Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2017Data residency challenges and opportunities for standardization
Abramson, Mike; Arbuckle, Brian; Baudoin, Claude; Dani, Jayant; DiPaula-Coyle, Michael; Gawade, Preetam; Gharote, Mangesh; Harris, David; Iyengar, Sridhar; Jung, Christian; Kumar Nutheti, Kiran; O'Neill, Dennis; Scaduto, Justin; Schalk, Karolyn; Schwarz, Reinhard; Stavros, Nick; Tessier, Denise; Tumashov, Alex; Wales, Char
Bericht
2017IT-Sicherheit für Bankenrechenzentren: Cyberrisiken bis in die Kern-Geschäftsprozesse analysieren
Großmann, Jürgen; Viehmann, Johannes
Zeitschriftenaufsatz
2017A User-Centered Model for Usable Security and Privacy
Feth, Denis; Maier, Andreas; Polst, Svenja
Bericht
2016Context-aware mobile security
Jung, Christian; Feth, Denis
Bericht
2016The context-dependence of citizens’ attitudes and preferences regarding privacy and security
Friedewald, Michael; Lieshout, Marc van; Rung, Sven; Ooms, Merel
Aufsatz in Buch
2016Efficient authorization authority certificate distribution in VANETs
Bittl, Sebastian; Roscher, Karsten
Konferenzbeitrag
2016Feasibility of Verify-on-Demand in VANETs
Bittl, Sebastian; Roscher, Karsten
Konferenzbeitrag
2016A framework for a uniform quantitative description of risk with respect to safety and security
Beyerer, Jürgen; Geisler, Jürgen
Zeitschriftenaufsatz
2016Industrial Data Space. Digital Souvereignity Over Data
Otto, Boris; Jürjens, Jan; Schon, Jochen; Auer, Sören; Menz, Nadja; Wenzel, Sven; Cirullies, Jan
: Cirullies, Jan (Redaktion)
Bericht
2016Industrial Data Space. Digitale Souveränität über Daten
Otto, Boris; Jürjens, Jan; Schon, Jochen; Auer, Sören; Menz, Nadja; Wenzel, Sven; Cirullies, Jan
: Cirullies, Jan (Redaktion)
Bericht
2016Knowledge-driven scenario development for critical infrastructure protection
Xie, Jingquan; Theocharidou, Marianthi; Barbarin, Yohan
Konferenzbeitrag
2016Modelling the relationship between privacy and security perceptions and the acceptance of surveillance practices
Friedewald, Michael; Lieshout, Marc van; Rung, Sven
Konferenzbeitrag
2016Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures
Krauß, D.; Thomalla, Christoph
Konferenzbeitrag
2016Quantitative IT-Sicherheitsbewertung von Authentifizierungs- und Autorisierungsverfahren
Hofbauer, Brigitte
: Handel, Peter (Erstbegutachter); Hudler, Peter (Zweitbegutachter)
Master Thesis
2016Secure and interoperable communication infrastructures for PPDR organisations
Müller, Wilmuth; Marques, H.; Pereira, L.; Rodriguez, J.; Brouwer, F.; Bouwers, B.; Politis, I.; Lykourgiotis, A.; Ladas, A.; Adigun, O.; Jelenc, D.
Konferenzbeitrag
2016Security patterns modeling and formalization for pattern-based development of secure software systems
Hamid, Brahim; Gürgens, Sigi; Fuchs, Andreas
Zeitschriftenaufsatz
2016Working and living in interactive environments - requirements for security and privacy
Krempel, Erik; Birnstill, Pascal; Beyerer, Jürgen
Konferenzbeitrag
2015Automatic derivation of context descriptions
Jung, Christian; Feth, Denis; Elrakaiby, Yehia
Konferenzbeitrag
2015Civilizing drones - military discourses going civil?
Braun, Sven; Friedewald, Michael; Valkenburg, G.
Zeitschriftenaufsatz
2015Dealing with uncertainty in context-aware mobile applications
Jung, Christian; Eitel, Andreas; Feth, Denis; Rudolph, Manuel
Konferenzbeitrag
2015Distribution of pseudonym certificates via bursts for VANETs with low and medium mobility
Bittl, Sebastian; Aydinli, Berke; Roscher, Karsten
Konferenzbeitrag
2015Effective certificate distribution in ETSI ITS VANETs using implicit and explicit requests
Bittl, Sebastian; Aydinli, Berke; Roscher, Karsten
Konferenzbeitrag
2015Efficient distribution of static or slowly changing configuration parameters in VANETs
Bittl, Sebastian
Konferenzbeitrag
2015Efficient rate-adaptive certificate distribution in VANETs
Bittl, Sebastian; Aydinli, Berke; Roscher, Karsten
Konferenzbeitrag
2015Emerging attacks on VANET security based on GPS time spoofing
Bittl, Sebastian; Gonzalez, Arturo A.; Myrtus, Matthias; Beckmann, Hanno; Sailer, Stefan; Eissfeller, Bernd
Konferenzbeitrag
2015Five major reasons why safety and security haven't married (yet)
Amorim, Tiago Luiz Buarque de; Schneider, Daniel; Nguyen, Viet Yen; Schmittner, Christoph; Schoitsch, Erwin
Zeitschriftenaufsatz
2015Multi-level user and role concept for a secure plug-and-work based on OPC UA and AutomationML
Schleipen, Miriam; Selyansky, E.; Henssen, Robert; Bischoff, Tino
Konferenzbeitrag
2015Privacy and security perceptions of European citizens: A test of the trade-off model
Friedewald, Michael; Lieshout, Marc van; Rung, Sven; Ooms, Merel; Ypma, Jelmer
Konferenzbeitrag
2015Privacy endangerment from protocol data sets in VANETs and countermeasures
Bittl, Sebastian; Gonzalez, Arturo A.
Konferenzbeitrag
2015Privacy issues and pitfalls in VANET standards
Bittl, Sebastian; Gonzalez, Arturo A.
Konferenzbeitrag
2015A quantitative risk model for a uniform description of safety and security
Beyerer, Jürgen; Geisler, Jürgen
Konferenzbeitrag
2015SafetyPIN: Secure PIN entry through eye tracking
Seetharama, Mythreya; Paelke, Volker; Röcker, Carsten
Konferenzbeitrag
2015Security overhead and its impact in VANETs
Bittl, Sebastian; Roscher, Karsten; Gonzalez, Arturo A.
Konferenzbeitrag
2015Towards the next generation training system for crisis management
Xie, Jingquan; Vullings, Erik; Theocharidou, Marianthi
Vortrag
2015User-centric security. Optimization of the security-usability trade-off
Feth, Denis
Konferenzbeitrag
2014Advanced certificate distribution strategies for secure car-to-X communication with realistic simulations
Aydinli, Berke
: Sigl, Georg (Betreuer); Bittl, Sebastian (Betreuer)
Master Thesis
2014An asset to security modeling? Analyzing stakeholder collaborations instead of threats to assets
Poller, Andreas; Türpe, Sven; Kinder-Kurlanda, Katharina
Konferenzbeitrag
2014Attack potential and efficient security enhancement of automotive bus networks using short MACs with rapid key change
Bittl, Sebastian
Konferenzbeitrag
2014Automatic derivation of context descriptions
Jung, Christian; Feth, Denis; Elrakaiby, Yehia
Bericht
2014Efficient construction of infinite length hash chains with perfect forward secrecy using two independent hash functions
Bittl, Sebastian
Konferenzbeitrag
2014EMC² AIPP, ARTEMIS CALL 2013
Schneider, Daniel; Armengaud, Eric; Schoitsch, Erwin; Hufeld, Knut
Zeitschriftenaufsatz
2014Enhancing cloud security with context-aware usage control policies
Jung, Christian; Eitel, Andreas; Schwarz, Reinhard
Bericht
2014Enhancing cloud security with context-aware usage control policies
Jung, Christian; Eitel, Andreas; Schwarz, Reinhard
Konferenzbeitrag
2014Future threat scenarios for identifying societal security needs - the methodological approach based on European Project Ettis
Dönitz, Ewa; Shala, Erduana; Leimbach, Timo
Konferenzbeitrag
2014More safety for football events. Improving the communication of stakeholders and the dialogue with supporters
Moßgraber, Jürgen; Kubera, T.; Werner, A.
Konferenzbeitrag
2014OrchSec Demo: Demonstrating the Capability of an Orchtestrator-based Architecture for Network Security
Zaalouk, Adel; Khondoker, Rahamatullah; Marx, Ronald; Bayarou, Kpatcha
Vortrag
2014Risk management for outsourcing to the cloud. Security risks and safeguards as selection criteria for extern cloud services
Viehmann, Johannes
Konferenzbeitrag
2014Schwachstellenanalyse mittels klassischer Internet-Suchmaschinen
Opp, Axel
: Diehl, Norbert (Supervisor); Simon, Kai (Supervisor)
Master Thesis
2014Taking in-network security to the next level with software-defined networking
Zaalouk, Adel
: Wehrle, Klaus; Hummen, Rene; Waidner, Michael; Khondoker, Rahamatullah; Marx, Ronald
Master Thesis
2014Towards trust assurance and certification in cyber-physical systems
Schneider, Daniel; Armengaud, Eric; Schoitsch, Erwin
Konferenzbeitrag
2014User-friendly and tailored policy administration points
Rudolph, Manuel
Bericht
2013Applications and methods with high energy CT systems
Salamon, Michael; Boehnel, Michael; Reims, Nils; Ermann, Gerald; Voland, Virginia; Schmitt, Michael; Uhlmann, Norman; Hanke, Randolf
Konferenzbeitrag
2013Berührungspunkte und übergreifende Risiken des Security- und Safety Engineering durch die Vernetzung elektronischer Automobilsysteme mit Internet-Konnektivität
Robinson-Mallett, Christopher; Großmann, Jürgen; Kaiser, Bernd
Konferenzbeitrag
2013COMPOSE - a journey from the internet of things to the internet of services
Mandler, Benny; Antonelli, Fabio; Kleinfeld, Robert; Pedrinaci, Carlos; Carrera, David; Gugliotta, Alessio; Schreckling, Daniel; Carreras, Iacopo; Raggett, Dave; Pous, Marc; Villares, Carmen V.; Trifa, Vlad
Konferenzbeitrag
2013Context-aware Policy Enforcement for Android
Jung, Christian; Feth, Denis; Seise, Christian
Bericht
2013Context-aware policy enforcement for Android
Jung, Christian; Feth, Denis; Seise, Christian
Konferenzbeitrag
2013Designing scalar quantizers with secrecy constraints
Almeida, João; Maierbacher, Gerhard; Barros, João
Konferenzbeitrag
2013Experience made using public cloud infrastructure to analyse clinical patient data
Ziegler, Wolfgang; Ihle, Matthias; Claus, Steffen; Senger, Philipp; Mohebbi, Pooya; Khan, Zakir; Fluck, Juliane; Griebel, Lena; Sedlmayr, Martin; Berger, Florian; Laufer, Julian; Chatziastros, Astros; Drepper, Johannes
Konferenzbeitrag
2013Future small unmanned aerial systems - how to protect people at mass events against attacks by use of small drones?
Huppertz, Guido
Poster
2013A global approach to risk assessment of critical infrastructures
Rome, Erich; Antonio, Di Pietro; Pollino, Maurizio; D'Agostino, Gregorio; Rosato, Vittorio
Abstract
2013Identification of emerging technologies and critical dependencies relevant to CBRN protection
Burbiel, Joachim; Schietke, Ruth
Poster
2013Identification of emerging technologies with security implications: Experience and results from the ETCETERA project
Wepner, Beatrix; Huppertz, Guido
Konferenzbeitrag
2013Identification of emerging technologies with security implications: Experience and results from WP4 of the ETCETERA project
Huppertz, Guido
Konferenzbeitrag
2013IoT reference architecture
Bauer, Martin; Boussard, Mathieu; Bui, Nicola; Loof, Jourik de; Magerkurth, Carsten; Meissner, Sefan; Nettsträter, Andreas; Stefa, Julinda; Thoma, Matthias; Walewski, Joachim W.
Aufsatz in Buch
2013OPENi - future of a consumer-centric cloud-based application platform
Kleinfeld, Robert; Radziwonowicz, Lukasz; Griffin, Leigh; Robson, Eric; Lampathaki, Fenareti
Konferenzbeitrag
2013Privacy preserving surveillance and the tracking-paradox
Greiner, S.; Birnstill, Pascal; Krempel, Erik; Beckert, B.; Beyerer, Jürgen
Konferenzbeitrag
2013Quality assessment in context of multicore processors
Piebeng, Gauss Romuald
: Rombach, H. Dieter (Supervisor); Plociennik, Christiane (Supervisor); Lampasona, Constanza (Supervisor)
Bachelor Thesis
2013Results of the ETCETERA project
Burbiel, Joachim; Schietke, Ruth
Konferenzbeitrag
2013Service design studio for SaaS
Steinbuss, Sebastian; Flake, Stephan; Ley, Martin; Schmülling, Christian; Tacken, Jürgen
Aufsatz in Buch
2013Sicher in vernetzten Systemen. Integrative Betrachtung von funktionaler Sicherheit und Security
Kemmann, Sören; Kalmar, Ralf; Schwarz, Reinhard
Zeitschriftenaufsatz
2013Talking about technologies: Science meets Military
Schulte, Anna; Vergin, Annika; John, Marcus; Burbiel, Joachim; Wellbrink, Jörg
Konferenzbeitrag
2012Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters
Bißmeyer, Norbert; Mauthofer, Sebastian; Bayarou, Kpatcha M.; Kargl, Frank
Konferenzbeitrag
2012Citizens' perceptions of data protection and privacy in Europe
Hallinan, Dara; Friedewald, Michael; McCarthy, Paul
Zeitschriftenaufsatz
2012Computational verification of C protocol implementations by symbolic execution
Aizatulin, M.; Gordon, D.; Jürjens, J.
Konferenzbeitrag
2012Creating and applying security goal indicator trees in an industrial environment
Jung, Christian; Elberzhager, Frank; Bagnato, Alessandra; Raiteri, Fabio
Bericht
2012Creating and Applying Security Goal Indicator Trees in an Industrial Environment
Bagnato, Alessandra; Raiteri, Fabio; Jung, Christian; Elberzhager, Frank
Aufsatz in Buch
2012D7.4 ACRIMAS Website online
Pastuszka, Hans-Martin
Bericht
2012Flexible data-driven security for android
Feth, Denis; Pretschner, Alexander
Konferenzbeitrag
2012Flexible data-driven security for android
Feth, Denis; Pretschner, Alexander
Bericht
2012Granular deleting in multi level security models - an electronic engineering approach
Thorleuchter, Dirk; Weck, Gerhard; Poel, Dirk van den
Konferenzbeitrag
2012Hollow fiber based quantum cascade laser spectrometer for fast and sensitive drug identification
Herbst, Johannes; Scherer, Benjamin; Ruf, Alexander; Erb, Jochen; Lambrecht, Armin
Konferenzbeitrag
2012Localization and tracking of radioactive source carriers in person streams
Wieneke, Monika; Koch, Wolfgang; Friedrich, Hermann; Chmel, Sebastian
Konferenzbeitrag
2012A novel framework for efficient mobility data verification in vehicular ad-hoc networks
Jaeger, A.; Bißmeyer, N.; Stübing, H.; Huss, S.A.
Zeitschriftenaufsatz
2012On the security of cloud storage services
Borgman, Moritz; Hahn, Tobias; Herfert, Michael; Kunz, Thomas; Richter, Marcel; Viebeg, Ursula; Vowé, Sven
: Waidner, Michael
Studie
2012OPTIMIS: A holistic approach to cloud service provisioning
Juan Ferrer, A.; Hernández, F.; Tordsson, J.; Elmroth, E.; Ali-Eldin, A.; Zsigri, C.; Sirvent, R.; Guitart, J.; Badia, R.M.; Djemame, K.; Ziegler, W.; Dimitrakos, T.; Nair, S.K.; Kousiouris, G.; Konstanteli, K.; Varvarigou, T.; Hudzia, B.; Kipp, A.; Wesner, S.; Corrales, M.; Forgo, N.; Sharif, T.; Sheridan, C.
Zeitschriftenaufsatz
2012Privacy-aware access control for video data in intelligent surveillance systems
Vagts, Hauke; Jakoby, Andreas
Konferenzbeitrag
2012Service Design Studio (SDS) - the execution environment for the service design studio
Iscan, Hülya; Flake, Stephan; Tacken, Jürgen; Ley, Martin; Schmülling, Christian
Vortrag
2012Sicherheits- und Datenschutzanforderungen an Smart Grid-Technologien
Schriegel, Sebastian; Jasperneite, Jürgen
Zeitschriftenaufsatz
2012SLA-based management of software licenses as web service resources in distributed computing infrastructures
Cacciari, Claudio; Mallmann, Daniel; D'Andria, Francesco; Hagemeier, Björn; Rumpl, Angela; Ziegler, Wolfgang; Zsigri, Csilla; Martrat, Josep
Zeitschriftenaufsatz
2012Usability based modeling for advanced IT-security - an electronic engineering approach
Thorleuchter, Dirk; Weck, Gerhard; Van den Poel, Dirk
Konferenzbeitrag
2012The webinos project
Fuhrhop, C.; Lyle, J.; Faily, S.
Konferenzbeitrag
2011Car2X communication: Securing the last meter
Schweppe, H.; Roudier, Y.; Weyl, B.; Apvrille, L.; Scheuermann, D.
Konferenzbeitrag
2011Cloud Computing 2011 - Ziele, Bedenken und Fragestellungen hinsichtlich Softwareentwicklung
Adam, Sebastian; Karjalajnen, Lena; Nunnenmacher, Sabine; Jung, Jessica; Olbrich, Steffen; Zimmermann, Fabian; Heintz, Matthias
Bericht
2011The ETSI TVRA security-measurement methodology by means of TTCN-3 Notation
Meer, J. de; Rennoch, A.
Vortrag
2011High granular multi-level-security model for improved usability
Thorleuchter, Dirk; Poel, Dirk van den
Konferenzbeitrag
2011Implementing trust in cloud infrastructures
Neisse, Ricardo; Holling, Dominik; Pretschner, Alexander
Konferenzbeitrag
2011Model-based security testing. Selected considerations
Schieferdecker, I.; Großmann, J.; Rennoch, A.
Vortrag
2011Security evaluation of service-oriented systems with an extensible knowledge base
Jung, Christian; Rudolph, Manuel; Schwarz, Reinhard
Konferenzbeitrag
2011Security evaluation of service-oriented systems with an extensible knowledge base
Jung, Christian; Rudolph, Manuel; Schwarz, Reinhard
Bericht
2011Security testing approaches in industry and standardization
Schieferdecker, I.; Rennoch, A.; Großmann, J.
Konferenzbeitrag
2011Security testing techniques
: Richier, J.-L. (Ed.)
Bericht
2011Semantic technology classification - a defence and security case study
Thorleuchter, Dirk; Poel, Dirk van den
Konferenzbeitrag
2010Increasing security and privacy in user-centric identity management: The IdM card approach
Marx, R.; Simo Fhom, H.; Scheuermann, D.; Bayarou, K.M.; Perez, A.
Konferenzbeitrag
2010Indicator-based architecture-level security evaluation in a service-oriented environment
Antonino, Pablo; Duszynski, Slawomir; Jung, Christian; Rudolph, Manuel
Bericht
2010Indicator-based architecture-level security evaluation in a service-oriented environment
Antonino, Pablo; Duszynski, Slawomir; Jung, Christian; Rudolph, Manuel
Konferenzbeitrag
2010Integration of modular safety and security models for the analyse of the impact of security on safety
Förster, Marc; Schwarz, Reinhard; Steiner, Max
Bericht
2010Interoperability - a challenge of the EU services directive
Breitenstrom, C.; Eckert, K.-P.; Fromm, J.
Aufsatz in Buch
2010Mobile ground control station for local surveillance
Segor, F.; Bürkle, A.; Partmann, T.; Schönbein, R.
Konferenzbeitrag
2010Practical experience gained from modeling security goals. Using SGITs in an industrial project
Jung, Christian; Elberzhager, Frank; Bagnato, Alessandra; Raiteri, Fabio
Konferenzbeitrag