--680},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Wed, 29 Mar 2017 16:45:24 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/WenzelWHJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/OchoaJW12,
  author       = {Mart{\'{\i}}n Ochoa and
                  Jan J{\"{u}}rjens and
                  Daniel Warzecha},
  editor       = {Gilles Barthe and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {A Sound Decision Procedure for the Compositionality of Secrecy},
  booktitle    = {Engineering Secure Software and Systems - 4th International Symposium,
                  ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7159},
  pages        = {97--105},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28166-2\_10},
  doi          = {10.1007/978-3-642-28166-2\_10},
  timestamp    = {Sat, 19 Oct 2019 20:24:21 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/OchoaJW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/RuhrothJ12,
  author       = {Thomas Ruhroth and
                  Jan J{\"{u}}rjens},
  title        = {Supporting Security Assurance in the Context of Evolution: Modular
                  Modeling and Analysis with UMLsec},
  booktitle    = {14th International {IEEE} Symposium on High-Assurance Systems Engineering,
                  {HASE} 2012, Omaha, NE, USA, October 25-27, 2012},
  pages        = {177--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HASE.2012.35},
  doi          = {10.1109/HASE.2012.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/RuhrothJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/WesselHWJ12,
  author       = {Christian Wessel and
                  Thorsten Humberg and
                  Sven Wenzel and
                  Jan J{\"{u}}rjens},
  editor       = {Stefan J{\"{a}}hnichen and
                  Bernhard Rumpe and
                  Holger Schlingloff},
  title        = {Fr{\"{u}}hzeitige modellbasierte Risikoanalyse f{\"{u}}r
                  mobile, verteilte Anwendungen},
  booktitle    = {Software Engineering 2012 - Workshopband, Fachtagung des GI-Fachbereichs
                  Softwaretechnik, 27. Februar - 2. M{\"{a}}rz 2012 in Berlin},
  series       = {{LNI}},
  volume       = {{P-199}},
  pages        = {175--181},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18372},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/se/WesselHWJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tools/OchoaJC12,
  author       = {Mart{\'{\i}}n Ochoa and
                  Jan J{\"{u}}rjens and
                  Jorge Cu{\'{e}}llar},
  editor       = {Carlo A. Furia and
                  Sebastian Nanz},
  title        = {Non-interference on {UML} State-Charts},
  booktitle    = {Objects, Models, Components, Patterns - 50th International Conference,
                  {TOOLS} 2012, Prague, Czech Republic, May 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7304},
  pages        = {219--235},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30561-0\_16},
  doi          = {10.1007/978-3-642-30561-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/tools/OchoaJC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BauerJY11,
  author       = {Andreas Bauer and
                  Jan J{\"{u}}rjens and
                  Yijun Yu},
  title        = {Run-Time Security Traceability for Evolving Systems},
  journal      = {Comput. J.},
  volume       = {54},
  number       = {1},
  pages        = {58--87},
  year         = {2011},
  url          = {https://doi.org/10.1093/comjnl/bxq042},
  doi          = {10.1093/COMJNL/BXQ042},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/BauerJY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/IslamMJ11,
  author       = {Shareeful Islam and
                  Haralambos Mouratidis and
                  Jan J{\"{u}}rjens},
  title        = {A framework to support alignment of secure software engineering with
                  legal regulations},
  journal      = {Softw. Syst. Model.},
  volume       = {10},
  number       = {3},
  pages        = {369--394},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10270-010-0154-z},
  doi          = {10.1007/S10270-010-0154-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/IslamMJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FourneretOBBJY11,
  author       = {Elizabeta Fourneret and
                  Mart{\'{\i}}n Ochoa and
                  Fabrice Bouquet and
                  Julien Botella and
                  Jan J{\"{u}}rjens and
                  Parvaneh Yousefi},
  title        = {Model-Based Security Verification and Testing for Smart-cards},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {272--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.46},
  doi          = {10.1109/ARES.2011.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FourneretOBBJY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/SchmidtJ11,
  author       = {Holger Schmidt and
                  Jan J{\"{u}}rjens},
  editor       = {Haralambos Mouratidis and
                  Colette Rolland},
  title        = {Connecting Security Requirements Analysis and Secure Design Using
                  Patterns and UMLsec},
  booktitle    = {Advanced Information Systems Engineering - 23rd International Conference,
                  CAiSE 2011, London, UK, June 20-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6741},
  pages        = {367--382},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21640-4\_28},
  doi          = {10.1007/978-3-642-21640-4\_28},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/SchmidtJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AizatulinGJ11,
  author       = {Mihhail Aizatulin and
                  Andrew D. Gordon and
                  Jan J{\"{u}}rjens},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Extracting and verifying cryptographic models from {C} protocol code
                  by symbolic execution},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {331--340},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046745},
  doi          = {10.1145/2046707.2046745},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AizatulinGJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DupressoirGJN11,
  author       = {Fran{\c{c}}ois Dupressoir and
                  Andrew D. Gordon and
                  Jan J{\"{u}}rjens and
                  David A. Naumann},
  title        = {Guiding a General-Purpose {C} Verifier to Prove Cryptographic Protocols},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.8},
  doi          = {10.1109/CSF.2011.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DupressoirGJN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecmdafa/JurjensMOS11,
  author       = {Jan J{\"{u}}rjens and
                  Lo{\"{\i}}c Marchal and
                  Mart{\'{\i}}n Ochoa and
                  Holger Schmidt},
  editor       = {Robert B. France and
                  Jochen Malte K{\"{u}}ster and
                  Behzad Bordbar and
                  Richard F. Paige},
  title        = {Incremental Security Verification for Evolving UMLsec models},
  booktitle    = {Modelling Foundations and Applications - 7th European Conference,
                  {ECMFA} 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6698},
  pages        = {52--68},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21470-7\_5},
  doi          = {10.1007/978-3-642-21470-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ecmdafa/JurjensMOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fase/HateburHJS11,
  author       = {Denis Hatebur and
                  Maritta Heisel and
                  Jan J{\"{u}}rjens and
                  Holger Schmidt},
  editor       = {Dimitra Giannakopoulou and
                  Fernando Orejas},
  title        = {Systematic Development of UMLsec Design Models Based on Security Requirements},
  booktitle    = {Fundamental Approaches to Software Engineering - 14th International
                  Conference, {FASE} 2011, Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2011, Saarbr{\"{u}}cken,
                  Germany, March 26-April 3, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6603},
  pages        = {232--246},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19811-3\_17},
  doi          = {10.1007/978-3-642-19811-3\_17},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fase/HateburHJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Jurjens11,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Richard N. Taylor and
                  Harald C. Gall and
                  Nenad Medvidovic},
  title        = {Automated security hardening for evolving {UML} models},
  booktitle    = {Proceedings of the 33rd International Conference on Software Engineering,
                  {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011},
  pages        = {986--988},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1985793.1985968},
  doi          = {10.1145/1985793.1985968},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/Jurjens11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeMJ11,
  author       = {Seok{-}Won Lee and
                  Mattia Monga and
                  Jan J{\"{u}}rjens},
  editor       = {Richard N. Taylor and
                  Harald C. Gall and
                  Nenad Medvidovic},
  title        = {Seventh international workshop on software engineering for secure
                  systems: {(SESS} 2011)},
  booktitle    = {Proceedings of the 33rd International Conference on Software Engineering,
                  {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011},
  pages        = {1200--1201},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1985793.1986045},
  doi          = {10.1145/1985793.1986045},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/LeeMJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/AizatulinDGJ11,
  author       = {Mihhail Aizatulin and
                  Fran{\c{c}}ois Dupressoir and
                  Andrew D. Gordon and
                  Jan J{\"{u}}rjens},
  editor       = {Gilles Barthe and
                  Anupam Datta and
                  Sandro Etalle},
  title        = {Verifying Cryptographic Code in {C:} Some Experience and the Csec
                  Challenge},
  booktitle    = {Formal Aspects of Security and Trust - 8th International Workshop,
                  {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7140},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29420-4\_1},
  doi          = {10.1007/978-3-642-29420-4\_1},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/AizatulinDGJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/KnaussHSIJ11,
  author       = {Eric Knauss and
                  Siv Hilde Houmb and
                  Kurt Schneider and
                  Shareeful Islam and
                  Jan J{\"{u}}rjens},
  editor       = {Daniel M. Berry and
                  Xavier Franch},
  title        = {Supporting Requirements Engineers in Recognising Security Issues},
  booktitle    = {Requirements Engineering: Foundation for Software Quality - 17th International
                  Working Conference, {REFSQ} 2011, Essen, Germany, March 28-30, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6606},
  pages        = {4--18},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19858-8\_2},
  doi          = {10.1007/978-3-642-19858-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/refsq/KnaussHSIJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TaubenbergerJYN11,
  author       = {Stefan Taubenberger and
                  Jan J{\"{u}}rjens and
                  Yijun Yu and
                  Bashar Nuseibeh},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Yuko Murayama and
                  Armand Portmann and
                  Carlos Rieder},
  title        = {Problem Analysis of Traditional IT-Security Risk Assessment Methods
                  - An Experience Report from the Insurance and Auditing Domain},
  booktitle    = {Future Challenges in Security and Privacy for Academia and Industry
                  - 26th {IFIP} {TC} 11 International Information Security Conference,
                  {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {354},
  pages        = {259--270},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21424-0\_21},
  doi          = {10.1007/978-3-642-21424-0\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/TaubenbergerJYN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/servicewave/MassacciBFJLMMPPPSW11,
  author       = {Fabio Massacci and
                  Fabrice Bouquet and
                  Elizabeta Fourneret and
                  Jan J{\"{u}}rjens and
                  Mass Soldal Lund and
                  S{\'{e}}bastien Madel{\'{e}}nat and
                  Jan Tobias M{\"{u}}hlberg and
                  Federica Paci and
                  St{\'{e}}phane Paul and
                  Frank Piessens and
                  Bj{\o}rnar Solhaug and
                  Sven Wenzel},
  editor       = {Witold Abramowicz and
                  Ignacio Mart{\'{\i}}n Llorente and
                  Mike Surridge and
                  Andrea Zisman and
                  Julien Vayssi{\`{e}}re},
  title        = {Orchestrating Security and System Engineering for Evolving Systems
                  - (Invited Paper)},
  booktitle    = {Towards a Service-Based Internet - 4th European Conference, ServiceWave
                  2011, Poznan, Poland, October 26-28, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6994},
  pages        = {134--143},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24755-2\_12},
  doi          = {10.1007/978-3-642-24755-2\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/servicewave/MassacciBFJLMMPPPSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sfm/JurjensOSMHI11,
  author       = {Jan J{\"{u}}rjens and
                  Mart{\'{\i}}n Ochoa and
                  Holger Schmidt and
                  Lo{\"{\i}}c Marchal and
                  Siv Hilde Houmb and
                  Shareeful Islam},
  editor       = {Marco Bernardo and
                  Val{\'{e}}rie Issarny},
  title        = {Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications},
  booktitle    = {Formal Methods for Eternal Networked Software Systems - 11th International
                  School on Formal Methods for the Design of Computer, Communication
                  and Software Systems, {SFM} 2011, Bertinoro, Italy, June 13-18, 2011.
                  Advanced Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {6659},
  pages        = {504--526},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21455-4\_15},
  doi          = {10.1007/978-3-642-21455-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/sfm/JurjensOSMHI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2011sess,
  editor       = {Jan J{\"{u}}rjens and
                  Seok{-}Won Lee and
                  Mattia Monga},
  title        = {Proceedings of the 7th International Workshop on Software Engineering
                  for Secure Systems, {SESS} 2011, Waikiki, Honolulu, HI, USA, May 22,
                  2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {http://dl.acm.org/citation.cfm?id=1988630},
  isbn         = {978-1-4503-0581-5},
  timestamp    = {Thu, 13 Aug 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/2011sess.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sis/2011,
  editor       = {David Garcia Rosado and
                  Luis Enrique S{\'{a}}nchez and
                  Jan J{\"{u}}rjens},
  title        = {{WOSIS} 2011 - Proceedings of the 8th International Workshop on Security
                  in Information Systems, In conjunction with {ICEIS} 2011, Beijing,
                  China, 8-9 June, 2011},
  publisher    = {SciTePress},
  year         = {2011},
  isbn         = {978-989-8425-61-4},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sis/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-1017,
  author       = {Mihhail Aizatulin and
                  Andrew D. Gordon and
                  Jan J{\"{u}}rjens},
  title        = {Extracting and Verifying Cryptographic Models from {C} Protocol Code
                  by Symbolic Execution},
  journal      = {CoRR},
  volume       = {abs/1107.1017},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.1017},
  eprinttype    = {arXiv},
  eprint       = {1107.1017},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-1017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-3969,
  author       = {Muhammad Sheikh Sadi and
                  Md. Mizanur Rahman Khan and
                  Md. Nazim Uddin and
                  Jan J{\"{u}}rjens},
  title        = {An Efficient Approach towards Mitigating Soft Errors Risks},
  journal      = {CoRR},
  volume       = {abs/1110.3969},
  year         = {2011},
  url          = {http://arxiv.org/abs/1110.3969},
  eprinttype    = {arXiv},
  eprint       = {1110.3969},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1110-3969.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BauerJ10,
  author       = {Andreas Bauer and
                  Jan J{\"{u}}rjens},
  title        = {Runtime verification of cryptographic protocols},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {315--330},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.09.003},
  doi          = {10.1016/J.COSE.2009.09.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BauerJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/SadiMSJ10,
  author       = {Muhammad Sheikh Sadi and
                  D. G. Myers and
                  Cesar Ortega{-}Sanchez and
                  Jan J{\"{u}}rjens},
  title        = {Component criticality analysis to minimize soft errors risk},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {25},
  number       = {5},
  year         = {2010},
  timestamp    = {Mon, 15 Apr 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/SadiMSJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/MouratidisJ10,
  author       = {Haralambos Mouratidis and
                  Jan J{\"{u}}rjens},
  title        = {From goal-driven security requirements engineering to secure design},
  journal      = {Int. J. Intell. Syst.},
  volume       = {25},
  number       = {8},
  pages        = {813--840},
  year         = {2010},
  url          = {https://doi.org/10.1002/int.20432},
  doi          = {10.1002/INT.20432},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/MouratidisJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/HoumbIKJS10,
  author       = {Siv Hilde Houmb and
                  Shareeful Islam and
                  Eric Knauss and
                  Jan J{\"{u}}rjens and
                  Kurt Schneider},
  title        = {Eliciting security requirements and tracing them to design: an integration
                  of Common Criteria, heuristics, and UMLsec},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {1},
  pages        = {63--93},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0093-9},
  doi          = {10.1007/S00766-009-0093-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/HoumbIKJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/PirontiJ10,
  author       = {Alfredo Pironti and
                  Jan J{\"{u}}rjens},
  editor       = {Fabio Massacci and
                  Dan S. Wallach and
                  Nicola Zannone},
  title        = {Formally-Based Black-Box Monitoring of Security Protocols},
  booktitle    = {Engineering Secure Software and Systems, Second International Symposium,
                  ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5965},
  pages        = {79--95},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11747-3\_7},
  doi          = {10.1007/978-3-642-11747-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/PirontiJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeMJ10,
  author       = {Seok{-}Won Lee and
                  Mattia Monga and
                  Jan J{\"{u}}rjens},
  editor       = {Jeff Kramer and
                  Judith Bishop and
                  Premkumar T. Devanbu and
                  Sebasti{\'{a}}n Uchitel},
  title        = {The 6\({}^{\mbox{th}}\) International Workshop on Software Engineering
                  for Secure Systems (SESS'10)},
  booktitle    = {Proceedings of the 32nd {ACM/IEEE} International Conference on Software
                  Engineering - Volume 2, {ICSE} 2010, Cape Town, South Africa, 1-8
                  May 2010},
  pages        = {433--434},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1810295.1810415},
  doi          = {10.1145/1810295.1810415},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/LeeMJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/BeckersJ10,
  author       = {Kristian Beckers and
                  Jan J{\"{u}}rjens},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Security and Compliance in Clouds},
  booktitle    = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2010 Conference, Berlin,
                  Germany, October 5-7, 2010},
  pages        = {91--100},
  publisher    = {Vieweg+Teubner},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-8348-9788-6\_9},
  doi          = {10.1007/978-3-8348-9788-6\_9},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/BeckersJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/MontrieuxJHYST10,
  author       = {Lionel Montrieux and
                  Jan J{\"{u}}rjens and
                  Charles B. Haley and
                  Yijun Yu and
                  Pierre{-}Yves Schobbens and
                  Hubert Toussaint},
  editor       = {Charles Pecheur and
                  Jamie Andrews and
                  Elisabetta Di Nitto},
  title        = {Tool support for code generation from a UMLsec property},
  booktitle    = {{ASE} 2010, 25th {IEEE/ACM} International Conference on Automated
                  Software Engineering, Antwerp, Belgium, September 20-24, 2010},
  pages        = {357--358},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1858996.1859074},
  doi          = {10.1145/1858996.1859074},
  timestamp    = {Tue, 06 Nov 2018 16:58:23 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/MontrieuxJHYST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BlancoFTJ10,
  author       = {Carlos Blanco and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Juan Trujillo and
                  Jan J{\"{u}}rjens},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Towards the Secure Modelling of {OLAP} Users' Behaviour},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {101--112},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_8},
  doi          = {10.1007/978-3-642-15546-8\_8},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BlancoFTJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vl/Jurjens10,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Christopher D. Hundhausen and
                  Emmanuel Pietriga and
                  Paloma D{\'{\i}}az and
                  Mary Beth Rosson},
  title        = {Model-Based Security Engineering with {UML:} The Last Decade and towards
                  the Future (Keynote)},
  booktitle    = {{IEEE} Symposium on Visual Languages and Human-Centric Computing,
                  {VL/HCC} 2010, Legan{\'{e}}s-Madrid, Spain, 21-25 September 2010,
                  Proceedings},
  pages        = {4},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/VLHCC.2010.10},
  doi          = {10.1109/VLHCC.2010.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vl/Jurjens10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2010sess,
  editor       = {Seok{-}Won Lee and
                  Mattia Monga and
                  Jan J{\"{u}}rjens},
  title        = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS}
                  2010, May 2, 2010, Cape Town, South Africa},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=1809100},
  isbn         = {978-1-60558-965-7},
  timestamp    = {Tue, 01 Jul 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/2010sess.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/Fernandez-MedinaJTJ09,
  author       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Jan J{\"{u}}rjens and
                  Juan Trujillo and
                  Sushil Jajodia},
  title        = {Model-Driven Development for secure information systems},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {5},
  pages        = {809--814},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2008.05.010},
  doi          = {10.1016/J.INFSOF.2008.05.010},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/Fernandez-MedinaJTJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Jurjens09,
  author       = {Jan J{\"{u}}rjens},
  title        = {A domain-specific language for cryptographic protocols based on streams},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {78},
  number       = {2},
  pages        = {54--73},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jlap.2008.08.006},
  doi          = {10.1016/J.JLAP.2008.08.006},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Jurjens09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WoodsidePPXIGFBHJ09,
  author       = {C. Murray Woodside and
                  Dorina C. Petriu and
                  Dorin Bogdan Petriu and
                  Jing Xu and
                  Tauseef A. Israr and
                  Geri Georg and
                  Robert B. France and
                  James M. Bieman and
                  Siv Hilde Houmb and
                  Jan J{\"{u}}rjens},
  title        = {Performance analysis of security aspects by weaving scenarios extracted
                  from {UML} models},
  journal      = {J. Syst. Softw.},
  volume       = {82},
  number       = {1},
  pages        = {56--74},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jss.2008.03.067},
  doi          = {10.1016/J.JSS.2008.03.067},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/WoodsidePPXIGFBHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/MouratidisSJ09,
  author       = {Haralambos Mouratidis and
                  Ali Sunyaev and
                  Jan J{\"{u}}rjens},
  editor       = {Pascal van Eck and
                  Jaap Gordijn and
                  Roel J. Wieringa},
  title        = {Secure Information Systems Engineering: Experiences and Lessons Learned
                  from Two Health Care Projects},
  booktitle    = {Advanced Information Systems Engineering, 21st International Conference,
                  CAiSE 2009, Amsterdam, The Netherlands, June 8-12, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5565},
  pages        = {231--245},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02144-2\_21},
  doi          = {10.1007/978-3-642-02144-2\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/MouratidisSJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/JurjensW09,
  author       = {Jan J{\"{u}}rjens and
                  Tjark Weber},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Finite Models in FOL-Based Crypto-Protocol Verification},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {155--172},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_11},
  doi          = {10.1007/978-3-642-03459-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/JurjensW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/LloydJ09,
  author       = {John Lloyd and
                  Jan J{\"{u}}rjens},
  editor       = {Andy Sch{\"{u}}rr and
                  Bran Selic},
  title        = {Security Analysis of a Biometric Authentication System Using UMLsec
                  and {JML}},
  booktitle    = {Model Driven Engineering Languages and Systems, 12th International
                  Conference, {MODELS} 2009, Denver, CO, USA, October 4-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5795},
  pages        = {77--91},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04425-0\_7},
  doi          = {10.1007/978-3-642-04425-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/models/LloydJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/WashizakiYFJ09,
  author       = {Hironori Washizaki and
                  Nobukazu Yoshioka and
                  Eduardo B. Fern{\'{a}}ndez and
                  Jan J{\"{u}}rjens},
  editor       = {Shail Arora and
                  Gary T. Leavens},
  title        = {Overview of the 3rd international workshop on software patterns and
                  quality ((SPAQu'09)},
  booktitle    = {Companion to the 24th Annual {ACM} {SIGPLAN} Conference on Object-Oriented
                  Programming, Systems, Languages, and Applications, {OOPSLA} 2009,
                  October 25-29, 2009, Orlando, Florida, {USA}},
  pages        = {713--714},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1639950.1639978},
  doi          = {10.1145/1639950.1639978},
  timestamp    = {Mon, 12 Jul 2021 15:34:15 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/WashizakiYFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/RatiuMJ99a,
  author       = {Daniel Ratiu and
                  Radu Marinescu and
                  Jan J{\"{u}}rjens},
  editor       = {Andy Zaidman and
                  Giuliano Antoniol and
                  St{\'{e}}phane Ducasse},
  title        = {The Logical Modularity of Programs},
  booktitle    = {16th Working Conference on Reverse Engineering, {WCRE} 2009, 13-16
                  October 2009, Lille, France},
  pages        = {123--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/WCRE.2009.29},
  doi          = {10.1109/WCRE.2009.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/RatiuMJ99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Jurjens09,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Security and Dependability Engineering},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_2},
  doi          = {10.1007/978-0-387-88775-3\_2},
  timestamp    = {Fri, 09 Jun 2017 11:04:31 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Jurjens09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/JurjensF09,
  author       = {Jan J{\"{u}}rjens and
                  Eduardo B. Fern{\'{a}}ndez},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Secure Database Development},
  booktitle    = {Encyclopedia of Database Systems},
  pages        = {2528--2534},
  publisher    = {Springer {US}},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-39940-9\_329},
  doi          = {10.1007/978-0-387-39940-9\_329},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/db/JurjensF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcs/JurjensYB08,
  author       = {Jan J{\"{u}}rjens and
                  Yijun Yu and
                  Andreas Bauer},
  editor       = {Erol Gelenbe and
                  Samson Abramsky and
                  Vladimiro Sassone},
  title        = {Tools for Traceable Security Verification},
  booktitle    = {Visions of Computer Science - {BCS} International Academic Conference,
                  Imperial College, London, UK, 22-24 September 2008},
  pages        = {367--390},
  publisher    = {British Computer Society},
  year         = {2008},
  url          = {http://www.bcs.org/server.php?show=ConWebDoc.22980},
  timestamp    = {Mon, 21 Sep 2009 12:13:42 +0200},
  biburl       = {https://dblp.org/rec/conf/bcs/JurjensYB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/RatiuFJ08,
  author       = {Daniel Ratiu and
                  Martin Feilkas and
                  Jan J{\"{u}}rjens},
  title        = {Extracting Domain Ontologies from Domain Specific APIs},
  booktitle    = {12th European Conference on Software Maintenance and Reengineering,
                  {CSMR} 2008, April 1-4, 2008, Athens, Greece},
  pages        = {203--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSMR.2008.4493315},
  doi          = {10.1109/CSMR.2008.4493315},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csmr/RatiuFJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/FernandezJYW08,
  author       = {Eduardo B. Fern{\'{a}}ndez and
                  Jan J{\"{u}}rjens and
                  Nobukazu Yoshioka and
                  Hironori Washizaki},
  title        = {Incorporating Database Systems into a Secure Software Development
                  Methodology},
  booktitle    = {19th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2008), 1-5 September 2008, Turin, Italy},
  pages        = {310--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/DEXA.2008.100},
  doi          = {10.1109/DEXA.2008.100},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexaw/FernandezJYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fase/JurjensSY08,
  author       = {Jan J{\"{u}}rjens and
                  J{\"{o}}rg Schreck and
                  Yijun Yu},
  editor       = {Jos{\'{e}} Luiz Fiadeiro and
                  Paola Inverardi},
  title        = {Automated Analysis of Permission-Based Security Using UMLsec},
  booktitle    = {Fundamental Approaches to Software Engineering, 11th International
                  Conference, {FASE} 2008, Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2008, Budapest, Hungary,
                  March 29-April 6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4961},
  pages        = {292--295},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78743-3\_21},
  doi          = {10.1007/978-3-540-78743-3\_21},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fase/JurjensSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BauerJ08,
  author       = {Andreas Bauer and
                  Jan J{\"{u}}rjens},
  editor       = {Bart De Win and
                  Seok{-}Won Lee and
                  Mattia Monga},
  title        = {Security protocols, properties, and their monitoring},
  booktitle    = {Proceedings of the Fourth International Workshop on Software Engineering
                  for Secure Systems, {SESS} 2008, Leipzig, Germany, May 17-18, 2008},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1370905.1370910},
  doi          = {10.1145/1370905.1370910},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/BauerJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/JurjensSB08,
  author       = {Jan J{\"{u}}rjens and
                  J{\"{o}}rg Schreck and
                  Peter Bartmann},
  editor       = {Wilhelm Sch{\"{a}}fer and
                  Matthew B. Dwyer and
                  Volker Gruhn},
  title        = {Model-based security analysis for mobile communications},
  booktitle    = {30th International Conference on Software Engineering {(ICSE} 2008),
                  Leipzig, Germany, May 10-18, 2008},
  pages        = {683--692},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368088.1368186},
  doi          = {10.1145/1368088.1368186},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/JurjensSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/HohnJ08,
  author       = {Sebastian H{\"{o}}hn and
                  Jan J{\"{u}}rjens},
  editor       = {Wilhelm Sch{\"{a}}fer and
                  Matthew B. Dwyer and
                  Volker Gruhn},
  title        = {Rubacon: automated support for model-based compliance engineering},
  booktitle    = {30th International Conference on Software Engineering {(ICSE} 2008),
                  Leipzig, Germany, May 10-18, 2008},
  pages        = {875--878},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368088.1368228},
  doi          = {10.1145/1368088.1368228},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/HohnJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/YuJM08,
  author       = {Yijun Yu and
                  Jan J{\"{u}}rjens and
                  John Mylopoulos},
  title        = {Traceability for the maintenance of secure software},
  booktitle    = {24th {IEEE} International Conference on Software Maintenance {(ICSM}
                  2008), September 28 - October 4, 2008, Beijing, China},
  pages        = {297--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICSM.2008.4658078},
  doi          = {10.1109/ICSM.2008.4658078},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icsm/YuJM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/RatiuJ08,
  author       = {Daniel Ratiu and
                  Jan J{\"{u}}rjens},
  editor       = {Ren{\'{e}} L. Krikhaar and
                  Ralf L{\"{a}}mmel and
                  Chris Verhoef},
  title        = {Evaluating the Reference and Representation of Domain Concepts in
                  APIs},
  booktitle    = {The 16th {IEEE} International Conference on Program Comprehension,
                  {ICPC} 2008, Amsterdam, The Netherlands, June 10-13, 2008},
  pages        = {242--247},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICPC.2008.11},
  doi          = {10.1109/ICPC.2008.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/RatiuJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/YuJS08,
  author       = {Yijun Yu and
                  Jan J{\"{u}}rjens and
                  J{\"{o}}rg Schreck},
  title        = {Tools for Traceability in Secure Software Development},
  booktitle    = {23rd {IEEE/ACM} International Conference on Automated Software Engineering
                  {(ASE} 2008), 15-19 September 2008, L'Aquila, Italy},
  pages        = {503--504},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ASE.2008.92},
  doi          = {10.1109/ASE.2008.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/YuJS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/IslamJ08,
  author       = {Shareeful Islam and
                  Jan J{\"{u}}rjens},
  editor       = {Jon Whittle and
                  Jan J{\"{u}}rjens and
                  Bashar Nuseibeh and
                  Glen Dobson},
  title        = {Incorporating Security Requirements from Legal Regulations into UMLsec
                  model},
  booktitle    = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)}
                  held as part of the 2008 International Conference on Model Driven
                  Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France,
                  September 28, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {413},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-413/paper14.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:21 +0100},
  biburl       = {https://dblp.org/rec/conf/models/IslamJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/WhittleJND08,
  author       = {Jon Whittle and
                  Jan J{\"{u}}rjens and
                  Bashar Nuseibeh and
                  Glen Dobson},
  editor       = {Michel R. V. Chaudron},
  title        = {First International Modeling Security Workshop},
  booktitle    = {Models in Software Engineering, Workshops and Symposia at {MODELS}
                  2008, Toulouse, France, September 28 - October 3, 2008. Reports and
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5421},
  pages        = {181--184},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01648-6\_19},
  doi          = {10.1007/978-3-642-01648-6\_19},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/models/WhittleJND08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/JurjensRT08,
  author       = {Jan J{\"{u}}rjens and
                  Daniel Rei{\ss} and
                  David Trachtenherz},
  editor       = {Krzysztof Czarnecki and
                  Ileana Ober and
                  Jean{-}Michel Bruel and
                  Axel Uhl and
                  Markus V{\"{o}}lter},
  title        = {Model-Based Quality Assurance of Automotive Software},
  booktitle    = {Model Driven Engineering Languages and Systems, 11th International
                  Conference, MoDELS 2008, Toulouse, France, September 28 - October
                  3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5301},
  pages        = {858--873},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87875-9\_59},
  doi          = {10.1007/978-3-540-87875-9\_59},
  timestamp    = {Fri, 30 Dec 2022 23:08:54 +0100},
  biburl       = {https://dblp.org/rec/conf/models/JurjensRT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/TaubenbergerJ08,
  author       = {Stefan Taubenberger and
                  Jan J{\"{u}}rjens},
  editor       = {Jon Whittle and
                  Jan J{\"{u}}rjens and
                  Bashar Nuseibeh and
                  Glen Dobson},
  title        = {{IT} Security Risk Analysis based on Business Process Models enhanced
                  with Security Requirements},
  booktitle    = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)}
                  held as part of the 2008 International Conference on Model Driven
                  Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France,
                  September 28, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {413},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-413/paper16.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/models/TaubenbergerJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/Jurjens08,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Martin Leucker},
  title        = {Model-Based Run-Time Checking of Security Permissions Using Guarded
                  Objects},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_3},
  doi          = {10.1007/978-3-540-89247-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/Jurjens08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Jurjens08,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Bernd Finkbeiner and
                  Yuri Gurevich and
                  Alexander K. Petrenko},
  title        = {Model-based Security Testing Using UMLsec: {A} Case Study},
  booktitle    = {Proceedings of the Fourth Workshop on Model Based Testing, MBT@ETAPS
                  2008, Budapest, Hungary, March 30, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {220},
  number       = {1},
  pages        = {93--104},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2008.11.008},
  doi          = {10.1016/J.ENTCS.2008.11.008},
  timestamp    = {Fri, 17 Feb 2023 11:06:30 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Jurjens08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/models/2008modsec,
  editor       = {Jon Whittle and
                  Jan J{\"{u}}rjens and
                  Bashar Nuseibeh and
                  Glen Dobson},
  title        = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)}
                  held as part of the 2008 International Conference on Model Driven
                  Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France,
                  September 28, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {413},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-413},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/models/2008modsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/JurjensS07,
  author       = {Jan J{\"{u}}rjens and
                  Pasha Shabalin},
  title        = {Tools for secure systems development with {UML}},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {9},
  number       = {5-6},
  pages        = {527--544},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10009-007-0048-8},
  doi          = {10.1007/S10009-007-0048-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/JurjensS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/RatiuJ07,
  author       = {Daniel Ratiu and
                  Jan J{\"{u}}rjens},
  editor       = {Ren{\'{e}} L. Krikhaar and
                  Chris Verhoef and
                  Giuseppe A. Di Lucca},
  title        = {The Reality of Libraries},
  booktitle    = {11th European Conference on Software Maintenance and Reengineering,
                  Software Evolution in Complex Software Intensive Systems, {CSMR} 2007,
                  21-23 March 2007, Amsterdam, The Netherlands},
  pages        = {307--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CSMR.2007.48},
  doi          = {10.1109/CSMR.2007.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csmr/RatiuJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Jurjens07,
  author       = {Jan J{\"{u}}rjens},
  title        = {Developing Secure Embedded Systems: Pitfalls and How to Avoid Them},
  booktitle    = {29th International Conference on Software Engineering {(ICSE} 2007),
                  Minneapolis, MN, USA, May 20-26, 2007, Companion Volume},
  pages        = {182--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSECOMPANION.2007.30},
  doi          = {10.1109/ICSECOMPANION.2007.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/Jurjens07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BestJN07,
  author       = {Bastian Best and
                  Jan J{\"{u}}rjens and
                  Bashar Nuseibeh},
  title        = {Model-Based Security Engineering of Distributed Information Systems
                  Using UMLsec},
  booktitle    = {29th International Conference on Software Engineering {(ICSE} 2007),
                  Minneapolis, MN, USA, May 20-26, 2007},
  pages        = {581--590},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSE.2007.55},
  doi          = {10.1109/ICSE.2007.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/BestJN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/JurjensY07,
  author       = {Jan J{\"{u}}rjens and
                  Yijun Yu},
  editor       = {R. E. Kurt Stirewalt and
                  Alexander Egyed and
                  Bernd Fischer},
  title        = {Tools for model-based security engineering: models vs. code},
  booktitle    = {22nd {IEEE/ACM} International Conference on Automated Software Engineering
                  {(ASE} 2007), November 5-9, 2007, Atlanta, Georgia, {USA}},
  pages        = {545--546},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1321631.1321736},
  doi          = {10.1145/1321631.1321736},
  timestamp    = {Tue, 06 Nov 2018 16:58:23 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/JurjensY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wosp/PetriuWPXIGFBHJ07,
  author       = {Dorina C. Petriu and
                  C. Murray Woodside and
                  Dorin Bogdan Petriu and
                  Jing Xu and
                  Toqeer Israr and
                  Geri Georg and
                  Robert B. France and
                  James M. Bieman and
                  Siv Hilde Houmb and
                  Jan J{\"{u}}rjens},
  editor       = {Vittorio Cortellessa and
                  Sebasti{\'{a}}n Uchitel and
                  Daniel Yankelevich},
  title        = {Performance analysis of security aspects in {UML} models},
  booktitle    = {Proceedings of the 6th International Workshop on Software and Performance,
                  {WOSP} 2007, Buenes Aires, Argentina, February 5-8, 2007},
  pages        = {91--102},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1216993.1217010},
  doi          = {10.1145/1216993.1217010},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wosp/PetriuWPXIGFBHJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Jurjens09,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Michael Goldsmith and
                  Bill Roscoe},
  title        = {Automated Security Verification for Crypto Protocol Implementations:
                  Verifying the Jessie Project},
  booktitle    = {Proceedings of the Seventh International Workshop on Automated Verification
                  of Critical Systems, AVoCS 2007, Oxford, UK, September 10-12, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {250},
  number       = {1},
  pages        = {123--136},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2009.08.009},
  doi          = {10.1016/J.ENTCS.2009.08.009},
  timestamp    = {Fri, 24 Feb 2023 13:48:46 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Jurjens09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/MouratidisJF06,
  author       = {Haralambos Mouratidis and
                  Jan J{\"{u}}rjens and
                  Jorge Fox},
  editor       = {Eric Dubois and
                  Klaus Pohl},
  title        = {Towards a Comprehensive Framework for Secure Systems Development},
  booktitle    = {Advanced Information Systems Engineering, 18th International Conference,
                  CAiSE 2006, Luxembourg, Luxembourg, June 5-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4001},
  pages        = {48--62},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767138\_5},
  doi          = {10.1007/11767138\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/MouratidisJF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/Jurjens06,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Jayadev Misra and
                  Tobias Nipkow and
                  Emil Sekerinski},
  title        = {Model-Based Security Engineering for Real},
  booktitle    = {{FM} 2006: Formal Methods, 14th International Symposium on Formal
                  Methods, Hamilton, Canada, August 21-27, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4085},
  pages        = {600--606},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11813040\_42},
  doi          = {10.1007/11813040\_42},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/Jurjens06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/JurjensF06,
  author       = {Jan J{\"{u}}rjens and
                  Jorge Fox},
  editor       = {Leon J. Osterweil and
                  H. Dieter Rombach and
                  Mary Lou Soffa},
  title        = {Tools for model-based security engineering},
  booktitle    = {28th International Conference on Software Engineering {(ICSE} 2006),
                  Shanghai, China, May 20-28, 2006},
  pages        = {819--822},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1134285.1134423},
  doi          = {10.1145/1134285.1134423},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/JurjensF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/Jurjens06,
  author       = {Jan J{\"{u}}rjens},
  title        = {Security Analysis of Crypto-based Java Programs using Automated Theorem
                  Provers},
  booktitle    = {21st {IEEE/ACM} International Conference on Automated Software Engineering
                  {(ASE} 2006), 18-22 September 2006, Tokyo, Japan},
  pages        = {167--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ASE.2006.60},
  doi          = {10.1109/ASE.2006.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/Jurjens06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/GeorgHFZPJ06,
  author       = {Geri Georg and
                  Siv Hilde Houmb and
                  Robert B. France and
                  Steffen Zschaler and
                  Dorina C. Petriu and
                  Jan J{\"{u}}rjens},
  editor       = {Thomas K{\"{u}}hne},
  title        = {Critical Systems Development Using Modeling Languages - {CSDUML} 2006
                  Workshop Report},
  booktitle    = {Models in Software Engineering, Workshops and Symposia at MoDELS 2006,
                  Genoa, Italy, October 1-6, 2006, Reports and Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4364},
  pages        = {27--31},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-69489-2\_4},
  doi          = {10.1007/978-3-540-69489-2\_4},
  timestamp    = {Wed, 23 Feb 2022 12:58:00 +0100},
  biburl       = {https://dblp.org/rec/conf/models/GeorgHFZPJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Jurjens06,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Manu Malek and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Javier Hernando},
  title        = {Model-Based Security Engineering},
  booktitle    = {{SECRYPT} 2006, Proceedings of the International Conference on Security
                  and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
                  {SECRYPT} is part of {ICETE} - The International Joint Conference
                  on e-Business and Telecommunications},
  publisher    = {{INSTICC} Press},
  year         = {2006},
  timestamp    = {Thu, 28 Sep 2006 10:10:32 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Jurjens06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/FoxJ06,
  author       = {Jorge Fox and
                  Jan J{\"{u}}rjens},
  editor       = {Ed Brinksma and
                  David Harel and
                  Angelika Mader and
                  Perdita Stevens and
                  Roel J. Wieringa},
  title        = {A Framework for Analyzing Composition of Security Aspects},
  booktitle    = {Methods for Modelling Software Systems (MMOSS), 27.08. - 01.09.2006},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {06351},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2006},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2007/859},
  timestamp    = {Thu, 10 Jun 2021 13:02:07 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/FoxJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0015258,
  author       = {Jan J{\"{u}}rjens},
  title        = {Secure systems development with {UML}},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137706},
  doi          = {10.1007/B137706},
  isbn         = {978-3-540-00701-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0015258.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Jurjens05,
  author       = {Jan J{\"{u}}rjens},
  title        = {Code Security Analysis of a Biometric Authentication System Using
                  Automated Theorem Provers},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {138--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.15},
  doi          = {10.1109/CSAC.2005.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Jurjens05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/BotaschanjanJ05,
  author       = {Jewgenij Botaschanjan and
                  Jan J{\"{u}}rjens},
  title        = {MoDeII: Modeling and Analyzing Time-Constraints},
  booktitle    = {12th {IEEE} International Conference on the Engineering of Computer-Based
                  Systems {(ECBS} 2005), 4-7 April 2005, Greenbelt, MD, {USA}},
  pages        = {299--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ECBS.2005.52},
  doi          = {10.1109/ECBS.2005.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/BotaschanjanJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/FoxJ05,
  author       = {Jorge Fox and
                  Jan J{\"{u}}rjens},
  title        = {Introducing Security Aspects with Model Transformations},
  booktitle    = {12th {IEEE} International Conference on the Engineering of Computer-Based
                  Systems {(ECBS} 2005), 4-7 April 2005, Greenbelt, MD, {USA}},
  pages        = {543--549},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ECBS.2005.48},
  doi          = {10.1109/ECBS.2005.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/FoxJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/WagnerJ05,
  author       = {Stefan Wagner and
                  Jan J{\"{u}}rjens},
  editor       = {Mario Dal Cin and
                  Mohamed Ka{\^{a}}niche and
                  Andr{\'{a}}s Pataricza},
  title        = {Model-Based Identification of Fault-Prone Components},
  booktitle    = {Dependable Computing - EDCC-5, 5th European Dependable Computing Conference,
                  Budapest, Hungary, April 20-22, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3463},
  pages        = {435--452},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11408901\_32},
  doi          = {10.1007/11408901\_32},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/WagnerJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fase/JurjensS05,
  author       = {Jan J{\"{u}}rjens and
                  Pasha Shabalin},
  editor       = {Maura Cerioli},
  title        = {Tools for Secure Systems Development with {UML:} Security Analysis
                  with ATPs},
  booktitle    = {Fundamental Approaches to Software Engineering, 8th International
                  Conference, {FASE} 2005, Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April
                  4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3442},
  pages        = {305--309},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31984-9\_23},
  doi          = {10.1007/978-3-540-31984-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fase/JurjensS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmco/Jurjens05,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Frank S. de Boer and
                  Marcello M. Bonsangue and
                  Susanne Graf and
                  Willem P. de Roever},
  title        = {Model-Based Security Engineering with {UML:} Introducing Security
                  Aspects},
  booktitle    = {Formal Methods for Components and Objects, 4th International Symposium,
                  {FMCO} 2005, Amsterdam, The Netherlands, November 1-4, 2005, Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {4111},
  pages        = {64--87},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11804192\_4},
  doi          = {10.1007/11804192\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fmco/Jurjens05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/galop/Jurjens05,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Dan R. Ghica and
                  Guy McCusker},
  title        = {Towards using game semantics for crypto protocol verification: Lorenzen
                  games},
  booktitle    = {1st Workshop on Games for Logic and Programming Languages, GALOP@ETAPS
                  2005, Edinburgh, UK, 2-3 April 2005},
  pages        = {241--257},
  year         = {2005},
  timestamp    = {Thu, 25 Jun 2020 16:30:03 +0200},
  biburl       = {https://dblp.org/rec/conf/galop/Jurjens05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/HoumbGFBJ05,
  author       = {Siv Hilde Houmb and
                  Geri Georg and
                  Robert B. France and
                  James M. Bieman and
                  Jan J{\"{u}}rjens},
  title        = {Cost-Benefit Trade-Off Analysis Using {BBN} for Aspect-Oriented Risk-Driven
                  Development},
  booktitle    = {10th International Conference on Engineering of Complex Computer Systems
                  {(ICECCS} 2005), 16-20 June 2005, Shanghai, China},
  pages        = {195--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICECCS.2005.30},
  doi          = {10.1109/ICECCS.2005.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/HoumbGFBJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/JurjensLW05,
  author       = {Jan J{\"{u}}rjens and
                  Markus Lehrhuber and
                  Guido Wimmel},
  title        = {Model-Based Design and Analysis of Permission-Based Security},
  booktitle    = {10th International Conference on Engineering of Complex Computer Systems
                  {(ICECCS} 2005), 16-20 June 2005, Shanghai, China},
  pages        = {224--233},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICECCS.2005.61},
  doi          = {10.1109/ICECCS.2005.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/JurjensLW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Jurjens05,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Gruia{-}Catalin Roman and
                  William G. Griswold and
                  Bashar Nuseibeh},
  title        = {Sound methods and effective tools for model-based security engineering
                  with {UML}},
  booktitle    = {27th International Conference on Software Engineering {(ICSE} 2005),
                  15-21 May 2005, St. Louis, Missouri, {USA}},
  pages        = {322--331},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1062455.1062519},
  doi          = {10.1145/1062455.1062519},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/Jurjens05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/Jurjens05,
  author       = {Jan J{\"{u}}rjens},
  title        = {Understanding Security Goals Provided by Crypto-Protocol Implementations},
  booktitle    = {21st {IEEE} International Conference on Software Maintenance {(ICSM}
                  2005), 25-30 September 2005, Budapest, Hungary},
  pages        = {643--646},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICSM.2005.97},
  doi          = {10.1109/ICSM.2005.97},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm/Jurjens05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/JurjensY05,
  author       = {Jan J{\"{u}}rjens and
                  Mark Yampolskiy},
  editor       = {David F. Redmiles and
                  Thomas Ellman and
                  Andrea Zisman},
  title        = {Code security analysis with assertions},
  booktitle    = {20th {IEEE/ACM} International Conference on Automated Software Engineering
                  {(ASE} 2005), November 7-11, 2005, Long Beach, CA, {USA}},
  pages        = {392--395},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1101908.1101978},
  doi          = {10.1145/1101908.1101978},
  timestamp    = {Tue, 06 Nov 2018 16:58:23 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/JurjensY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/memocode/Jurjens05,
  author       = {Jan J{\"{u}}rjens},
  title        = {Verification of low-level crypto-protocol implementations using automated
                  theorem proving},
  booktitle    = {3rd {ACM} {\&} {IEEE} International Conference on Formal Methods
                  and Models for Co-Design {(MEMOCODE} 2005), 11-14 July 2005, Verona,
                  Italy, Proceedings},
  pages        = {89--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MEMCOD.2005.1487898},
  doi          = {10.1109/MEMCOD.2005.1487898},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/memocode/Jurjens05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pts/WagnerJKT05,
  author       = {Stefan Wagner and
                  Jan J{\"{u}}rjens and
                  Claudia Koller and
                  Peter Trischberger},
  editor       = {Ferhat Khendek and
                  Rachida Dssouli},
  title        = {Comparing Bug Finding Tools with Reviews and Tests},
  booktitle    = {Testing of Communicating Systems, 17th {IFIP} {TC6/WG} 6.1 International
                  Conference, TestCom 2005, Montreal, Canada, May 31 - June 2, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3502},
  pages        = {40--55},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11430230\_4},
  doi          = {10.1007/11430230\_4},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pts/WagnerJKT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uml/JurjensH05,
  author       = {Jan J{\"{u}}rjens and
                  Siv Hilde Houmb},
  editor       = {Lionel C. Briand and
                  Clay Williams},
  title        = {Dynamic Secure Aspect Modeling with {UML:} From Models to Code},
  booktitle    = {Model Driven Engineering Languages and Systems, 8th International
                  Conference, MoDELS 2005, Montego Bay, Jamaica, October 2-7, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3713},
  pages        = {142--155},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11557432\_11},
  doi          = {10.1007/11557432\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/uml/JurjensH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/05/JurjensS05,
  author       = {Jan J{\"{u}}rjens and
                  Pasha Shabalin},
  editor       = {Sami Beydeda and
                  Matthias Book and
                  Volker Gruhn},
  title        = {Tool Support for Model-Driven Development of Security-Critical Systems
                  with {UML}},
  booktitle    = {Model-Driven Software Development},
  pages        = {35--55},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/3-540-28554-7\_3},
  doi          = {10.1007/3-540-28554-7\_3},
  timestamp    = {Mon, 16 Sep 2019 14:43:26 +0200},
  biburl       = {https://dblp.org/rec/books/sp/05/JurjensS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/Jurjens005,
  author       = {Jan J{\"{u}}rjens and
                  Stefan Wagner},
  editor       = {Colin Atkinson and
                  Christian Bunse and
                  Hans{-}Gerhard Gross and
                  Christian Peper},
  title        = {Component-Based Development of Dependable Systems with {UML}},
  booktitle    = {Component-Based Software Development for Embedded Systems - An Overview
                  of Current Research Trends},
  series       = {Lecture Notes in Computer Science},
  volume       = {3778},
  pages        = {320--344},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11591962\_16},
  doi          = {10.1007/11591962\_16},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/Jurjens005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/Jurjens04,
  author       = {Jan J{\"{u}}rjens},
  title        = {Componentware for Critical Systems},
  journal      = {J. Object Technol.},
  volume       = {3},
  number       = {4},
  pages        = {47--50},
  year         = {2004},
  url          = {https://doi.org/10.5381/jot.2004.3.4.a3},
  doi          = {10.5381/JOT.2004.3.4.A3},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jot/Jurjens04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/JurjensS04,
  author       = {Jan J{\"{u}}rjens and
                  Pasha Shabalin},
  title        = {A Foundation for Tool-Supported Critical Systems Development with
                  {UML}},
  booktitle    = {11th {IEEE} International Conference on the Engineering of Computer-Based
                  Systems {(ECBS} 2004), 24-27 May 2004, Brno, Czech Republic},
  pages        = {398--405},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ECBS.2004.1316724},
  doi          = {10.1109/ECBS.2004.1316724},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/JurjensS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/Jurjens04,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Alessandro Aldini and
                  Roberto Gorrieri and
                  Fabio Martinelli},
  title        = {Model-Based Security Engineering with {UML}},
  booktitle    = {Foundations of Security Analysis and Design III, {FOSAD} 2004/2005
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {3655},
  pages        = {42--77},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11554578\_2},
  doi          = {10.1007/11554578\_2},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/Jurjens04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/Jurjens04,
  author       = {Jan J{\"{u}}rjens},
  title        = {Developing High-Assurance Secure Systems with {UML:} {A} Smartcard-Based
                  Purchase Protocol},
  booktitle    = {8th {IEEE} International Symposium on High-Assurance Systems Engineering
                  {(HASE} 2004), 25-26 March 2004, Tampa, FL, {USA}},
  pages        = {231--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/HASE.2004.1281747},
  doi          = {10.1109/HASE.2004.1281747},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/Jurjens04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/DeublerGJW04,
  author       = {Martin R. Deubler and
                  Johannes Gr{\"{u}}nbauer and
                  Jan J{\"{u}}rjens and
                  Guido Wimmel},
  editor       = {Marco Aiello and
                  Mikio Aoyama and
                  Francisco Curbera and
                  Mike P. Papazoglou},
  title        = {Sound development of secure service-based systems},
  booktitle    = {Service-Oriented Computing - {ICSOC} 2004, Second International Conference,
                  New York, NY, USA, November 15-19, 2004, Proceedings},
  pages        = {115--124},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1035167.1035185},
  doi          = {10.1145/1035167.1035185},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/DeublerGJW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/JurjensH04,
  author       = {Jan J{\"{u}}rjens and
                  Siv Hilde Houmb},
  editor       = {Ricardo Reis},
  title        = {Risk-Driven Development Of Security-Critical Systems Using UMLsec},
  booktitle    = {Information Technology, Selected Tutorials, {IFIP} 18th World Computer
                  Congress, Tutorials, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {157},
  pages        = {21--53},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8159-6\_2},
  doi          = {10.1007/1-4020-8159-6\_2},
  timestamp    = {Tue, 22 Oct 2019 15:21:17 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/JurjensH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/modellierung/GrunbauerJW04,
  author       = {Johannes Gr{\"{u}}nbauer and
                  Jan J{\"{u}}rjens and
                  Guido Wimmel},
  editor       = {Bernhard Rumpe and
                  Wolfgang Hesse},
  title        = {Modelling Secure {IT} Systems - {A} Survey},
  booktitle    = {Modellierung 2004, Proceedings zur Tagung, 23.-26. M{\"{a}}rz
                  2004, Marburg, Proceedings},
  series       = {{LNI}},
  volume       = {{P-45}},
  pages        = {307--308},
  publisher    = {{GI}},
  year         = {2004},
  url          = {https://dl.gi.de/handle/20.500.12116/29253},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/modellierung/GrunbauerJW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/modellierung/SchmidtJ04,
  author       = {Robert Schmidt and
                  Jan J{\"{u}}rjens},
  editor       = {Bernhard Rumpe and
                  Wolfgang Hesse},
  title        = {Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem},
  booktitle    = {Modellierung 2004, Proceedings zur Tagung, 23.-26. M{\"{a}}rz
                  2004, Marburg, Proceedings},
  series       = {{LNI}},
  volume       = {{P-45}},
  pages        = {309--310},
  publisher    = {{GI}},
  year         = {2004},
  url          = {https://dl.gi.de/handle/20.500.12116/29254},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/modellierung/SchmidtJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uml/JurjensFFRH04,
  author       = {Jan J{\"{u}}rjens and
                  Eduardo B. Fern{\'{a}}ndez and
                  Robert B. France and
                  Bernhard Rumpe and
                  Constance L. Heitmeyer},
  editor       = {Nuno Jardim Nunes and
                  Bran Selic and
                  Alberto Rodrigues da Silva and
                  Jos{\'{e}} Ambrosio Toval {\'{A}}lvarez},
  title        = {Critical Systems Development Using Modeling Languages {(CSDUML-04):}
                  Current Developments and Future Challenges (Report on the Third International
                  Workshop)},
  booktitle    = {{UML} Modeling Languages and Applications, {\guillemotleft}UML{\guillemotright}
                  2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3297},
  pages        = {76--84},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31797-5\_9},
  doi          = {10.1007/978-3-540-31797-5\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uml/JurjensFFRH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uml/JurjensS04a,
  author       = {Jan J{\"{u}}rjens and
                  Pasha Shabalin},
  editor       = {Nuno Jardim Nunes and
                  Bran Selic and
                  Alberto Rodrigues da Silva and
                  Jos{\'{e}} Ambrosio Toval {\'{A}}lvarez},
  title        = {Tools for Critical Systems Development with {UML} (Tool Demo)},
  booktitle    = {{UML} Modeling Languages and Applications, {\guillemotleft}UML{\guillemotright}
                  2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3297},
  pages        = {250--253},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31797-5\_27},
  doi          = {10.1007/978-3-540-31797-5\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uml/JurjensS04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uml/JurjensS04,
  author       = {Jan J{\"{u}}rjens and
                  Pasha Shabalin},
  editor       = {Thomas Baar and
                  Alfred Strohmeier and
                  Ana M. D. Moreira and
                  Stephen J. Mellor},
  title        = {Automated Verification of UMLsec Models for Security Requirements},
  booktitle    = {{\guillemotleft}UML{\guillemotright} 2004 - The Unified Modelling
                  Language: Modelling Languages and Applications. 7th International
                  Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3273},
  pages        = {365--379},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30187-5\_26},
  doi          = {10.1007/978-3-540-30187-5\_26},
  timestamp    = {Mon, 15 Jun 2020 17:02:11 +0200},
  biburl       = {https://dblp.org/rec/conf/uml/JurjensS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Jurjens06,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Maurice H. ter Beek and
                  Fabio Gadducci},
  title        = {Foundations for Designing Secure Architectures},
  booktitle    = {Proceedings of the First International Workshop on Views on Designing
                  Complex Architectures, VODCA@FOSAD 2004, Bertinoro, Italy, September
                  11-12, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {142},
  pages        = {31--46},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2005.07.012},
  doi          = {10.1016/J.ENTCS.2005.07.012},
  timestamp    = {Thu, 15 Dec 2022 14:30:44 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Jurjens06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stt/Jurjens03,
  author       = {Jan J{\"{u}}rjens},
  title        = {Bericht {\"{u}}ber die erste Jahrestagung der GI-Fachgruppe FoMSESS
                  vom 12. bis 13. Mai 2003 in Karlsruhe},
  journal      = {Softwaretechnik-Trends},
  volume       = {23},
  number       = {3},
  year         = {2003},
  url          = {http://pi.informatik.uni-siegen.de/stt/23\_3/09\_Konferenzberichte/FoMSESS.ps},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/stt/Jurjens03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsd/RombergJWSH03,
  author       = {Jan Romberg and
                  Jan J{\"{u}}rjens and
                  Guido Wimmel and
                  Oscar Slotosch and
                  Gabor Hahn},
  title        = {AutoFOCUS and the MoDe Tool},
  booktitle    = {3rd International Conference on Application of Concurrency to System
                  Design {(ACSD} 2003), 18-20 June 2003, Guimaraes, Portugal},
  pages        = {249--250},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSD.2003.1207727},
  doi          = {10.1109/CSD.2003.1207727},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsd/RombergJWSH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/PoppJWB03,
  author       = {Gerhard Popp and
                  Jan J{\"{u}}rjens and
                  Guido Wimmel and
                  Ruth Breu},
  title        = {Security-Critical System Development with Extended Use Cases},
  booktitle    = {10th Asia-Pacific Software Engineering Conference {(APSEC} 2003),
                  10-12 December 2003, Chiang Mai, Thailand},
  pages        = {478--487},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/APSEC.2003.1254403},
  doi          = {10.1109/APSEC.2003.1254403},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/PoppJWB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/HoumbJ03,
  author       = {Siv Hilde Houmb and
                  Jan J{\"{u}}rjens},
  title        = {Developing Secure Networked Web-Based Systems Using Model-based Risk
                  Assessment and UMLsec},
  booktitle    = {10th Asia-Pacific Software Engineering Conference {(APSEC} 2003),
                  10-12 December 2003, Chiang Mai, Thailand},
  pages        = {488},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/APSEC.2003.1254404},
  doi          = {10.1109/APSEC.2003.1254404},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/HoumbJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ershov/Jurjens03,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Manfred Broy and
                  Alexandre V. Zamulin},
  title        = {Algebraic State Machines: Concepts and Applications to Security},
  booktitle    = {Perspectives of Systems Informatics, 5th International Andrei Ershov
                  Memorial Conference, {PSI} 2003, Akademgorodok, Novosibirsk, Russia,
                  July 9-12, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2890},
  pages        = {338--343},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39866-0\_33},
  doi          = {10.1007/978-3-540-39866-0\_33},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ershov/Jurjens03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ladc/JurjensH03,
  author       = {Jan J{\"{u}}rjens and
                  Siv Hilde Houmb},
  editor       = {Rog{\'{e}}rio de Lemos and
                  Taisy Silva Weber and
                  Jo{\~{a}}o Batista Camargo Jr.},
  title        = {Development of Safety-Critical Systems and Model-Based Risk Analysis
                  with {UML}},
  booktitle    = {Dependable Computing, First Latin-American Symposium, {LADC} 2003,
                  Sao Paulo, Brazil, October 21-24, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2847},
  pages        = {364--365},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45214-0\_28},
  doi          = {10.1007/978-3-540-45214-0\_28},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ladc/JurjensH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/GrunbauerHJW03,
  author       = {Johannes Gr{\"{u}}nbauer and
                  Helia Hollmann and
                  Jan J{\"{u}}rjens and
                  Guido Wimmel},
  editor       = {Stuart Anderson and
                  Massimo Felici and
                  Bev Littlewood},
  title        = {Modelling and Verification of Layered Security Protocols: {A} Bank
                  Application},
  booktitle    = {Computer Safety, Reliability, and Security, 22nd International Conference,
                  {SAFECOMP} 2003, Edinburgh, UK, September 23-26, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2788},
  pages        = {116--129},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39878-3\_10},
  doi          = {10.1007/978-3-540-39878-3\_10},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/GrunbauerHJW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/JurjensG03,
  author       = {Jan J{\"{u}}rjens and
                  Johannes Gr{\"{u}}nbauer},
  editor       = {Walter Dosch and
                  Roger Y. Lee},
  title        = {Critical Systems Development with {UML:} Overview with Automatic Case
                  Study},
  booktitle    = {Proceedings of the {ACIS} Fourth International Conference on Software
                  Engineering, Artificial Intelligence, Networking and Parallel/Distributed
                  Computing (SNPD'03), October 16-18, 2003, L{\"{u}}beck, Germany},
  pages        = {512--517},
  publisher    = {{ACIS}},
  year         = {2003},
  timestamp    = {Wed, 26 Nov 2003 12:28:17 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/JurjensG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/HohnJ03,
  author       = {Sebastian H{\"{o}}hn and
                  Jan J{\"{u}}rjens},
  editor       = {Sushil Jajodia and
                  Leon Strous},
  title        = {Automated Checking of {SAP} Security Permisisons},
  booktitle    = {Integrity and Internal Control in Information Systems {VI} - {IFIP}
                  {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control
                  in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland},
  series       = {{IFIP}},
  volume       = {140},
  pages        = {13--30},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-7901-X\_2},
  doi          = {10.1007/1-4020-7901-X\_2},
  timestamp    = {Tue, 23 May 2017 01:07:20 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/HohnJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uml/Jurjens03,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Perdita Stevens and
                  Jon Whittle and
                  Grady Booch},
  title        = {Developing Safety-Critical Systems with {UML}},
  booktitle    = {{\guillemotleft}UML{\guillemotright} 2003 - The Unified Modeling Language,
                  Modeling Languages and Applications, 6th International Conference,
                  San Francisco, CA, USA, October 20-24, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2863},
  pages        = {360--372},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45221-8\_31},
  doi          = {10.1007/978-3-540-45221-8\_31},
  timestamp    = {Tue, 24 May 2022 15:28:50 +0200},
  biburl       = {https://dblp.org/rec/conf/uml/Jurjens03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/JuIrjens02,
  author       = {Jan J{\"{u}}rjens},
  title        = {Principles for secure system design},
  school       = {University of Oxford, {UK}},
  year         = {2002},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.400047},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/JuIrjens02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/synthese/Jurjens02,
  author       = {Jan J{\"{u}}rjens},
  title        = {Games In The Semantics Of Programming Languages - An Elementary Introduction},
  journal      = {Synth.},
  volume       = {133},
  number       = {1-2},
  pages        = {131--158},
  year         = {2002},
  url          = {https://doi.org/10.1023/A:1020883810034},
  doi          = {10.1023/A:1020883810034},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/synthese/Jurjens02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmoods/Jurjens02,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Bart Jacobs and
                  Arend Rensink},
  title        = {Formal Semantics for Interacting {UML} subsystems},
  booktitle    = {Formal Methods for Open Object-Based Distributed Systems V, {IFIP}
                  {TC6/WG6.1} Fifth International Conference on Formal Methods for Open
                  Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002,
                  Enschede, The Netherlands},
  series       = {{IFIP} Conference Proceedings},
  volume       = {209},
  pages        = {29--43},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Thu, 09 Jul 2015 16:49:48 +0200},
  biburl       = {https://dblp.org/rec/conf/fmoods/Jurjens02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/WimmelJ02,
  author       = {Guido Wimmel and
                  Jan J{\"{u}}rjens},
  editor       = {Chris George and
                  Huaikou Miao},
  title        = {Specification-Based Test Generation for Security-Critical Systems
                  Using Mutations},
  booktitle    = {Formal Methods and Software Engineering, 4th International Conference
                  on Formal Engineering Methods, {ICFEM} 2002 Shanghai, China, October
                  21-25, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2495},
  pages        = {471--482},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36103-0\_48},
  doi          = {10.1007/3-540-36103-0\_48},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/WimmelJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Jurjens02,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {A {UML} statecharts semantics with message-passing},
  booktitle    = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC),
                  March 10-14, 2002, Madrid, Spain},
  pages        = {1009--1013},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/508791.508987},
  doi          = {10.1145/508791.508987},
  timestamp    = {Tue, 06 Nov 2018 11:06:47 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/Jurjens02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Jurjens02a,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {Using UMLsec and goal trees for secure systems development},
  booktitle    = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC),
                  March 10-14, 2002, Madrid, Spain},
  pages        = {1026--1030},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/508791.508990},
  doi          = {10.1145/508791.508990},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/Jurjens02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uml/Jurjens02,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Jean{-}Marc J{\'{e}}z{\'{e}}quel and
                  Heinrich Hu{\ss}mann and
                  Stephen Cook},
  title        = {UMLsec: Extending {UML} for Secure Systems Development},
  booktitle    = {{UML} 2002 - The Unified Modeling Language, 5th International Conference,
                  Dresden, Germany, September 30 - October 4, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2460},
  pages        = {412--425},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45800-X\_32},
  doi          = {10.1007/3-540-45800-X\_32},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/uml/Jurjens02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsd/Jurjens01,
  author       = {Jan J{\"{u}}rjens},
  title        = {Abstracting from Failure Probabilities},
  booktitle    = {2nd International Conference on Application of Concurrency to System
                  Design {(ACSD} 2001), 25-30 June 2001, Newcastle upon Tyne, {UK}},
  pages        = {53},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CSD.2001.981764},
  doi          = {10.1109/CSD.2001.981764},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsd/Jurjens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ershov/JurjensW01,
  author       = {Jan J{\"{u}}rjens and
                  Guido Wimmel},
  editor       = {Dines Bj{\o}rner and
                  Manfred Broy and
                  Alexandre V. Zamulin},
  title        = {Specification-Based Testing of Firewalls},
  booktitle    = {Perspectives of System Informatics, 4th International Andrei Ershov
                  Memorial Conference, {PSI} 2001, Akademgorodok, Novosibirsk, Russia,
                  July 2-6, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2244},
  pages        = {308--316},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45575-2\_31},
  doi          = {10.1007/3-540-45575-2\_31},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ershov/JurjensW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fase/Jurjens01,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Heinrich Hu{\ss}mann},
  title        = {Towards Development of Secure Systems Using UMLsec},
  booktitle    = {Fundamental Approaches to Software Engineering, 4th International
                  Conference, {FASE} 2001 Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April
                  2-6, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2029},
  pages        = {187--200},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45314-8\_14},
  doi          = {10.1007/3-540-45314-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fase/Jurjens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/Jurjens01,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Jos{\'{e}} Nuno Oliveira and
                  Pamela Zave},
  title        = {Secrecy-Preserving Refinement},
  booktitle    = {{FME} 2001: Formal Methods for Increasing Software Productivity, International
                  Symposium of Formal Methods Europe, Berlin, Germany, March 12-16,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2021},
  pages        = {135--152},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45251-6\_8},
  doi          = {10.1007/3-540-45251-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/Jurjens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/JurjensW01,
  author       = {Jan J{\"{u}}rjens and
                  Guido Wimmel},
  editor       = {Beat F. Schmid and
                  Katarina Stanoevska{-}Slabeva and
                  Volker Tschammer},
  title        = {Security Modelling for Electronic Commerce: The Common Electronic
                  Purse Specifications},
  booktitle    = {Towards The E-Society: E-Commerce, E-Business, and E-Government, The
                  First {IFIP} Conference on E-Commerce, E-Business, E-Government {(I3E}
                  2001), October 3-5, Z{\"{u}}rich, Switzerland},
  series       = {{IFIP} Conference Proceedings},
  volume       = {202},
  pages        = {489--505},
  publisher    = {Kluwer},
  year         = {2001},
  url          = {https://doi.org/10.1007/0-306-47009-8\_36},
  doi          = {10.1007/0-306-47009-8\_36},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/JurjensW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/JurjensW01,
  author       = {Jan J{\"{u}}rjens and
                  Guido Wimmel},
  title        = {Formally Testing Fail-Safety of Electronic Purse Protocols},
  booktitle    = {16th {IEEE} International Conference on Automated Software Engineering
                  {(ASE} 2001), 26-29 November 2001, Coronado Island, San Diego, CA,
                  {USA}},
  pages        = {408--411},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ASE.2001.989840},
  doi          = {10.1109/ASE.2001.989840},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/JurjensW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Jurjens01,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Composability of Secrecy},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_6},
  doi          = {10.1007/3-540-45116-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Jurjens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsec/Jurgens01,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Bart De Decker and
                  Frank Piessens and
                  Jan Smits and
                  Els Van Herreweghen},
  title        = {Secure Java Development with {UML}},
  booktitle    = {Advances in Network and Distributed Systems Security, {IFIP} {TC11}
                  {WG11.4} First Annual Working Conference on Network Security, November
                  26-27, 2001, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {206},
  pages        = {107--124},
  publisher    = {Kluwer},
  year         = {2001},
  url          = {https://doi.org/10.1007/0-306-46958-8\_8},
  doi          = {10.1007/0-306-46958-8\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsec/Jurgens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Jurjens01,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Michel Dupuy and
                  Pierre Paradinas},
  title        = {Modelling Audit Security for Smart-Cart Payment Schemes with {UML-SEC}},
  booktitle    = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth
                  Annual Working Conference on Information Security (IFIP/Sec'01), June
                  11-13, 2001, Paris, France},
  series       = {{IFIP} Conference Proceedings},
  volume       = {193},
  pages        = {93--108},
  publisher    = {Kluwer},
  year         = {2001},
  url          = {https://doi.org/10.1007/0-306-46998-7\_7},
  doi          = {10.1007/0-306-46998-7\_7},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Jurjens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Jurjens01,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Encapsulating Rules of Prudent Security Engineering},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {95--101},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_15},
  doi          = {10.1007/3-540-45807-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Jurjens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Jurjens01a,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Encapsulating Rules of Prudent Security Engineering (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {102--106},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_16},
  doi          = {10.1007/3-540-45807-7\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Jurjens01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacs/AbadiJ01,
  author       = {Mart{\'{\i}}n Abadi and
                  Jan J{\"{u}}rjens},
  editor       = {Naoki Kobayashi and
                  Benjamin C. Pierce},
  title        = {Formal Eavesdropping and Its Computational Interpretation},
  booktitle    = {Theoretical Aspects of Computer Software, 4th International Symposium,
                  {TACS} 2001, Sendai, Japan, October 29-31, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2215},
  pages        = {82--94},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45500-0\_4},
  doi          = {10.1007/3-540-45500-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/tacs/AbadiJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vis/Jurjens01,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Dirk Fox and
                  Marit K{\"{o}}hntopp and
                  Andreas Pfitzmann},
  title        = {Developing Secure Systems with UMLsec - From Business Processes to
                  Implementation},
  booktitle    = {Verl{\"{a}}ssliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen,
                  Proceedings der GI-Fachtagung {VIS} 2001, 12.-14.09.2001 in Kiel},
  pages        = {151--161},
  publisher    = {Vieweg+Teubner Verlag},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-3-663-05918-9\_11},
  doi          = {10.1007/978-3-663-05918-9\_11},
  timestamp    = {Thu, 17 Nov 2022 13:36:41 +0100},
  biburl       = {https://dblp.org/rec/conf/vis/Jurjens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/Jurjens00,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Catuscia Palamidessi},
  title        = {Secure Information Flow for Concurrent Processes},
  booktitle    = {{CONCUR} 2000 - Concurrency Theory, 11th International Conference,
                  University Park, PA, USA, August 22-25, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1877},
  pages        = {395--409},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44618-4\_29},
  doi          = {10.1007/3-540-44618-4\_29},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/Jurjens00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics