Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Ingo Bente"'
Publikováno v:
APCC
The increasing complexity of IT infrastructures and the integration of mobile end-user devices requires more sophisticated approaches in network perimeter protection. Currently, the state of the art in network safeguarding is represented by firewalls
Publikováno v:
NBiS
In this paper we present an approach to add Remote Attestation capabilities to the Google Chrome OS platform. Our approach is based on the combination of two integral aspects of Chrome OS: (1) its Verified Boot procedure and (2) its extensible, app-b
Publikováno v:
NBiS
In this paper we propose a novel, network-based, distributed anomaly detection framework for smart phones. Our approach is based upon the distributed collection of arbitrary, static and dynamic smart phone features. Our approach is not limited to fea
Publikováno v:
ISSE 2011 Securing Electronic Business Processes ISBN: 9783834819116
The ESUKOM project aims to develop a real-time security solution for enterprise networks that works based upon the correlation of metadata. The ESUKOM approach focuses on the integration of available and widely deployed security tools (both commercia
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e66e5a0e61fa783db5ecf587b6609923
https://doi.org/10.1007/978-3-8348-8652-1_33
https://doi.org/10.1007/978-3-8348-8652-1_33
Publikováno v:
2011 IEEE Power and Energy Society General Meeting.
Concepts for future energy networks envision the distribution of measurement and control infrastructures to the customers to allow for improved reactions to certain events in the energy grid and to ease the measurement process. Such a distribution of
Publikováno v:
Trusted Systems ISBN: 9783642252822
This paper describes an approach to perform a Remote Attestation in VPN environments, using Trusted Network Connect techniques. The solution is based on the VPN connection set up to authenticate the user, and the afterwards established VPN tunnel to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::20391f8fb81f1adfe65754c18e7534da
https://doi.org/10.1007/978-3-642-25283-9_20
https://doi.org/10.1007/978-3-642-25283-9_20
Publikováno v:
ISSE 2010 Securing Electronic Business Processes ISBN: 9783834814388
ISSE
ISSE
As electronic banking is one important field in e-commerce, it becomes more and more a target of attackers. The majority of those attacks try to steal credentials, usually pins and tans, from the user. In this paper, we propose to use a machine’s T
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7541334d5450058d293b725fd31416eb
https://doi.org/10.1007/978-3-8348-9788-6_23
https://doi.org/10.1007/978-3-8348-9788-6_23
Autor:
Gabi Dreo, Joerg Vieweg, Johannes Westhuis, Ingo Bente, Stephan Heuser, Josef von Helden, Bastian Hellmann
Publikováno v:
Trust and Trustworthy Computing ISBN: 9783642215988
We propose a new attestation approach for the Android platform that integrates Trusted Computing concepts and Android's permission-based access control features. Recent research in the field of mobile security has shown that malware is a real threat.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3822ddbd882eb181f02e082373eda3aa
https://doi.org/10.1007/978-3-642-21599-5_8
https://doi.org/10.1007/978-3-642-21599-5_8
Publikováno v:
Trusted Systems ISBN: 9783642145964
INTRUST
INTRUST
Network Access Control (NAC) approaches like the Trusted Computing Group's (TCG) Trusted Network Connect (TNC) enable the verification of the integrity of computing systems (also referred to as NAC assessment) both in an interoperable and fine-graine
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dde8873cd5fdb274b4167d72fbacca36
https://doi.org/10.1007/978-3-642-14597-1_8
https://doi.org/10.1007/978-3-642-14597-1_8
Autor:
Josef von Helden, Ingo Bente
Publikováno v:
ISSE 2008 Securing Electronic Business Processes ISBN: 9783834806604
Network Access Control (NAC) is the most promising approach to provide protection against sophisticated attacks that first compromise endpoints to subsequently continue their evil work in networks accessible via the compromised endpoint. Trusted Netw
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2ac4cf8c4c06f2e2c58bbdcfa398214b
https://doi.org/10.1007/978-3-8348-9283-6_16
https://doi.org/10.1007/978-3-8348-9283-6_16