GI LogoGI Logo
  • Login
Digital Library
    • All of DSpace

      • Communities & Collections
      • Titles
      • Authors
      • By Issue Date
      • Subjects
    • This Community

      • Titles
      • Authors
      • By Issue Date
      • Subjects
Digital Library Gesellschaft für Informatik e.V.
GI-DL
    • English
    • Deutsch
  • English 
    • English
    • Deutsch
Search 
  •   DSpace Home
  • Lecture Notes in Informatics
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
  •   DSpace Home
  • Lecture Notes in Informatics
  • Search

Search

DiscoverDiscover

Filters

Use filters to refine the search results.

Now showing items 1-10 of 10

Results Per Page:Sort Options:

Extending the 0Auth2 Workflow to Audit Data Usage for Users and Service Providers In a Cooperative Scenario 

10. DFN-Forum Kommunikationstechnologien Politze, Marius; Decker, Bernd
The increasing amount and heterogeneity of devices demands changes in IT infrastructure. Many web service architectures used to meet these demands use the OAuth2 workflow to secure their interfaces. These implementations usually tightly couple web services and an OAuth2 authorization service. The presented extension to ...

Methods to secure services in an untrusted environment 

Software Engineering 2011 – Fachtagung des GI-Fachbereichs Softwaretechnik Huber, Matthias; Müller-Quade, Jörn
Software services offer many opportunities like reduced cost for IT infrastructure. They also introduce new risks, for example the clients lose control over their data. While data can be secured against external threats using standard techniques, the service providers themselves have to be trusted to ensure privacy. In ...

Towards a run-time model for data protection in the cloud 

Modellierung 2018 Mann, Zoltan; Metzger, Andreas; Schoenen, Stefan
The protection of sensitive data in the cloud is a challenge of increasing importance. It is made particularly difficult by the complex and dynamic interactions of many entities (hardware and software, as well as organizations and individuals). A model-based approach can be used to reason about these interactions and ...

The ENTOURAGE Privacy and Security Reference Architecture for Internet of Things Ecosystems 

Open Identity Summit 2019 Zibuschka, Jan; Horsch, Moritz; Kubach, Michael
The Internet of Things (IoT), with its ubiquitous sensors and actuators, enables highly useful novel use cases, notably in the field of digital assistance. It also raises unprecedented privacy and security issues. This contribution presents a reference architecture for an ecosystem of digital assistants with minimal ...

I know who you are: Deanonymization using Facebook Likes 

Workshops der INFORMATIK 2018 - Architekturen, Prozesse, Sicherheit und Nachhaltigkeit Rüdian, Sylvio; Pinkwart, Niels; Liu, Zhi
This paper presents a method to deanonymize people using fanpages’ Likes of Facebook users. The strategy shows that information of Likes can be easily crawled from Facebook. Combined with an interactive version of browser-history-stealing it can be used to get identities of users on a website. The attack is possible ...

Anonymization Is Dead – Long Live Privacy 

Open Identity Summit 2019 Zibuschka, Jan; Kurowski, Sebastian; Roßnagel, Heiko; Schmuck, Christian H.; Zimmermann, Christian
Privacy is a multi-faceted, interdisciplinary concept, with varying meaning to different people and disciplines. To most researchers, anonymity ist he “holy grail” of privacy research, as it suggests that it may be possible to avoid personal information altogether. However, time and time again, anonymization has been ...

Enabling SMEs to comply with the complex new EU data protection regulation 

Open Identity Summit 2019 Fähnrich, Nicolas; Kubach, Michael
The European General Data Protection Regulation (GDPR) introduces privacy requirements that pose a complex challenge especially for small and medium sized enterprises (SMEs). In this paper, we present a software-supported process model developed by us that helps SMEs to establish processes ensuring the rights of the data ...

Optimized Cloud Deployment of Multi-tenant Software Considering Data Protection Concerns -- Abridged Version 

Software Engineering und Software Management 2018 Mann, Zoltán; Metzger, Andreas
This work was presented as full paper at the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), 2017. Concerns about protecting personal data and intellectual property are major obstacles to the adoption of cloud services. To ensure that a cloud tenant’s data cannot be accessed by ...

A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme 

Informatik 2007 – Informatik trifft Logistik – Band 2 Escalante B., Alberto N.; Löhr, Hans; Sadeghi, Ahmad-Reza
A multi-coupon (MC ) represents a collection of k coupons that a user can redeem to a vendor in exchange for a benefit (some good or service). Recently, Chen et al. [CEL+07] proposed an unforgeable privacy-protecting multi-coupon scheme (MCS), which discourages sharing of coupons through a property called unsplitta- ...

Student Success Prediction and the Trade-Off between Big Data and Data Minimization 

DeLFI 2018 - Die 16. E-Learning Fachtagung Informatik Heuer, Hendrik; Breiter, Andreas
This paper explores student’s daily activity in a virtual learning environment in the anonymized Open University Learning Analytics Dataset (OULAD). We show that the daily activity of students can be used to predict their success, i.e. whether they pass or fail a course, with high accuracy. This is important since daily ...

About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.

 

 

Discover

Author

Kubach, Michael (2)Metzger, Andreas (2)Zibuschka, Jan (2)Breiter, Andreas (1)Decker, Bernd (1)Escalante B., Alberto N. (1)Fähnrich, Nicolas (1)Heuer, Hendrik (1)Horsch, Moritz (1)Huber, Matthias (1)... View More

Subject

privacy (10)
data protection (3)cloud computing (2)security (2)transparency (2)accountability (1)anonymization (1)architecture (1)attack (1)authorization (1)... View More

Date Issued

2010 - 2019 (9)2007 - 2009 (1)

Has File(s)

Yes (10)

About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.