Auflistung nach Autor:in "Hutter, Dieter"
1 - 4 von 4
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragBeherrschbarkeit komplexer Firmeninfrastrukturen durch eigenschaftsbasierte Sicherheit(Informatik 2016, 2016) Hutschenreuter, Helmar; Hutter, Dieter
- KonferenzbeitragFrom legal principles to an Internet voting system(Electronic voting in Europe - Technology, law, politics and society, workshop of the ESF TED programme together with GI and OCG, 2004) Volkamer, Melanie; Hutter, DieterPast research on Internet voting has been concentrated on two aspects. First, there are investigations to find the appropriate balance between anonymity and authentication. Second, the impact of the use of Internet voting to legislation has been studied. In this paper we analyze the impact of legislation to the design of a real Internet voting system. We discuss how legal aspects constitute security requirements on a technical level and refine the security requirements on the design level to corresponding security requirements of the resulting system.
- KonferenzbeitragInformation flow analysis based security checking of health service composition plans(European Conference on eHealth 2006, 2006) Hutter, Dieter; Klusch, Matthias; Volkame, MelanieIn this paper, we present an approach to solve the problem of provably secure execution of semantic web service composition plans. The integrated components of this approach include our OWL-S service matchmaker, OWLS- MX, the service composition planner, OWLS-XPlan, and the security checker module for formally verifying the compliance of the created composition plan to be executed with given data and service security policies using type-based information flow analysis. We demonstrate this approach by means of its application to a use case scenario of health service composition planning.
- KonferenzbeitragSelective LDAP Multi-Master Replication(Open Identity Summit 2013, 2013) Bauereiss, Thomas; Gohmann, Stefan; Hutter, Dieter; Kläser, AlexanderLDAP directory services are widely used to store and manage information about the assets of organisations and to ease the administration of IT infrastructure. With the popularity of cloud computing many companies start to distribute their computational needs in mixed-cloud infrastructures. However, distributing an LDAP directory including sensitive information to partially trusted cloud servers would constitute a major security risk. In this paper, we describe an LDAP replication mechanism that allows for a fine-grained selection of parts of an LDAP directory tree that are replicated to another server using content-based filters, while maintaining the availability and performance advantages of a full multi-master replication. We discuss sufficient conditions on replication topology and admissible operations such that the replication mechanism provides eventual consistency of selectively replicated data.