Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Joerg Abendroth"'
Autor:
Vikramajeet Khatri, Joerg Abendroth
Publikováno v:
2015 IEEE Trustcom/BigDataSE/ISPA.
Autor:
Ioannis Krontiris, Eva Schlehahn, Marit Hansen, Joerg Abendroth, Robert Seidl, Harald Zwingelberg, Ahmad Sabouri
Publikováno v:
Attribute-based Credentials for Trust ISBN: 9783319144382
Attribute-based Credentials for Trust
Attribute-based Credentials for Trust
The decision to employ Privacy-ABC systems and operate them is highly dependent on the business model, requirements and capabilities of the potential adopters. Nevertheless, more knowledge about various use cases of Privacy-ABCs and the problems that
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::52f8f7006ee5e92ff798db83931a87f3
https://doi.org/10.1007/978-3-319-14439-9_10
https://doi.org/10.1007/978-3-319-14439-9_10
Autor:
Joerg Abendroth, Holger Kinkelin
The term “trusted computing” refers to a technology developed by the Trusted Computing Group. It mainly addresses two questions: “Which software is executed on a remote computer?” and “How can secret keys and other security sensitive data b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7482db415e7586f91e5e02c399996626
https://doi.org/10.4018/978-1-60566-414-9.ch010
https://doi.org/10.4018/978-1-60566-414-9.ch010
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642155451
Secure Data Management
Secure Data Management
As online services are moving from the single service to the composite service paradigm, privacy is becoming an important issue due to the amount of user data being collected and stored. The Platform for Privacy Preferences (P3P) was defined to provi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::00267b3c49b759686929b01626df7494
https://doi.org/10.1007/978-3-642-15546-8_9
https://doi.org/10.1007/978-3-642-15546-8_9
Autor:
Joerg Abendroth, Assadarat Khurat
Publikováno v:
WiMob
Sensitive information is increasingly becoming more accessible. Access control is a mechanism that is widely used to protect such information. Extensible Access Control Markup Language (XACML) is one of the most prominent access control policy langua
Publikováno v:
2008 IEEE Wireless Communications and Networking Conference.
We propose a concept for authorisation using the location of a mobile device and the enforcement of location-based policies. Mobile devices enhanced by Trusted Computing capabilities operate an autonomous and secure location trigger and policy enforc
Publikováno v:
Technical University of Denmark Orbit
SAC
SAC
Various security models have been proposed for different types of applications and numerous types of execution environments. These models are typically reinforced by adding code to the application, which authenticates principals, authorises operation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::62d18d09eec4924ae59f3dd612e6a369
http://hdl.handle.net/2262/12539
http://hdl.handle.net/2262/12539
Publikováno v:
Technical University of Denmark Orbit
SACMAT
SACMAT
Various security models have been proposed in recent years for different purposes. Each of these aims to ease administration by introducing new types of security policies and models. This increases the complexity a system administrator is faced with.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::219be99aef11c2c521ba1f1c8516c76f
http://orbit.dtu.dk/en/publications/partial-outsourcing-a-new-paradigm-for-access-control(98c5abd8-150c-47de-92c8-3834056e592a).html
http://orbit.dtu.dk/en/publications/partial-outsourcing-a-new-paradigm-for-access-control(98c5abd8-150c-47de-92c8-3834056e592a).html