Quantcast
Channel: Latest Results
Browsing latest articles
Browse All 21 View Live

Unternehmensweites Datenschutzmanagement bei IBM

ZusammenfassungDer Schutz von Kundendaten gewinnt immer stärker an Bedeutung. Besonders im Bereich e-Commerce ist Datenschutz ein kritisches Problem. Auch im herkömmlichen Handel wächst dessen...

View Article



Platform for Enterprise Privacy Practices: Privacy-Enabled Management of...

AbstractEnterprises collect a large amount of personal data about their customers. Even though enterprises promise privacy to their customers using privacy statements or P3P, there is no methodology to...

View Article

A Toolkit for Managing Enterprise Privacy Policies

AbstractEnterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. An enterprise privacy policy often reflects different...

View Article

Fair Exchange

View Article

Contract Signing

View Article


Certified Mail

View Article

Privacy Injector — Automated Privacy Enforcement Through Aspects

AbstractProtection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge....

View Article

Service-oriented Assurance — Comprehensive Security by Explicit Assurances

AbstractFlexibility to adapt to changing business needs is a core requirement of today’s enterprises. This is addressed by decomposing business processes into services that can be provided by scalable...

View Article


Enhancing Grid Security Using Trusted Virtualization

AbstractGrid applications increasingly have sophisticated functional and security requirements. Current techniques mostly protect the grid resource provider from attacks by the grid user, while leaving...

View Article


Simplified Privacy Controls for Aggregated Services — Suspend and Resume of...

AbstractThe Internet is moving towards dynamic and ad-hoc service composition. The resulting so-called Web 2.0 sites maintain a unified user-experience while interacting and exchanging personal data...

View Article

Architecting Dependable and Secure Systems Using Virtualization

AbstractWe outline ways of leveraging virtualization for enhancing system dependability and security, and describe the practical realization of some of these enhancements using the Xen open-source...

View Article

Trusted Virtual Domains – Design, Implementation and Lessons Learned

AbstractA Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, storage) that are distributed over multiple physical platforms and share a common security...

View Article

Trustworthy Clouds Underpinning the Future Internet

AbstractCloud computing is a new service delivery paradigm that aims to provide standardized services with self-service, pay-per-use, and seemingly unlimited scalability. This paradigm can be...

View Article


Automated Information Flow Analysis of Virtualized Infrastructures

AbstractThe use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the complexity...

View Article

Certified Mail

View Article


TClouds

ZusammenfassungDas von der Europäischen Kommission gef:orderte Projekt „TClouds“ hat die Entwicklung einer sicheren und datenschutzkonformen Cloud-Infrastruktur zum Ziel. Dieser Beitrag beschreibt die...

View Article

Updaticator: Updating Billions of Devices by an Efficient, Scalable and...

AbstractSecure and fast distribution of software updates and patches is essential for improving functionality and security of computer systems. Today, each device downloads updates individually from a...

View Article


Data Security and Privacy in 2025?

AbstractSecurity research aims at reducing the risk and consequences of attacks on information technology. Based on the projection of current trends, this vision paper makes an attempt at identifying...

View Article

Trust and Trustworthy Computing

View Article

SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices

AbstractThe Internet of Things (IoT) is connecting billions of smart devices. One of the emerging challenges in the IoT scenario is how to efficiently and securely manage large deployments of devices....

View Article
Browsing latest articles
Browse All 21 View Live




Latest Images