Veröffentlichungen
Ethernet communication for detection of emergency locations and dynamic evacuation in underground infrastructures
2010 - Dipl.-Ing. Christoph Müller, Prof. Dr. Iuliu Szekely, Andreas Noack
OPTIM 2010 - 12th International Conference on Optimization of Electrical and Electronic Equipment [Conference Link]Trusted Virtual Domains: Color Your Network
2010 - Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Datenschutz und Datensicherheit (DuD) 5/2010, p. 289-298. [SpringerLink] [PDF]Attack Surfaces: A Taxonomy for Attacks on Cloud Services
2010 - Meiko Jensen, Nils Gruschka
In Proceedings of the 3rd IEEE International Conference on Cloud Computing (IEEE CLOUD 2010), Miami, FL, USA.On Interoperability Failures in WS-Security: The XML Signature Wrapping Attack
2010 - Lijun Liao, Meiko Jensen, Florian Kohlar, Nils Gruschka
In E. Kajan: Electronic Business Interoperability: Concepts, Opportunities and Challenges, Information Science Reference, (to be published in 2011).Streaming-based verification of XML Signatures in SOAP Messages
2010 - Jörg Schwenk, Meiko Jensen,
In Proceedings of the IEEE 2010 International Workshop on Web Service and Business Process Security (WSBPS 2010), Miami, FL, USA.Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing
2010 - Jörg Schwenk, Sven Schäge, Meiko Jensen,
In Proceedings of the 3rd IEEE International Conference on Cloud Computing (IEEE CLOUD 2010), Miami, FL, USA. [IEEE]Towards Automated Processing of the Right of Access in Inter-Organizational Web Service Compositions
2010 - Meiko Jensen, Ralph Herkenhöner, Henrich C. Pöhls, Hermann de Meer
In Proceedings of the IEEE 2010 International Workshop on Web Service and Business Process Security (WSBPS 2010), Miami, FL, USA.A Survey of Attacks in the Web Services World
2010 - Meiko Jensen, Nils Gruschka
In C. Gutierrez, E. Fernandez-Medina, M. Piattini: Web Services Security Development and Architecture, Information Science Reference, ISBN: 978-1-60566-950-2, 2010.A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys
2010 - Jörg Schwenk, Sven Schäge,
Financial Cryptography Fourteenth International Conference, FC 2010, Tenerife, Spain, January 25-28, 2010. [Springer Link]A Design Pattern for Event-Based Processing of Security-enriched SOAP Messages
2010 - Meiko Jensen, Nils Gruschka, Luigi Lo Iacono
Proceedings of the Second International Workshop on Security Aspects in Grid and Cloud Computing (SAGC 2010), Krakow, Poland.