Ver­öf­fent­li­chun­gen

Ether­net com­mu­ni­ca­ti­on for de­tec­tion of emer­gen­cy lo­ca­ti­ons and dy­na­mic eva­cua­ti­on in un­der­ground in­fra­struc­tu­res

2010 - Dipl.-Ing. Chris­toph Mül­ler, Prof. Dr. Iuliu Sze­ke­ly, An­dre­as Noack

OPTIM 2010 - 12th In­ter­na­tio­nal Con­fe­rence on Op­ti­miza­t­i­on of Elec­tri­cal and Elec­tro­nic Equip­ment [Con­fe­rence Link]

Trusted Vir­tu­al Do­mains: Color Your Net­work

2010 - Luigi Ca­tuo­gno, Hans Löhr, Mark Ma­nu­lis, Ah­mad-Re­za Sa­de­ghi, Chris­ti­an Stüb­le, Mar­cel Wi­n­an­dy

Da­ten­schutz und Da­ten­si­cher­heit (DuD) 5/2010, p. 289-298. [Sprin­ger­Link] [PDF]

At­tack Sur­faces: A Ta­xo­no­my for At­tacks on Cloud Ser­vices

2010 - Meiko Jen­sen, Nils Grusch­ka

In Pro­cee­dings of the 3rd IEEE In­ter­na­tio­nal Con­fe­rence on Cloud Com­pu­ting (IEEE CLOUD 2010), Miami, FL, USA.

On In­ter­ope­ra­bi­li­ty Failu­res in WS-Se­cu­ri­ty: The XML Si­gna­tu­re Wrap­ping At­tack

2010 - Lijun Liao, Meiko Jen­sen, Flo­ri­an Kohlar, Nils Grusch­ka

In E. Kajan: Elec­tro­nic Busi­ness In­ter­ope­ra­bi­li­ty: Con­cepts, Op­por­tu­nities and Chal­len­ges, In­for­ma­ti­on Sci­ence Re­fe­rence, (to be pu­blis­hed in 2011).

Strea­ming-ba­sed ve­ri­fi­ca­ti­on of XML Si­gna­tu­res in SOAP Mes­sa­ges

2010 - Jörg Schwenk, Meiko Jen­sen,

In Pro­cee­dings of the IEEE 2010 In­ter­na­tio­nal Work­shop on Web Ser­vice and Busi­ness Pro­cess Se­cu­ri­ty (WSBPS 2010), Miami, FL, USA.

Towards an An­ony­mous Ac­cess Con­trol and Ac­coun­ta­bi­li­ty Sche­me for Cloud Com­pu­ting

2010 - Jörg Schwenk, Sven Schä­ge, Meiko Jen­sen,

In Pro­cee­dings of the 3rd IEEE In­ter­na­tio­nal Con­fe­rence on Cloud Com­pu­ting (IEEE CLOUD 2010), Miami, FL, USA. [IEEE]

Towards Au­to­ma­ted Pro­ces­sing of the Right of Ac­cess in In­ter-Or­ga­niza­t­io­nal Web Ser­vice Com­po­si­ti­ons

2010 - Meiko Jen­sen, Ralph Her­ken­hö­ner, Hen­rich C. Pöhls, Her­mann de Meer

In Pro­cee­dings of the IEEE 2010 In­ter­na­tio­nal Work­shop on Web Ser­vice and Busi­ness Pro­cess Se­cu­ri­ty (WSBPS 2010), Miami, FL, USA.

A Sur­vey of At­tacks in the Web Ser­vices World

2010 - Meiko Jen­sen, Nils Grusch­ka

In C. Gutier­rez, E. Fer­nan­dez-Me­di­na, M. Piat­ti­ni: Web Ser­vices Se­cu­ri­ty De­ve­lop­ment and Ar­chi­tec­tu­re, In­for­ma­ti­on Sci­ence Re­fe­rence, ISBN: 978-1-60566-950-2, 2010.

A CDH-Ba­sed Ring Si­gna­tu­re Sche­me with Short Si­gna­tu­res and Pu­blic Keys

2010 - Jörg Schwenk, Sven Schä­ge,

Fi­nan­ci­al Cryp­to­gra­phy Four­teen­th In­ter­na­tio­nal Con­fe­rence, FC 2010, Te­ne­ri­fe, Spain, Ja­nu­a­ry 25-28, 2010. [Sprin­ger Link]

A De­sign Pat­tern for Event-Ba­sed Pro­ces­sing of Se­cu­ri­ty-en­ri­ched SOAP Mes­sa­ges

2010 - Meiko Jen­sen, Nils Grusch­ka, Luigi Lo Ia­co­no

Pro­cee­dings of the Se­cond In­ter­na­tio­nal Work­shop on Se­cu­ri­ty As­pects in Grid and Cloud Com­pu­ting (SAGC 2010), Kra­kow, Po­land.
Seite: