it - Information Technology
it - Information Technology is a strictly peer-reviewed scientific journal. It is the oldest German journal in the field of information technology. Today, the major aim of it - Information Technology is highlighting issues on ongoing newsworthy areas in information technology and informatics and their application. It aims at presenting the topics with a holistic view. It addresses scientists, graduate students, and experts in industrial research and development.
it - Information Technology is the organ of the faculties Technical Informatics and Computer Science in the Life Sciences of the German Informatics Society (GI - Gesellschaft für Informatik e.V.) and faculty Technical Informatics of the Information Technology Society (ITG) within the VDE (Verband der Elektrotechnik, Elektronik und Informationstechnik e.V.).
Auflistung it - Information Technology nach Erscheinungsdatum
Treffer pro Seite
Sortieroptionen
- ZeitschriftenartikelHeterogeneous placement optimization for database query processing(it - Information Technology: Vol. 59, No. 5, 2017) Karnagel, Tomas; Habich, DirkComputing hardware is constantly evolving and database systems need to adapt to ongoing hardware changes to improve performance. The current hardware trend is heterogeneity, where multiple computing units like CPUs and GPUs are used together in one system. In this paper, we summarize our efforts to use hardware heterogeneity efficiently for query processing. We discuss different approaches of execution and investigate heterogeneous placement in detail by showing, how to automatically determine operator placement decisions according to the given hardware environment and query properties.
- ZeitschriftenartikelVulnerability analysis(it - Information Technology: Vol. 59, No. 5, 2017) Rieck, Konrad
- ZeitschriftenartikelE-mail Header Injection Vulnerabilities(it - Information Technology: Vol. 59, No. 5, 2017) Chandramouli, Sai Prashanth; Zhao, Ziming; Doupé, Adam; Ahn, Gail-JoonE-mail Header Injection vulnerability is a class of vulnerability that can occur in web applications that use user input to construct e-mail messages. E-mail Header Injection is possible when the mailing script fails to check for the presence of e-mail headers in user input (either form fields or URL parameters). The vulnerability exists in the reference implementation of the built-in mail functionality in popular languages such as PHP, Java, Python, and Ruby. With the proper injection string, this vulnerability can be exploited to inject additional headers, modify existing headers, and alter the content of the e-mail.
- ZeitschriftenartikelBlockchains and the crypto city(it - Information Technology: Vol. 59, No. 6, 2017) Potts, Jason; Rennie, Ellie; Goldenfein, JakeDrawing on economic transaction cost theory, this paper explores how blockchain and distributed ledger technology could shift the smart city agenda by altering transaction costs with implications for the coordination of infrastructures and resources. Like the smart city the crypto city utilizes data informatics, but can be coordinated through distributed rather than centralized systems. The data infrastructure of the crypto city can enable civil society to run local public goods and services, and facilitate economic and social entrepreneurship.
- ZeitschriftenartikelHardware Based Databases(it - Information Technology: Vol. 59, No. 5, 2017) Lehner, Wolfgang
- ZeitschriftenartikelPrivacy enhancing technologies in the smart grid user domain(it - Information Technology: Vol. 59, No. 5, 2017) Knirsch, FabianIn modern energy grids, also termed smart grids, energy and information from different stakeholders are exchanged, processed and analyzed. An increasing number of data from customers is collected and transmitted for billing, scheduling and monitoring. In order to protect customer privacy, (i) the privacy gap of existing and proposed use cases needs to be assessed; and (ii) new methods and protocols need to be developed that allow a privacy-preserving and provably secure processing of data and information. This paper evaluates existing solutions and proposes novel approaches to privacy enhancing technologies in the smart grid user domain.
- ZeitschriftenartikelCoherent multicore methodology and tooling(it - Information Technology: Vol. 59, No. 5, 2017) Reinkemeier, Philipp; Ittershagen, Philipp; Dieudonne, Laurent; Diebold, PhilippIn the mobility domains functions are often realized by software running on Electronic Control Units (ECU)s, which are interconnected in a network of ECU. Nowadays there is a trend to move to ECUs with multicore processors which imposes a major challenge: An increasing degree of parallelism. This additional parallelism when migrating existing software that has been developed for singlecore systems, to a multicore system, has to be used in an efficient way. Furthermore, an increase in parallelism can cause concurrent executions of software functions, which are not possible when being executed on a singlecore ECU. This makes reasoning about the software behaviour much more difficult and also poses problems during certification activities, when sufficient independence between functions needs to be ensured. Therefore tool support is absolutely necessary to address the challenges. In this article we describe methods and tools that have been developed and/or extended during the ARAMiS project to address particular challenges arising during the development of multicore systems. In general these challenges result from the increase in parallelism available in multicore architectures.
- ZeitschriftenartikelOpinion paper: Data provenance challenges in biomedical research(it - Information Technology: Vol. 59, No. 5, 2017) Baum, Benjamin; Bauer, Christian R.; Franke, Thomas; Kusch, Harald; Parciak, Marcel; Rottmann, Thorsten; Umbach, Nadine; Sax, UlrichIn this opinion paper we provide an overview of some challenges concerning data provenance in biomedical research. We reflect current literature and depict some examples of existing implicit or explicit provenance aspects in some standard data types in translational research. Furthermore, we assess the need of further data provenance standardization in biomedical informatics. Basic data provenance should provide a recall about the origin of the data, transformation process steps, support replication and presentation of the data. Even though usable concepts for the documentation of data provenance can be found in other fields as early as 2005, the penetration rate in biomedical projects and in the biomedical literature is quite low. The awareness for the necessity of basic data provenance has to be raised, the education of data managers has to be further improved.
- ZeitschriftenartikelIntegration and visualization of spatial data in LIFE(it - Information Technology: Vol. 59, No. 5, 2017) Lin, Ying-Chi; Groß, Anika; Kirsten, ToralfIt is usually a challenging task to integrate and analyze huge amounts of heterogeneous data in large medical research projects. Often meaningful new insights can be achieved by visualizing medical data on geographical maps. For instance in epidemiological studies, data is often explored on a spatial dimension. LIFE is a large epidemiological study, managed by the LIFE Research Center for Civilization Diseases at Leipzig University. The study investigates the health-related states of the local population, e.g. by looking at the role of lifestyle factors on major civilization diseases. To allow for an effective data exploration, the development of sophisticated data analysis and spatial visualization techniques is necessary. Here, we present the interactive web application LIFE Spatial Data Visualization System (LIFE-SDVS) that adds a geographical facet to the data integration and analysis workflow of the LIFE research project.
- ZeitschriftenartikelWhy cryptography should not rely on physical attack complexity(it - Information Technology: Vol. 59, No. 5, 2017) Krämer, JulianeThis work presents two implementation attacks against cryptographic algorithms. Based on these two presented attacks, this thesis shows that the assessment of physical attack complexity is error-prone. Hence, cryptography should not rely on it. Cryptographic technologies have to be protected against all implementation attacks, have they already been realized or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is understood.