Secure systems development with UML J Jürjens Springer Science & Business Media, 2005 | 1052 | 2005 |
UMLsec: Extending UML for secure systems development J Jürjens International Conference on The Unified Modeling Language, 412-425, 2002 | 936 | 2002 |
Towards development of secure systems using UMLsec J Jürjens International Conference on Fundamental Approaches to Software Engineering …, 2001 | 216 | 2001 |
Formal eavesdropping and its computational interpretation M Abadi, J Jürjens International Symposium on Theoretical Aspects of Computer Software, 82-94, 2001 | 173 | 2001 |
Comparing bug finding tools with reviews and tests S Wagner, J Jürjens, C Koller, P Trischberger IFIP International Conference on Testing of Communicating Systems, 40-55, 2005 | 164 | 2005 |
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec SH Houmb, S Islam, E Knauss, J Jürjens, K Schneider Requirements Engineering 15 (1), 63-93, 2010 | 147 | 2010 |
Sound methods and effective tools for model-based security engineering with UML J Jurjens Proceedings. 27th International Conference on Software Engineering, 2005 …, 2005 | 136 | 2005 |
Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions H Mouratidis, P Giorgini Igi Global, 2006 | 108 | 2006 |
Using UMLsec and goal trees for secure systems development J Jürjens Proceedings of the 2002 ACM symposium on Applied computing, 1026-1030, 2002 | 105 | 2002 |
Model-based security engineering of distributed information systems using UMLsec B Best, J Jurjens, B Nuseibeh 29th International Conference on Software Engineering (ICSE'07), 581-590, 2007 | 94 | 2007 |
Specification-based testing of firewalls J Jürjens, G Wimmel International Andrei Ershov Memorial Conference on Perspectives of System …, 2001 | 87 | 2001 |
Specification-based test generation for security-critical systems using mutations G Wimmel, J Jürjens International Conference on Formal Engineering Methods, 471-482, 2002 | 86 | 2002 |
From goal‐driven security requirements engineering to secure design H Mouratidis, J Jurjens International Journal of Intelligent Systems 25 (8), 813-840, 2010 | 77 | 2010 |
Model-based security testing using umlsec: A case study J Jürjens Electronic Notes in Theoretical Computer Science 220 (1), 93-104, 2008 | 73 | 2008 |
Extracting and verifying cryptographic models from C protocol code by symbolic execution M Aizatulin, AD Gordon, J Jürjens Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 72 | 2011 |
Tools for secure systems development with UML J Jürjens, P Shabalin International Journal on Software Tools for Technology Transfer 9 (5), 527-544, 2007 | 72 | 2007 |
Secrecy-preserving refinement J Jürjens International Symposium of Formal Methods Europe, 135-152, 2001 | 69 | 2001 |
Security-critical system development with extended use cases G Popp, J Jurjens, G Wimmel, R Breu Tenth Asia-Pacific Software Engineering Conference, 2003., 478-487, 2003 | 65 | 2003 |
Sound development of secure service-based systems M Deubler, J Grünbauer, J Jürjens, G Wimmel Proceedings of the 2nd international conference on Service oriented …, 2004 | 64 | 2004 |
Performance analysis of security aspects by weaving scenarios extracted from UML models M Woodside, DC Petriu, DB Petriu, J Xu, T Israr, G Georg, R France, ... Journal of Systems and Software 82 (1), 56-74, 2009 | 63 | 2009 |