Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Daniel Schreckling"'
Publikováno v:
Natural Computing Series ISBN: 9783319658247
This chapter provides a summary of the results of the BIOMICS project, specifically from the point of view of the development of a mathematical framework that can support a productive collaboration between cell biochemistry, dynamical systems, algebr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a992650e1aef6cc1491087bb9997af40
https://doi.org/10.1007/978-3-319-65826-1_13
https://doi.org/10.1007/978-3-319-65826-1_13
Publikováno v:
Information Security Technical Report. 17:71-80
We introduce Kynoid, a real-time monitoring and enforcement framework for Android. Kynoid is based on user-defined security policies which are defined for data-items. This allows users to define temporal, spatial, and destination constraints which ha
Publikováno v:
Internet of Things. IoT Infrastructures ISBN: 9783319470740
IoT 360 (2)
IoT 360 (2)
This work presents a paradigm shift and introduces a data-centric security architecture for the COMPOSE framework; a platform as a service and marketplace for the IoT. We distinguish our approach from classical device-centric approaches and outline a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0c5bb012389130f5bf6286d803e0bf55
https://doi.org/10.1007/978-3-319-47075-7_10
https://doi.org/10.1007/978-3-319-47075-7_10
Publikováno v:
2016 International Workshop on Secure Internet of Things (SIoT)
SIoT
SIoT
Allowing users to control access to their data is paramount for the success of the Internet of Things; therefore, it is imperative to ensure it, even when data has left the users' control, e.g. shared with cloud infrastructure. Consequently, we propo
Autor:
Daniel Schreckling, Martin Johns
Publikováno v:
Datenschutz und Datensicherheit - DuD. 31:888-893
Einfach auf Knopfdruck Sicherheitslucken finden — vorne den Source Code eingeben und hinten den detaillierten Audit-Report entnehmen. Die automatisierte statische Untersuchung von Software auf sicherheitskritische Fehler ist ein seit langerem verfo
Autor:
Eric Rothstein Morris, Gábor Horváth, Attila Egri-Nagy, Daniel Schreckling, John Rhodes, Maria J. Schilstra, Fariba Karimi, Paolo Dini, Chrystopher L. Nehaniv
Publikováno v:
Philosophical transactions. Series A, Mathematical, physical, and engineering sciences. 373(2046)
Interaction computing is inspired by the observation that cell metabolic/regulatory systems construct order dynamically, through constrained interactions between their components and based on a wide range of possible inputs and environmental conditio
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319196558
IoT360 (1)
IoT360 (1)
We describe a generic attribute-based identity management system. It aims to support the large variety of security requirements induced by applications for the IoT. Hence, we discuss various management options for system entities. We show how attribu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3e4a17fdaae856dfd262b107d407a490
https://doi.org/10.1007/978-3-319-19656-5_40
https://doi.org/10.1007/978-3-319-19656-5_40
Autor:
C. V. Villares, Iacopo Carreras, Carlos Pedrinaci, Vlad Trifa, David Carrera, Robert Kleinfeld, M. Pous, D. Raggett, Alessio Gugliotta, Benjamin Mandler, Daniel Schreckling, F. Antonelli
Publikováno v:
AINA Workshops
The COMPOSE project aims to unleash the full potential harbored by the Internet of Things by creating a complete ecosystem around it to enable the flourishing of a resulting Internet of Services, seamlessly integrating the real and virtual worlds. CO
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642385292
WISTP
WISTP
URANOS is an Android application which uses syntactical static analysis to determine in which component of an Android application a permission is required. This work describes how the detection and analysis of widely distributed and security critical
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bff8b8ad56d9aa5512beb3b4d7d8df53
Publikováno v:
SAC
We introduce Constroid, a data-centric security policy management framework for Android. It defines a new middleware which allows the developer to specify well defined data items of fine granularity. For these data items, Constroid administrates secu