Jan Jürjens
Orcid: 0000-0002-8938-0470Affiliations:
- University of Koblenz-Landau, Germany
- Dortmund University of Technology, Germany (former)
According to our database1,
Jan Jürjens
authored at least 225 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Benchmarking requirement template systems: comparing appropriateness, usability, and expressiveness.
Requir. Eng., December, 2024
Fast, Favorable, and Fair Blockchain-based Exchange of Digital Goods using State Channels - Replication Package.
Dataset, March, 2024
UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering.
IEEE Trans. Software Eng., January, 2024
Reconstruction as a service: a data space for off-site image reconstruction in magnetic particle imaging.
CoRR, 2024
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024
Privacy-Friendly Sharing of Health Data Using a Reference Architecture for Health Data Spaces.
Proceedings of the 4th Eclipse Security, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Fast, Favorable, and Fair Blockchain-based Exchange of Digital Goods using State Channels.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
2023
Replication Package for UMLsecRT: Reactive Security Monitoring of Java Applications with Round-Trip Engineering.
Dataset, September, 2023
Knowledge guided multi-filter residual convolutional neural network for ICD coding from clinical text.
Neural Comput. Appl., August, 2023
Inf. Softw. Technol., July, 2023
k-grosser/Evaluation-of-templates-for-requirements-documentation: Submission to RE'23 Artifact Track.
Dataset, June, 2023
Softw. Syst. Model., February, 2023
Proceedings of the Software Engineering 2023, 2023
Requirements document relations: A reuse perspective on traceability through standards.
Proceedings of the Software Engineering 2023, 2023
ILLOD Replication Package: An Open-Source Framework for Abbreviation-Expansion Pair Detection and Term Consolidation in Requirements.
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023
Proceedings of the 7th International Conference on Future Networks and Distributed Systems, 2023
Beyond Trading Data: The Hidden Influence of Public Awareness and Interest on Cryptocurrency Volatility.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
2022
Sensors, 2022
Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain (Extended Version).
CoRR, 2022
Life cycle and metrics to measure the resilience of business processes by considering resources.
Bus. Process. Manag. J., 2022
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2022
Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, 2022
Ontology-based Synchronization of Automated Production Systems and Their Simulation Models.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2022
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects".
Proceedings of the IEEE 19th International Conference on Software Architecture Companion, 2022
Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
Proceedings of the Designing Data Spaces: The Ecosystem Approach to Competitive Advantage, 2022
Proceedings of the Technologies and Applications for Big Data Value, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021
2020
Proceedings of the Visual Privacy Management, 2020
A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements.
Softw. Syst. Model., 2020
Inf., 2020
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings.
Proceedings of the Software Engineering 2020, 2020
Proceedings of the Research Challenges in Information Science, 2020
2019
Proceedings of the Software Engineering and Software Management, 2019
A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary).
Proceedings of the Software Engineering and Software Management, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Ensuring Genuineness for Selectively Disclosed Confidential Data Using Distributed Ledgers: Applications to Rail Wayside Monitoring.
Proceedings of the IEEE International Conference on Blockchain, 2019
Proceedings of the Managed Software Evolution., 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen ins digitale Zeitalter?
Wirtschaftsinformatik Manag., 2018
J. Syst. Softw., 2018
Inf. Comput. Secur., 2018
Proceedings of the Software Engineering und Software Management 2018, 2018
Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the International Workshop on Software Fairness, 2018
Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 2018
Proceedings of the Fundamental Approaches to Software Engineering, 2018
Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models.
Proceedings of the Modelling Foundations and Applications - 14th European Conference, 2018
2017
Inf. Comput. Secur., 2017
Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method).
Comput. Syst. Sci. Eng., 2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
Proceedings of the 20th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2017
Proceedings of the Modelling Foundations and Applications - 13th European Conference, 2017
Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017
2016
Umlchange - specifying model changes to support security verification of potential evolution.
Proceedings of the Software Engineering 2016, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
2015
Int. J. Softw. Tools Technol. Transf., 2015
The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution.
Int. J. Softw. Eng. Knowl. Eng., 2015
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015
Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge.
Proceedings of the Software Engineering & Management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März, 2015
Model-based Security Analysis and Applications to Security Economics.
Proceedings of the MODELSWARD 2015, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds.
Proceedings of the Business Modeling and Software Design - 5th International Symposium, 2015
2014
Softwaretechnik-Trends, 2014
J. Comput. Secur., 2014
Int. J. Secur. Softw. Eng., 2014
Specifying model changes with UMLchange to support security verification of potential evolution.
Comput. Stand. Interfaces, 2014
Comput. Stand. Interfaces, 2014
The SecReq approach: From Security Requirements to Secure Design while Managing Software Evolution.
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014
Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen.
Proceedings of the Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2014, 2014
Maintaining requirements for long-living software systems by incorporating security knowledge.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014
Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems.
Proceedings of the Product-Focused Software Process Improvement, 2014
2013
Resolving vulnerability identification errors using security requirements on business process models.
Inf. Manag. Comput. Secur., 2013
Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models.
Proceedings of the Foundations of Security Analysis and Design VII, 2013
Proceedings of the Cloud Computing and Services Science - Third International Conference, 2013
Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes.
Proceedings of the CLOSER 2013, 2013
2012
Requir. Eng., 2012
J. Univers. Comput. Sci., 2012
Proceedings of the Objects, Models, Components, Patterns - 50th International Conference, 2012
Proceedings of the Software Engineering 2012 - Workshopband, Fachtagung des GI-Fachbereichs Softwaretechnik, 27. Februar, 2012
Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
Securing Processes for Outsourcing into the Cloud.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
A framework to support alignment of secure software engineering with legal regulations.
Softw. Syst. Model., 2011
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2011
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011
Seventh international workshop on software engineering for secure systems: (SESS 2011).
Proceedings of the 33rd International Conference on Software Engineering, 2011
Proceedings of the 33rd International Conference on Software Engineering, 2011
Proceedings of the Fundamental Approaches to Software Engineering, 2011
Proceedings of the Modelling Foundations and Applications - 7th European Conference, 2011
Extracting and verifying cryptographic models from C protocol code by symbolic execution.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec.
Proceedings of the Advanced Information Systems Engineering, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec.
Requir. Eng., 2010
Int. J. Intell. Syst., 2010
Component criticality analysis to minimize soft errors risk.
Comput. Syst. Sci. Eng., 2010
Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote).
Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing, 2010
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010
Proceedings of the ASE 2010, 2010
The 6<sup>th</sup> International Workshop on Software Engineering for Secure Systems (SESS'10).
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
2009
Proceedings of the Security and Dependability for Ambient Intelligence, 2009
Proceedings of the Encyclopedia of Database Systems, 2009
Performance analysis of security aspects by weaving scenarios extracted from UML models.
J. Syst. Softw., 2009
J. Log. Algebraic Methods Program., 2009
Proceedings of the 16th Working Conference on Reverse Engineering, 2009
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09).
Proceedings of the Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2009
Proceedings of the Model Driven Engineering Languages and Systems, 2009
Proceedings of the Foundations and Applications of Security Analysis, 2009
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects.
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009
2008
Proceedings of the Fourth Workshop on Model Based Testing, 2008
Proceedings of the Runtime Verification, 8th International Workshop, 2008
Proceedings of the Models in Software Engineering, Workshops and Symposia at MODELS 2008, Toulouse, France, September 28, 2008
IT Security Risk Analysis based on Business Process Models enhanced with Security Requirements.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
Proceedings of the Model Driven Engineering Languages and Systems, 2008
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008
Proceedings of the 16th IEEE International Conference on Program Comprehension, 2008
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008
Proceedings of the Fundamental Approaches to Software Engineering, 2008
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008
Proceedings of the 12th European Conference on Software Maintenance and Reengineering, 2008
Proceedings of the Visions of Computer Science, 2008
2007
Int. J. Softw. Tools Technol. Transf., 2007
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project.
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, 2007
Proceedings of the 6th International Workshop on Software and Performance, 2007
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007
Proceedings of the 11th European Conference on Software Maintenance and Reengineering, 2007
2006
Model-Based Security Engineering.
Proceedings of the SECRYPT 2006, 2006
Proceedings of the Models in Software Engineering, 2006
Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), 2006
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006
Proceedings of the FM 2006: Formal Methods, 2006
Proceedings of the Methods for Modelling Software Systems (MMOSS), 27.08. - 01.09.2006, 2006
Proceedings of the Advanced Information Systems Engineering, 18th International Conference, 2006
2005
Proceedings of the Component-Based Software Development for Embedded Systems, 2005
Proceedings of the Model Driven Engineering Languages and Systems, 2005
Proceedings of the Testing of Communicating Systems, 2005
Verification of low-level crypto-protocol implementations using automated theorem proving.
Proceedings of the 3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005), 2005
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005
Proceedings of the 21st IEEE International Conference on Software Maintenance (ICSM 2005), 2005
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005
Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005
Towards using game semantics for crypto protocol verification: Lorenzen games.
Proceedings of the 1st Workshop on Games for Logic and Programming Languages, 2005
Proceedings of the Formal Methods for Components and Objects, 4th International Symposium, 2005
Proceedings of the Fundamental Approaches to Software Engineering, 2005
Proceedings of the Dependable Computing, 2005
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Proceedings of the Model-Driven Software Development, 2005
2004
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004
Proceedings of the UML Modeling Languages and Applications, 2004
Proceedings of the «UML» 2004, 2004
Critical Systems Development Using Modeling Languages (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop).
Proceedings of the UML Modeling Languages and Applications, 2004
Modellbasierte Sicherheitsanalyse mit UMLsec: Ein biometrisches Zugangskontrollsystem.
Proceedings of the Modellierung 2004, Proceedings zur Tagung, 23.-26. März 2004, 2004
Proceedings of the Modellierung 2004, Proceedings zur Tagung, 23.-26. März 2004, 2004
Proceedings of the Information Technology, Selected Tutorials, 2004
Proceedings of the Service-Oriented Computing, 2004
Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol.
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004
Proceedings of the Foundations of Security Analysis and Design III, 2004
Proceedings of the 11th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2004), 2004
2003
Bericht über die erste Jahrestagung der GI-Fachgruppe FoMSESS vom 12. bis 13. Mai 2003 in Karlsruhe.
Softwaretechnik-Trends, 2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
Critical Systems Development with UML: Overview with Automatic Case Study.
Proceedings of the ACIS Fourth International Conference on Software Engineering, 2003
Proceedings of the Computer Safety, 2003
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003
Proceedings of the Perspectives of Systems Informatics, 2003
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003
Proceedings of the 3rd International Conference on Application of Concurrency to System Design (ACSD 2003), 2003
2002
Synth., 2002
Proceedings of the UML 2002 - The Unified Modeling Language, 5th International Conference, Dresden, Germany, September 30, 2002
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
Proceedings of the Formal Methods and Software Engineering, 2002
Formal Semantics for Interacting UML subsystems.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems V, 2002
2001
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001
Proceedings of the Theoretical Aspects of Computer Software, 4th International Symposium, 2001
Proceedings of the Security Protocols, 2001
Proceedings of the Security Protocols, 2001
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the Advances in Network and Distributed Systems Security, 2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications.
Proceedings of the Towards The E-Society: E-Commerce, 2001
Proceedings of the FME 2001: Formal Methods for Increasing Software Productivity, 2001
Proceedings of the Fundamental Approaches to Software Engineering, 2001
Proceedings of the Perspectives of System Informatics, 2001
Proceedings of the 2nd International Conference on Application of Concurrency to System Design (ACSD 2001), 2001
2000
Proceedings of the CONCUR 2000, 2000