Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2018Identity management and protection motivated by the general data protection regulation of the European Union - a conceptual framework based on state-of-the-art software technologies
Birnstill, Pascal; Krempel, Erik; Wagner, P.G.; Beyerer, Jürgen
Journal Article
2016Working and living in interactive environments - requirements for security and privacy
Krempel, Erik; Birnstill, Pascal; Beyerer, Jürgen
Conference Paper
2015Using extensible metadata definitions to create a vendor-independent SIEM system
Detken, Kai-Oliver; Scheuermann, Dirk; Hellmann, Bastian
Conference Paper
2014Towards trust assurance and certification in cyber-physical systems
Schneider, Daniel; Armengaud, Eric; Schoitsch, Erwin
Conference Paper
2012Attestation of mobile baseband stacks
Wagner, S.; Wessel, S.; Stumpf, F.
Conference Paper
2012Automatisches Erkennen mobiler Angriffe auf die IT-Infrastruktur
Detken, Kai-Oliver; Scheuermann, Dirk; Bente, Ingo; Westerkamp, Jürgen
Conference Paper
2012Trust and privacy management support for context-aware service platforms
Neisse, Ricardo
Dissertation
2011Approaching runtime trust assurance in open adaptive systems
Schneider, Daniel; Becker, Martin; Trapp, Mario
Conference Paper
2011Approaching runtime trust assurance in open adaptive systems
Schneider, Daniel; Becker, Martin; Trapp, Mario
Report
2011Implementing trust in cloud infrastructures
Neisse, Ricardo; Holling, Dominik; Pretschner, Alexander
Conference Paper
2009Attacking the BitLocker boot process
Türpe, S.; Poller, A.; Steffan, J.; Stotz, J.-P.; Trukenmüller, J.
Conference Paper
2009Information security
Euting, T.; Weimert, B.
Book Article
2008Attacking the BitLocker boot process
Türpe, S.; Poller, A.; Steffan, J.; Stotz, J.-P.; Trukenmüller, J.
Presentation
2008BitLocker Drive Encryption im mobilen und stationären Unternehmenseinsatz
Steffan, J.; Poller, A.; Trukenmüller, J.; Stotz, J.-P.; Türpe, S.
Report
2007Facilitating the use of TPM technologies through S&D pattern
Gürgens, S.; Rudolph, C.; Mana, A.; Munoz, A.
Conference Paper
2007Informationssicherheit
Euting, T.; Weimert, B.
Book Article
2007Protection of DVB systems by trusted computing
Kuntze, N.; Schmidt, A.U.
Presentation
2006A Mobile service architecture utilising trusted computing
Kuntze, Nicolai; Schmidt, Andreas U.
Presentation
2006Trusted Computing in Mobile Action
Kuntze, Nicolai; Schmidt, Andreas U.
Conference Paper