Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Gerd Stefan Brost"'
Publikováno v:
Proceedings of the 5th on Cyber-Physical System Security Workshop.
The emerging Industrial Internet of Things (IIoT) is characterized by heterogeneous systems, loose topologies, cross-company data flows, changing entities, and high cybersecurity requirements. This development makes a sound security architecture an e
Autor:
Julian Schuette, Gerd Stefan Brost
Publikováno v:
TrustCom/BigDataSE
Today's emerging Industrial Internet of Things (IIoT) scenarios are characterized by the exchange of data between services across enterprises. Traditional access and usage control mechanisms are only able to determine if data may be used by a subject
Autor:
Julian Schütte, Manuel Huber, Sascha Wessel, Gerd Stefan Brost, Mykolai Protsenko, Michael Weiß
Publikováno v:
CPSS@AsiaCCS
The most recent and prominent advances in industrial computing include the growing interconnectivity of cyber-physical devices, as well as the increasing variety of complex applications exchanging data across company domains. In this context, the dat
Autor:
Mark Gall, Gerd Stefan Brost
Publikováno v:
AINA Workshops
Current Symmetric Searchable Encryption schemes do not fulfill the expectations of users that are used to web search engines. Although users are now able to search for multiple keywords, Boolean retrieval returns all results to a client regardless of
Autor:
Gerd Stefan Brost, Julian Schütte
Publikováno v:
AINA
Data analytics services are on the rise, fostered byan increasing number of wearables and industrial sensors whichare connected over the Internet. As a result, users who want totake advantage of these services are confronted with the challengeof keep
Autor:
Gerd Stefan Brost, Mario Hoffmann
Publikováno v:
Requirements Engineering for Digital Health ISBN: 9783319097978
Security and privacy by design are important paradigms for establishing high protection levels in the eHealth domain. This means that security requirements and privacy concerns are considered and analyzed from the very beginning of any system design.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3fea719b8c135e58f96d69fbaefdc6bc
https://doi.org/10.1007/978-3-319-09798-5_7
https://doi.org/10.1007/978-3-319-09798-5_7
Publikováno v:
Trusted Cloud Computing ISBN: 9783319127170
Trusted Cloud Computing
Trusted Cloud Computing
Cloud computing (CC) has gained much popularity. Large amounts of data, many of them personal, are consumed by CC services. Yet, data security and, derived from that, privacy are topics that are not satisfyingly covered. Especially usage control and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::693603567d731f1494159f8ec22ddc60
https://doi.org/10.1007/978-3-319-12718-7_15
https://doi.org/10.1007/978-3-319-12718-7_15