-
3
-
-
85080712019
-
-
Online Available
-
VisiOn Project. [Online]. Available: http://www.visioneuproject. eu/ 2016
-
(2016)
VisiOn Project
-
-
-
4
-
-
85010038739
-
-
Accessed 08-07. [Online]. Available
-
Cloud Security Alliance. Accessed: 2016-08-07. [Online]. Available: http://cloudsecurityalliance.org/
-
(2016)
Cloud Security Alliance
-
-
-
6
-
-
33750060125
-
Model-based security engineering with UML
-
ser. Lecture Notes in Computer Science, A. Aldini, R. Gorrieri, and F. Martinelli, Eds
-
J. Jürjens, "Model-based security engineering with UML," in Foundations of Security Analysis, and Desing III: FOSAD 2004/2005 Tutorial Lectures, ser. Lecture Notes in Computer Science, A. Aldini, R. Gorrieri, and F. Martinelli, Eds., 2005, vol. 3655, pp. 42-77
-
(2005)
Foundations of Security Analysis, and Desing III: FOSAD 2004/2005 Tutorial Lectures
, vol.3655
, pp. 42-77
-
-
Jürjens, J.1
-
9
-
-
85080755341
-
-
May Online]. Available
-
(2016, May) CARiSMA. [Online]. Available: https://rgse.uni-koblenz. de/carisma/
-
(2016)
CARiSMA
-
-
-
10
-
-
84885216103
-
Secure information flow for concurrent processes
-
CONCUR 2000), ser. Lecture Notes in Computer Science Springer Verlag
-
J. Jürjens, "Secure information flow for concurrent processes," in 11th International Conference on Concurrency Theory (CONCUR 2000), ser. Lecture Notes in Computer Science, vol. 1877. Springer Verlag, 2000, pp. 395-409
-
(2000)
11th International Conference on Concurrency Theory
, vol.1877
, pp. 395-409
-
-
Jürjens, J.1
-
11
-
-
84904204049
-
Security modelling for electronic commerce: The common electronic purse specifications
-
I3E Kluwer
-
J. Jürjens, and G. Wimmel, "Security modelling for electronic commerce: The Common Electronic Purse Specifications," in First IFIP Conference on e-Commerce, e-Business, and e-Government (I3E). Kluwer, 2001, pp. 489-505
-
(2001)
First IFIP Conference on E-Commerce, E-Business, and E-Government
, pp. 489-505
-
-
Jürjens, J.1
Wimmel, G.2
-
14
-
-
84899177670
-
An integrated security verification, and security solution design trade-off analysis approach
-
Vision, H. Mouratidis, Ed. Idea Group invited chapter
-
S. H. Houmb, G. Georg, J. Jürjens, and R. B. France, "An integrated security verification, and security solution design trade-off analysis approach," in Integrating Security, and Software Engineering: Advances, and Future Vision, H. Mouratidis, Ed. Idea Group, 2006, pp. 190-219, invited chapter
-
(2006)
Integrating Security, and Software Engineering: Advances, and Future
, pp. 190-219
-
-
Houmb, S.H.1
Georg, G.2
Jürjens, J.3
France, R.B.4
-
15
-
-
60849106337
-
Modeldriven development for secure information systems
-
E. Fernández-Medina, J. Jürjens, J. Trujillo, and S. Jajodia, "Modeldriven development for secure information systems," Information & Software Technology, vol. 51, no. 5, pp. 809-814, 2009
-
(2009)
Information & Software Technology
, vol.51
, Issue.5
, pp. 809-814
-
-
Fernández-Medina, E.1
Jürjens, J.2
Trujillo, J.3
Jajodia, S.4
-
16
-
-
34748846883
-
Performance analysis of security aspects in UML models
-
WOSP 2007). Buenos Aires, Argentina ACM
-
D. Petriu, M. Woodside, D. Petriu, J. Xu, T. Israr, G. Georg, R. France, J. Bieman, S. H. Houmb, and J. Jürjens, "Performance analysis of security aspects in UML models," in Sixth International Workshop on Software, and Performance (WOSP 2007). Buenos Aires, Argentina: ACM, 2007, pp. 91-102
-
(2007)
Sixth International Workshop on Software, and Performance
, pp. 91-102
-
-
Petriu, D.1
Woodside, M.2
Petriu, D.3
Xu, J.4
Israr, T.5
Georg, G.6
France, R.7
Bieman, J.8
Houmb, S.H.9
Jürjens, J.10
-
17
-
-
84939641193
-
Guiding a general-purpose c verifier to prove cryptographic protocols
-
special issue with best papers from the 24th IEEE Computer Security Foundations Symposium (CSF
-
F. Dupressoir, A. D. Gordon, J. Jürjens, and D. Naumann, "Guiding a general-purpose c verifier to prove cryptographic protocols," Journal of Computer Security, vol. 22, no. 5, pp. 823-866, 2014, special issue with best papers from the 24th IEEE Computer Security Foundations Symposium (CSF
-
(2014)
Journal of Computer Security
, vol.22
, Issue.5
, pp. 823-866
-
-
Dupressoir, F.1
Gordon, A.D.2
Jürjens, J.3
Naumann, D.4
-
18
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
Paris
-
R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, G. Wimmel, and V. Lotz, "Key issues of a formally based process model for security engineering," in Sixteenth International Conference "Software & Systems Engineering & their Applications", Paris, 2003
-
(2003)
Sixteenth International Conference Software & Systems Engineering & Their Applications
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jürjens, J.4
Popp, G.5
Wimmel, G.6
Lotz, V.7
-
19
-
-
84857362096
-
Enhancing security requirements engineering by organisational learning
-
K. Schneider, E. Knauss, S. Houmb, S. Islam, and J. Jürjens, "Enhancing security requirements engineering by organisational learning," Requirements Engineering Journal (REJ), vol. 17, no. 1, pp. 35-56, 2012
-
(2012)
Requirements Engineering Journal (REJ
, vol.17
, Issue.1
, pp. 35-56
-
-
Schneider, K.1
Knauss, E.2
Houmb, S.3
Islam, S.4
Jürjens, J.5
-
20
-
-
4243355127
-
Directive 95/46/EC of the European parliament, and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data, and on the free movement of such data
-
European Parliament Council of the European Union L
-
European Parliament, Council of the European Union, "Directive 95/46/EC of the European Parliament, and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data, and on the free movement of such data," Official Journal of the European Union, vol. L 281, 1995
-
(1995)
Official Journal of the European Union
, pp. 281
-
-
-
21
-
-
85012957343
-
Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data, and on the free movement of such data
-
European Parliament L
-
European Parliament, "Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data, and on the free movement of such data ," Official Journal of the European Union, vol. L 119, 2016
-
(2016)
Official Journal of the European Union
, vol.119
-
-
-
22
-
-
70350674935
-
A data privacy taxonomy
-
BNCOD 26, Birmingham, UK July 7-9 2009. Proceedings
-
K. Barker, M. Askari, M. Banerjee, K. Ghazinour, B. Mackas, M. Majedi, S. Pun, and A. Williams, "A data privacy taxonomy," in Dataspace: The Final Frontier, 26th British National Conference on Databases, BNCOD 26, Birmingham, UK, July 7-9, 2009. Proceedings, 2009, pp. 42-54
-
(2009)
Dataspace: The Final Frontier, 26th British National Conference on Databases
, pp. 42-54
-
-
Barker, K.1
Askari, M.2
Banerjee, M.3
Ghazinour, K.4
MacKas, B.5
Majedi, M.6
Pun, S.7
Williams, A.8
-
23
-
-
70849129259
-
A lattice-based privacy aware access control model
-
CSE 09. International Conference on Aug
-
K. Ghazinour, M. Majedi, and K. Barker, "A lattice-based privacy aware access control model," in Computational Science, and Engineering, 2009. CSE 09. International Conference on, vol. 3, Aug 2009, pp. 154-159
-
(2009)
Computational Science, and Engineering 2009
, vol.3
, pp. 154-159
-
-
Ghazinour, K.1
Majedi, M.2
Barker, K.3
-
24
-
-
0030086382
-
Rolebased access control models
-
Feb. Online]. Available
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Rolebased access control models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996. [Online]. Available: http://dx.doi.org/10.1109/2.485845
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
26
-
-
84976648543
-
-
Springer International Publishing Online]. Available
-
A. S. Ahmadian, F. Coerschulte, and J. Jürjens, Supporting the Security Certification, and Privacy Level Agreements in the Context of Clouds. Springer International Publishing, 2016, pp. 80-95. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-40512-4 5
-
(2016)
Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds
, pp. 80-95
-
-
Ahmadian, A.S.1
Coerschulte, F.2
Jürjens, J.3
-
28
-
-
84944342746
-
Towards a formalised representation for the technical enforcement of privacy level agreements
-
March
-
M. DErrico, and S. Pearson, "Towards a formalised representation for the technical enforcement of privacy level agreements," in Cloud Engineering (IC2E), 2015 IEEE International Conference on, March 2015, pp. 422-427
-
(2015)
Cloud Engineering (IC2E), 2015 IEEE International Conference on
, pp. 422-427
-
-
DErrico, M.1
Pearson, S.2
-
29
-
-
79959729769
-
A framework to support alignment of secure software engineering with legal regulations
-
Online]. Available
-
S. Islam, H. Mouratidis, and J. Jürjens, "A framework to support alignment of secure software engineering with legal regulations," Software & Systems Modeling, vol. 10, no. 3, pp. 369-394, 2011. [Online]. Available: http://dx.doi.org/10.1007/s10270-010-0154-z
-
(2011)
Software & Systems Modeling
, vol.10
, Issue.3
, pp. 369-394
-
-
Islam, S.1
Mouratidis, H.2
Jürjens, J.3
-
30
-
-
79958060292
-
A model-based privacy compliance checker
-
Online]. Available
-
S. Pearson, and D. Allison, "A model-based privacy compliance checker," IJEBR, vol. 5, no. 2, pp. 63-83, 2009. [Online]. Available: http://dx.doi.org/10.4018/jebr.2009040104
-
(2009)
IJEBR
, vol.5
, Issue.2
, pp. 63-83
-
-
Pearson, S.1
Allison, D.2
-
31
-
-
70349836055
-
Taking account of privacy when designing cloud computing services
-
ser. CLOUD 09. IEEE Computer Society Online]. Available
-
S. Pearson, "Taking account of privacy when designing cloud computing services," in Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, ser. CLOUD 09. IEEE Computer Society, 2009, pp. 44-52. [Online]. Available: http://dx.doi.org/10.1109/CLOUD.2009.5071532
-
(2009)
Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
, pp. 44-52
-
-
Pearson, S.1
|