Quantcast
Channel: Latest Results
Browsing all 21 articles
Browse latest View live

Effiziente Implementierung von kryptografischen Datenaustauschformaten am...

ZusammenfassungKryptobibliotheken erlauben Programmierern, Sicherheitsfunktionalitäten in beliebige Anwendungen zu integrieren. Der Austausch von Daten zwischen verschiedenen Bibliotheken wird hierbei...

View Article



Unternehmensweites Datenschutzmanagement bei IBM

ZusammenfassungDer Schutz von Kundendaten gewinnt immer stärker an Bedeutung. Besonders im Bereich e-Commerce ist Datenschutz ein kritisches Problem. Auch im herkömmlichen Handel wächst dessen...

View Article

Platform for Enterprise Privacy Practices: Privacy-Enabled Management of...

AbstractEnterprises collect a large amount of personal data about their customers. Even though enterprises promise privacy to their customers using privacy statements or P3P, there is no methodology to...

View Article

A Toolkit for Managing Enterprise Privacy Policies

AbstractEnterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. An enterprise privacy policy often reflects different...

View Article

Fair Exchange

View Article


Contract Signing

View Article

Certified Mail

View Article

Privacy Injector — Automated Privacy Enforcement Through Aspects

AbstractProtection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge....

View Article


Service-oriented Assurance — Comprehensive Security by Explicit Assurances

AbstractFlexibility to adapt to changing business needs is a core requirement of today’s enterprises. This is addressed by decomposing business processes into services that can be provided by scalable...

View Article


Enhancing Grid Security Using Trusted Virtualization

AbstractGrid applications increasingly have sophisticated functional and security requirements. Current techniques mostly protect the grid resource provider from attacks by the grid user, while leaving...

View Article

Simplified Privacy Controls for Aggregated Services — Suspend and Resume of...

AbstractThe Internet is moving towards dynamic and ad-hoc service composition. The resulting so-called Web 2.0 sites maintain a unified user-experience while interacting and exchanging personal data...

View Article

Architecting Dependable and Secure Systems Using Virtualization

AbstractWe outline ways of leveraging virtualization for enhancing system dependability and security, and describe the practical realization of some of these enhancements using the Xen open-source...

View Article

Trusted Virtual Domains – Design, Implementation and Lessons Learned

AbstractA Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, storage) that are distributed over multiple physical platforms and share a common security...

View Article


Trustworthy Clouds Underpinning the Future Internet

AbstractCloud computing is a new service delivery paradigm that aims to provide standardized services with self-service, pay-per-use, and seemingly unlimited scalability. This paradigm can be...

View Article

Automated Information Flow Analysis of Virtualized Infrastructures

AbstractThe use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the complexity...

View Article


Certified Mail

View Article

TClouds

ZusammenfassungDas von der Europäischen Kommission gef:orderte Projekt „TClouds“ hat die Entwicklung einer sicheren und datenschutzkonformen Cloud-Infrastruktur zum Ziel. Dieser Beitrag beschreibt die...

View Article


Updaticator: Updating Billions of Devices by an Efficient, Scalable and...

AbstractSecure and fast distribution of software updates and patches is essential for improving functionality and security of computer systems. Today, each device downloads updates individually from a...

View Article

Data Security and Privacy in 2025?

AbstractSecurity research aims at reducing the risk and consequences of attacks on information technology. Based on the projection of current trends, this vision paper makes an attempt at identifying...

View Article

Trust and Trustworthy Computing

View Article
Browsing all 21 articles
Browse latest View live


Latest Images