Auflistung nach Autor:in "Rechert, Klaus"
1 - 3 von 3
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragCellular location determination - reliability and trustworthiness of GSM location data(ARCS 2012 Workshops, 2012) Zahoransky, Richard M.; Rechert, Klaus; Meier, Konrad; Wehrle, Dennis; Suchodoletz, Dirk vonWhile using mobile telephony networks, the serving network infrastructure is able to determine the mobile station's location. Until now, cellular telephony has been built on self-contained infrastructure, i.e. all network components have been certified and especially users have been unable to take over control over their mobile equipment's behavior. With the rising awareness on privacy issues, software-based mobile phone network stacks became available and thereby a new freedom degree for mobile subscribers is introduced. While slight modification to the mobile phones behavior will not impair with the general functionality of the network, cellular location determination becomes less reliable and trustworthy. We discuss user imposed measures to detect external location determination attempts and to obfuscate generated location information. With a dedicated testbed setup, the effects of location obfuscation were evaluated.
- KonferenzbeitragEmulation as an alternative preservation strategy – use-cases, tools and lessons learned(INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt, 2013) Suchodoletz, Dirk von; Rechert, Klaus; Valizada, Isgandar; Strauch, AnnetteEmulation has evolved into a mature digital preservation strategy providing, inter alia, functional access to a wide range of digital objects using their original creation environments. In contrast to format migration strategies a functional, emulationbased approach requires a number of additional components. These can be provided by Emulation-as-a-Service, implemented and developed as a distributed framework for various emulation-based services and technologies for long-term preservation and access. This paper presents three distinct applications of the emulation-strategy to preserve complex scientific processing systems, to render complex interactive and dynamic digital objects, and to implement a universal migration-workflows utilizing the original environments in which objects were created.
- KonferenzbeitragIdentity and access management for complex research data workflows(6. DFN-Forum Kommunikationstechnologien, 2013) Zahoransky, Richard; Semaan, Saher; Rechert, KlausIdentity and Access Management (IAM) infrastructures already provide a crucial and established technology, enabling researchers and students to access services like computing facilities and electronic resources. However, the rise of complex and fully digitalized scientific workflows, world-wide research co-operations, and the reliance on external services and data sources poses new challenges to IAM architectures and their federations. Due to the non-uniform structure of such services each service provider is implementing its own accessand security-policy. As a result of license restrictions or privacy concerns, a user has to be authenticated and authorized by different entities in different contexts and roles to access complex research data, i.e. requesting a digital object as well as appropriate processing tools and a rendering environment. In order to enable seamless scientific workflows, an efficient federated IAM architecture is required. In this paper we discuss the use-case of functional research data preservation and the requirements for a common authentication and authorization scheme. The goal is to develop a security architecture allowing the user to login only once, e.g. at his or her university library and the Identity Management (IdM) system should be able to delegate the user's request to the related service providers. All these entities need to interact with and on behalf of the user without the user having to enter his credentials at every point. The results of this work are particularly useful when facing upcoming challenges to securing and managing access to non-uniform and inhomogenous cloud services and external data sources as a basis for today's scientific workflows and electronic business processes.