Name
Affiliation
Papers
JAN JURJENS
Germany TU Dortmund & Fraunhofer ISST, Germany
32
Collaborators
Citations 
PageRank 
47
169
16.07
Referers 
Referees 
References 
332
746
384
Search Limit
100746
Title
Citations
PageRank
Year
Why is Application Reliability an Issue for an Ultra-Reliable 6G Network?00.342021
Ontology-driven evolution of software security00.342021
A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements10.352020
Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings00.342019
Privacy-enhanced system design modeling based on privacy features.00.342019
Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements.20.382018
Model-based discrimination analysis: a position paper.00.342018
Supporting privacy impact assessment by model-based privacy analysis.30.382018
Data Security And Consumer Trust In Fintech Innovation In Germany00.342018
From Secure Business Process Modeling to Design-Level Security Verification40.392017
Information Security Management And The Human Aspect In Organizations00.342017
Model-based privacy and security analysis with CARiSMA50.432017
Model-Based Security Verification and Testing for Smart-cards30.372011
Guiding a general-purpose C verifier to prove cryptographic protocols.160.632011
Towards the secure modelling of OLAP users behaviour40.452010
Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote)00.342010
Model-Driven Development for secure information systems160.682009
The Logical Modularity of Programs30.412009
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects20.352009
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09)00.342009
Extracting Domain Ontologies from Domain Specific APIs230.952008
Incorporating Database Systems into a Secure Software Development Methodology10.362008
Model-Based Security Engineering of Distributed Information Systems Using UMLsec271.352007
The Reality of Libraries50.582007
Developing Secure Embedded Systems: Pitfalls and How to Avoid Them30.402007
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers231.352006
Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development90.942005
Understanding security goals provided by crypto-protocol implementations10.372005
Introducing Security Aspects with Model Transformations90.632005
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers40.542005
MoDeII: Modeling and Analyzing Time-Constraints00.342005
Model-Based Design and Analysis of Permission-Based Security50.422005