Auflistung nach Autor:in "Hollick, Matthias"
1 - 4 von 4
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragEstablishing P2P-overlays for ad hoc networks using provider subscription(Kommunikation in Verteilten Systemen (KiVS), 2005) Krop, Tronje; Kappes, Martin; Hollick, MatthiasMulti-hop ad hoc networks are envisioned to be an integral part of future mobile networks. Today, however, ad hoc networks lack the necessary resilience and reliability. This work proposes to use P2P routing overlays to enhance the dependability and performance of multi-hop ad hoc networks for devices that are subscribed to a provider.
- KonferenzbeitragSicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000(Innovative Anwendungen in Kommunikationsnetzen, 15. DFN-Arbeitstagung über Kommunikationsnetze, 2001) Hollick, Matthias; Rosenow, Wolf; Bormuth, Thomas; Steinmetz, RalfDie Einsatzplanung zur Integration moderner Betriebssysteme in bestehende Netze betrifft Universitäten und Forschungseinrichtungen aufgrund ihres innovativen Anforderungsprofils in besonderem Maße. Ein herausragender Bestandteil jeder Planung ist hierbei der Sicherheitsaspekt. Im folgenden stellen wir Ansätze vor, die bei Microsoft Windows 2000 Kernaspekte einer Sicherheitsplanung darstellen. Hierzu werden einleitend die Systemgrundlagen von Windows 2000 bzgl. Sicherheit geschildert. Anschließend wird ein Lösungsansatz erläutert, der die Planung einer Active Directory (AD) Struktur zur rollenbasierten Administration erläutert. Hierbei werden Planungshilfen gegeben und die zur Umsetzung verfügbaren Hilfsmittel vorgestellt. Abschließend stellt der Bericht eine Zusammenfassung der beschriebenen Bereiche dar.
- KonferenzbeitragA systematic approach to constructing families of incremental topology control algorithms using graph transformation(Software Engineering und Software Management 2018, 2018) Kluge, Roland; Stein, Michael; Varró, Gergely; Schürr, Andy; Hollick, Matthias; Mühlhäuser, MaxIn this talk, we present results on integrating support for variability modeling into a correct-by-construction development methodology for topology control algorithms, as appeared online in the Software & Systems Modeling journal in 2017. A topology control algorithm reduces the size of the visible neighborhood of a node in a wireless communication network. At the same time, it must fulfill important consistency properties to ensure a high quality of service. In previous work, we proposed a constructive, model-driven methodology for designing individual topology control algorithms based on declarative graph constraints and graph transformation rules; the resulting algorithms are guaranteed to preserve the specified properties. Even though many topology control algorithms share substantial (structural) parts, few works leverage these commonalities at design time. In this work, we generalize our proposed construction methodology by modeling variability points to support the construction of families of algorithms. We show the applicability of our approach by reengineering six existing topology control algorithms and developing e-kTC, a novel energy-efficient variant of the topology control algorithm kTC. Finally, we evaluate a subset of the algorithms using a novel integration of a wireless network simulator and a graph transformation tool.
- WorkshopbeitragTowards Secure Urban Infrastructures: Cyber Security Challenges for Information and Communication Technology in Smart Cities(Mensch und Computer 2020 - Workshopband, 2020) Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, MichaelThe growth of cities continues to be a global megatrend. As more and more people live in urban areas and urban services and infrastructures are under growing strain, technologies are increasingly being researched and used to make city life more efficient and comfortable. As a result, so-called “Smart Cities” have complex IT infrastructures and cyber-physical systems such as sensor/actuator networks for the general population and are developing worldwide. Urban infrastructure must be secured against attacks, ensuring reliable and resilient services for citizens as well as privacy and data security. This paper introduces selected challenges faced by infrastructure providers, citizens and decision-makers in handling attacks aimed at information and communication technologies (ICT) of urban infrastructures and presents current research avenues for tackling cyberattacks and for developing tools for creating, portraying and disseminating actiona-ble information as one important response to security challenges. It then presents findings from a representative survey conducted in Germany (N=1091) on the experiences and perceptions of citizens concerning the relevance of cyberat-tacks will be presented.