default search action
Stephan Seifermann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Tomás Bures, Petr Hnetynka, Martin Krulis, Frantisek Plásil, Danylo Khalyeyev, Sebastian Hahner, Stephan Seifermann, Maximilian Walter, Robert Heinrich:
Generating adaptation rule-specific neural networks. Int. J. Softw. Tools Technol. Transf. 25(5): 733-746 (2023) - 2022
- [b1]Stephan Seifermann:
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements. Karlsruhe Institute of Technology, Germany, 2022 - [j11]Stephan Seifermann, Robert Heinrich, Dominik Werle, Ralf H. Reussner:
Detecting violations of access control and information flow policies in data flow diagrams. J. Syst. Softw. 184: 111138 (2022) - [c27]Dominik Werle, Stephan Seifermann, Anne Koziolek:
Accurate Performance Predictions with Component-Based Models of Data Streaming Applications. ECSA 2022: 83-98 - [c26]Nicolas Boltz, Sebastian Hahner, Maximilian Walter, Stephan Seifermann, Robert Heinrich, Tomás Bures, Petr Hnetynka:
Handling Environmental Uncertainty in Design Time Access Control Analysis. SEAA 2022: 382-389 - [c25]Tomás Bures, Petr Hnetynka, Martin Krulis, Frantisek Plásil, Danylo Khalyeyev, Sebastian Hahner, Stephan Seifermann, Maximilian Walter, Robert Heinrich:
Attuning Adaptation Rules via a Rule-Specific Neural Network. ISoLA (3) 2022: 215-230 - [p2]Robert Heinrich, Stephan Seifermann, Maximilian Walter, Sebastian Hahner, Ralf H. Reussner, Tomás Bures, Petr Hnetynka, Jan Pacovský:
Dynamic Access Control in Industry 4.0 Systems. Digital Transformation 2022: 143-170 - 2021
- [c24]Stephan Seifermann, Maximilian Walter, Sebastian Hahner, Robert Heinrich, Ralf H. Reussner:
Identifying Confidentiality Violations in Architectural Design Using Palladio (short paper). ECSA (Companion) 2021 - [c23]Maximilian Walter, Sebastian Hahner, Stephan Seifermann, Tomás Bures, Petr Hnetynka, Jan Pacovský, Robert Heinrich:
Architectural Optimization for Confidentiality Under Structural Uncertainty. ECSA (Tracks and Workshops) 2021: 309-332 - [c22]Tomás Bures, Ilias Gerostathopoulos, Petr Hnetynka, Stephan Seifermann, Maximilian Walter, Robert Heinrich:
Aspect-Oriented Adaptation of Access Control Rules. SEAA 2021: 363-370 - [c21]Roman Pilipchuk, Stephan Seifermann, Robert Heinrich, Ralf H. Reussner:
Challenges in Aligning Enterprise Application Architectures to Business Process Access Control Requirements in Evolutional Changes. ICE-B 2021: 13-24 - [c20]Sebastian Hahner, Stephan Seifermann, Robert Heinrich, Ralf H. Reussner:
A Classification of Software-Architectural Uncertainty Regarding Confidentiality. ICETE (Selected Papers) 2021: 139-160 - [c19]Sebastian Hahner, Stephan Seifermann, Robert Heinrich, Maximilian Walter, Tomás Bures, Petr Hnetynka:
Modeling Data Flow Constraints for Design-Time Confidentiality Analyses. ICSA Companion 2021: 15-21 - [c18]Stephan Seifermann, Robert Heinrich, Dominik Werle, Ralf H. Reussner:
A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures. SECRYPT 2021: 26-37 - [i1]Tomás Bures, Petr Hnetynka, Martin Krulis, Danylo Khalyeyev, Sebastian Hahner, Stephan Seifermann, Maximilian Walter, Robert Heinrich:
Towards fuzzification of adaptation rules in self-adaptive architectures. CoRR abs/2112.09468 (2021) - 2020
- [j10]Maximilian Walter, Stephan Seifermann, Robert Heinrich:
A Taxonomy of Dynamic Changes Affecting Confidentiality. Softwaretechnik-Trends 40(2): 35-36 (2020) - [j9]Malte Reimann, Stephan Seifermann, Maximilian Walter, Robert Heinrich, Tomás Bures, Petr Hnetynka:
Towards Language-Agnostic Reuse of Palladio Quality Analyses. Softwaretechnik-Trends 40(3): 46-48 (2020) - [j8]Stephan Seifermann, Sebastian Krach:
Catching Up with State of the Art Continuous Integration Pipelines in Palladio - An Experience Report. Softwaretechnik-Trends 40(3): 52-54 (2020) - [c17]Dominik Werle, Stephan Seifermann, Anne Koziolek:
Data Stream Operations as First-Class Entities in Component-Based Performance Models. ECSA 2020: 148-164 - [c16]Tomás Bures, Petr Hnetynka, Robert Heinrich, Stephan Seifermann, Maximilian Walter:
Capturing Dynamicity and Uncertainty in Security and Trust via Situational Patterns. ISoLA (2) 2020: 295-310 - [c15]Stephan Seifermann, Robert Heinrich, Ralf H. Reussner:
Datenzentrische Softwarearchitekturen. SE 2020: 47-48
2010 – 2019
- 2019
- [j7]Stephan Seifermann, Dominik Werle, Mazen Ebada:
Mapping Data Flow Models to the Palladio Component Model. Softwaretechnik-Trends 39(4): 41-43 (2019) - [j6]Dominik Werle, Stephan Seifermann, Anne Koziolek:
Data Stream Operations as First-Class Entities in Palladio. Softwaretechnik-Trends 39(4): 47-49 (2019) - [c14]Rima Al Ali, Petr Hnetynka, Jiri Havlik, Vlastimil Krivka, Robert Heinrich, Stephan Seifermann, Maximilian Walter, Adrian Juan Verdejo:
Dynamic security rules for legacy systems. ECSA (Companion) 2019: 277-284 - [c13]Stephan Seifermann, Robert Heinrich, Ralf H. Reussner:
Data-Driven Software Architecture for Analyzing Confidentiality. ICSA 2019: 1-10 - [c12]Stephan Seifermann, Maximilian Walter:
Evolving a Use Case for Industry 4.0 Environments Towards Integration of Physical Access Control. Software Engineering (Workshops) 2019: 106-108 - [p1]Safa Bougouffa, Kiana Busch, Robert Heinrich, André van Hoorn, Marco Konersmann, Stephan Seifermann, Emre Taspolatoglu, Felix Ocker, Cyntia Vargas, Mina Fahimi Pirehgalin, Ralf H. Reussner, Birgit Vogel-Heuser:
Case Studies for the Community. Managed Software Evolution 2019: 335-374 - 2018
- [c11]Roman Pilipchuk, Stephan Seifermann, Robert Heinrich:
Aligning Business Process Access Control Policies with Enterprise Architecture. CECC 2018: 17:1-17:4 - [c10]Rima Al Ali, Robert Heinrich, Petr Hnetynka, Adrian Juan Verdejo, Stephan Seifermann, Maximilian Walter:
Modeling of dynamic trust contracts for industry 4.0 systems. ECSA (Companion) 2018: 45:1-45:4 - [c9]Claudia Loitsch, Karin Müller, Stephan Seifermann, Jörg Henß, Sebastian Dieter Krach, Gerhard Jaworek, Rainer Stiefelhagen:
UML4ALL Syntax - A Textual Notation for UML Diagrams. ICCHP (1) 2018: 598-605 - 2017
- [j5]Karin Müller, Vanessa Petrausch, Gerhard Jaworek, Jörg Henß, Stephan Seifermann, Claudia Loitsch, Rainer Stiefelhagen:
UML4ALL: Gemeinsam in Diversity Teams Software modellieren - Für Menschen mit und ohne Seheinschränkung. Inform. Spektrum 40(6): 562-572 (2017) - [j4]Roman Pilipchuk, Stephan Seifermann, Emre Taspolatoglu:
Defining a Security-Oriented Evolution Scenario for the CoCoME. Softwaretechnik-Trends 37(2) (2017) - [j3]Dominik Werle, Stephan Seifermann, Sebastian Dieter Krach:
Leveraging State to Facilitate Separation of Concerns in Reuse-oriented Performance Models. Softwaretechnik-Trends 37(3): 26-28 (2017) - [c8]Stephan Seifermann, Jörg Henß:
Comparison of QVT-O and Henshin-TGG for Synchronization of Concrete Syntax Models. BX@ETAPS 2017: 6-14 - 2016
- [j2]Stephan Seifermann, Emre Taspolatoglu, Ralf H. Reussner, Robert Heinrich:
Challenges in Secure Software Evolution - The Role of Software Architecture. Softwaretechnik-Trends 36(1) (2016) - [j1]Stephan Seifermann, Kateryna Yurchenko, Max E. Kramer:
Challenges to Trading-Off Performance and Privacy of Component-Based Systems. Softwaretechnik-Trends 36(4) (2016) - [c7]Vanessa Petrausch, Stephan Seifermann, Karin Müller:
Guidelines for Accessible Textual UML Modeling Notations. ICCHP (1) 2016: 67-74 - [c6]Stephan Seifermann, Henning Groenda:
Survey on the Applicability of Textual Notations for the Unified Modeling Language. MODELSWARD (Revised Selected Papers) 2016: 3-24 - [c5]Stephan Seifermann, Henning Groenda:
Survey on Textual Notations for the Unified Modeling Language. MODELSWARD 2016: 28-39 - [c4]Stephan Seifermann:
Architectural Data Flow Analysis. WICSA 2016: 270-271 - 2015
- [c3]Henning Groenda, Stephan Seifermann, Karin Müller, Gerhard Jaworek:
The Cooperate Assistive Teamwork Environment for Software Description Languages. AAATE Conf. 2015: 111-118 - [c2]Max E. Kramer, Michael Langhammer, Dominik Messinger, Stephan Seifermann, Erik Burger:
Change-Driven Consistency for Component Code, Architectural Models, and Contracts. CBSE 2015: 21-26 - [c1]Stephan Seifermann, Henning Groenda:
Towards Collaboration on Accessible UML Models. MuC (Workshopband) 2015: 411-417
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint