Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2019Enabling dynamic IoT security domains
Corici, Andreea Ancuta; Shashi, Yatindra; Corici, Marius; Shrestha, Ranjan; Guzman, David
Conference Paper
2018Distributed usage control enforcement through trusted platform modules and SGX enclaves
Wagner, P.; Birnstill, Pascal; Beyerer, Jürgen
Conference Paper
2018A look at feet: Recognizing tailgating via capacitive sensing
Siegmund, Dirk; Dev, Sudeep; Fu, Biying; Scheller, Doreen; Braun, Andreas
Conference Paper
2017IoT Border Gateway Remote Access and Security in Connecting Multiple IoT Autonomous Systems
Alhareeqi, Mohammad
: Jarke, Matthias; Prinz, Wolfgang
Master Thesis
2017Secure free-floating car sharing for offline cars
Dmitrienko, Alexandra; Plappert, Christian
Conference Paper
2017The trouble with security requirements
Türpe, Sven
Conference Paper
2016Industrie 4.0: Wie Unternehmen ihre Daten heute sichern
Jung, Christian
Report
2016Verifying isolation in a mantrap portal via thermal imaging
Siegmund, Dirk; Handtke, David; Kaehm, Olga
Conference Paper
2014Biometrie: Technik, Mythen, Praxisbeispiele
Nouak, Alexander
Journal Article
2014Dynamic analysis of usage control policies
Elrakaiby, Yehia; Pang, Jun
Conference Paper
2014Model-based specification and refinement of usage control policies
Neisse, Ricardo; Doerr, Joerg
Report
2013Centralized approach for a site independent wireless network access
Nose, Jan David
: Kuijper, Arjan (Gutachter)
Bachelor Thesis
2013Sichere Nutzung von Cloud-Speicherdiensten
Kalabis, Lukas; Kunz, Thomas; Wolf, Ruben
Journal Article
2013Zugriffskontrolle in intelligenten Umgebungen
Schreiber, Dominik
: Kuijper, Arjan (1. Gutachter); Tazari, Mohammad-Reza (Gutachter)
Bachelor Thesis
2012Flexible data-driven security for android
Feth, Denis; Pretschner, Alexander
Conference Paper
2012Flexible data-driven security for android
Feth, Denis; Pretschner, Alexander
Report
2012Privacy-aware access control for video data in intelligent surveillance systems
Vagts, Hauke; Jakoby, Andreas
Conference Paper
2011Access controls for privacy protection in pervasive environments
Vagts, Hauke; Krempel, Erik; Fischer, Yvonne
Conference Paper
2011Addressing security issues in the autonomic Future Internet
Rebahi, Y.; Tcholtchev, N.; Chaparadza, R.; Merekoulias, V.N.
Conference Paper
2010Assistenz mit rechtsverbindlicher und sicherer Daten-Aggregation für den Zugriff auf ad-hoc integrierbare Leitungsnetzbezogene GeoGovernment-Services
Rüh, Christian
: Flach, Guntram (Betreuer); Audersch, Stefan (Betreuer)
Master Thesis
2010A configurable, heterogeneous device cloud for web applications
Gorges, Hannes
: Popescu-Zeletin, Radu (Betreuer); Kleinfeld, Robert (Betreuer)
Thesis
2010Enterprise Rights Management - Eine neue Ära beim Schutz von Engineering-Know-How
Mesing, Benjamin; Welsch, Jochen-Michael; Lukas, Uwe von
Journal Article
2009Access control and surveillance
Nouak, Alexander; Hahn, Volker
Book Article
2009Knowledge-based Grid-Services in adaptiven, unternehmensübergreifenden Wartungs- und Instandhaltungsumgebungen
Neumann, Tim
: Flach, Guntram (Betreuer); Ruth, Thomas (Betreuer)
Thesis
2009Policy evolution in distributed usage control
Pretschner, Alexander; Schütz, F.; Schaefer, C.; Walter, T.
Journal Article, Conference Paper
2008Improving border control with 3D face recognition
Welti, Paul; Suchier, Jean-Marc; Busch, Christoph
Conference Paper
2007A holistic approach to security policies - policy distribution with XACML over COPS
Peters, J.; Rieke, R.; Rochaeli, T.; Steinemann, B.; Wolf, R.
Conference Paper, Journal Article
2006SecAS '06 - Security in Autonomous Systems
: Accorsi, R.; Peters, J.
Conference Proceedings
2005Biometrie
Euting, T.
Journal Article
2005Keeping the learning history
Godehardt, E.; Bhatti, N.; Hornung, C.
Conference Paper
2004Modeling critical infrastructure requirements
Wolthusen, S.
Conference Paper
2004A PIN-entry method resilient against shoulder surfing
Roth, V.; Richter, K.; Freidinger, R.
Conference Paper
2003Context-dependent access control for web-based collaboration environments with role-based approach
Wolf, R.; Schneider, M.
Conference Paper
2003Evaluierung von Gesichtserkennungssystemen - Projekt BioFace
Busch, C.; Daum, H.; Graf, F.
Conference Paper
2003A model for content-dependent access control for Web-based services with role-based approach
Schneider, M.; Wolf, R.; Keinz, T.
Conference Paper
2003ReEncryption - Ein Konzept für den umfassenden Dokumentenschutz
Wolthusen, S.; Prediger, F.
Conference Paper
2002Development of security protocols and new approaches to application servie providing for mobile devices
Schwalm, S.
: Jalali-Sohi, M. (Prüfer)
Thesis
2002New security protocols and approaches to application service providing for mobile devices on internet
Jalali-Sohi, M.; Schwalm, S.
Conference Paper
2001Analysis of IEEE 802.11 in a power line system
Langguth, T.; Zeller, M.; Steckenbiller, H.; Knorr, R.
Conference Paper
2001Layered multipoint network defense and security policy enforcement
Wolthusen, S.
Conference Paper
2001Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
Wolthusen, S.
Conference Paper
1998Access control and key management for Mobile Agents
Roth, V.; Jalali-Sohi, M.
Journal Article
1997Technische Möglichkeiten zum Schutze des Urheberrechts
Koch, E.
Conference Paper
1996Copyright protection for multimedia data
Koch, E.; Rindfrey, J.; Zhao, J.
Book Article
1996Management of a public key certification infrastructure - experiences from the DeTeBerkom project BMSec
Gehrke, M.; Hetschold, T.
Journal Article
1995Automatische Personenidentifikation durch Analyse von Lippenbewegungen und Sprache
Wagner, T.
Journal Article
1995Eintritt nur für Berechtigte - Zugangskontrolle mit dem optoakustischen System Sesam
Wagner, T.; Raguse-Fößel, A.
Journal Article
1994Combined motion and voice analysis for the identification of persons with synergetic computers
Wagner, T.; Dieckmann, U.
Conference Paper
1994Copyright Protection for Multimedia Data
Koch, E.; Rindfrey, J.; Zhou, J.
Conference Paper
1994Face recognition with the synergetic computer
Frischholz, R.W.; Böbel, F.G.; Spinnler, K.P.
Conference Paper
1994Multi-sensorial inputs for opto-acoustic identification with synergetic computers
Wagner, T.; Tolkien, B.; Böbel, F.G.
Conference Paper
1994Multi-sensorial inputs for the identification of persons with synergetic computers
Wagner, T.; Dieckmann, U.
Conference Paper