Unternehmensweites Datenschutzmanagement bei IBM
ZusammenfassungDer Schutz von Kundendaten gewinnt immer stärker an Bedeutung. Besonders im Bereich e-Commerce ist Datenschutz ein kritisches Problem. Auch im herkömmlichen Handel wächst dessen...
View ArticlePlatform for Enterprise Privacy Practices: Privacy-Enabled Management of...
AbstractEnterprises collect a large amount of personal data about their customers. Even though enterprises promise privacy to their customers using privacy statements or P3P, there is no methodology to...
View ArticleA Toolkit for Managing Enterprise Privacy Policies
AbstractEnterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. An enterprise privacy policy often reflects different...
View ArticlePrivacy Injector — Automated Privacy Enforcement Through Aspects
AbstractProtection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge....
View ArticleService-oriented Assurance — Comprehensive Security by Explicit Assurances
AbstractFlexibility to adapt to changing business needs is a core requirement of today’s enterprises. This is addressed by decomposing business processes into services that can be provided by scalable...
View ArticleEnhancing Grid Security Using Trusted Virtualization
AbstractGrid applications increasingly have sophisticated functional and security requirements. Current techniques mostly protect the grid resource provider from attacks by the grid user, while leaving...
View ArticleSimplified Privacy Controls for Aggregated Services — Suspend and Resume of...
AbstractThe Internet is moving towards dynamic and ad-hoc service composition. The resulting so-called Web 2.0 sites maintain a unified user-experience while interacting and exchanging personal data...
View ArticleArchitecting Dependable and Secure Systems Using Virtualization
AbstractWe outline ways of leveraging virtualization for enhancing system dependability and security, and describe the practical realization of some of these enhancements using the Xen open-source...
View ArticleTrusted Virtual Domains – Design, Implementation and Lessons Learned
AbstractA Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, storage) that are distributed over multiple physical platforms and share a common security...
View ArticleTrustworthy Clouds Underpinning the Future Internet
AbstractCloud computing is a new service delivery paradigm that aims to provide standardized services with self-service, pay-per-use, and seemingly unlimited scalability. This paradigm can be...
View ArticleAutomated Information Flow Analysis of Virtualized Infrastructures
AbstractThe use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the complexity...
View ArticleTClouds
ZusammenfassungDas von der Europäischen Kommission gef:orderte Projekt „TClouds“ hat die Entwicklung einer sicheren und datenschutzkonformen Cloud-Infrastruktur zum Ziel. Dieser Beitrag beschreibt die...
View ArticleUpdaticator: Updating Billions of Devices by an Efficient, Scalable and...
AbstractSecure and fast distribution of software updates and patches is essential for improving functionality and security of computer systems. Today, each device downloads updates individually from a...
View ArticleData Security and Privacy in 2025?
AbstractSecurity research aims at reducing the risk and consequences of attacks on information technology. Based on the projection of current trends, this vision paper makes an attempt at identifying...
View ArticleSCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices
AbstractThe Internet of Things (IoT) is connecting billions of smart devices. One of the emerging challenges in the IoT scenario is how to efficiently and securely manage large deployments of devices....
View Article
More Pages to Explore .....