Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Michael Eckel"'
Publikováno v:
Proceedings of the 17th International Conference on Availability, Reliability and Security.
Autor:
Michael Eckel, Tom Laffey
Publikováno v:
Network Security. 2022
As the deployment of next-generation networks accelerates, and promises of new technologies and IoT devices bring new opportunities worldwide, with virtualisation becoming key, there is an increasing awareness of the need for a secure network to ensu
Autor:
Jean-Jacques Pitrolle, Michael Eckel, Matthias Drodt, Stefan Katzenbeisser, Don Kuzhiyelil, Christoph Krauß, Maria Zhdanova, Jasmin Cosic
Publikováno v:
2021 International Symposium on Secure and Private Execution Environment Design (SEED).
The digitalization of safety-critical railroad infrastructure enables new types of attacks. This increases the need to integrate Information Technology (IT) security measures into railroad systems. For that purpose, we rely on a security architecture
Autor:
Tim Riemann, Michael Eckel
Publikováno v:
ARES
Todays computing systems are more interconnected and sophisticated than ever before. Especially in healthcare 4.0, services and infrastructures rely on cyber-physical systemss (CPSess) and Internet of Things (IoT) devices. This adds to the complexity
Publikováno v:
IFIP Advances in Information and Communication Technology
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC)
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.203-216, ⟨10.1007/978-3-030-58201-2_14⟩
ICT Systems Security and Privacy Protection ISBN: 9783030582005
SEC
ICT Systems Security and Privacy Protection
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC)
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.203-216, ⟨10.1007/978-3-030-58201-2_14⟩
ICT Systems Security and Privacy Protection ISBN: 9783030582005
SEC
ICT Systems Security and Privacy Protection
Part 5: System Security; International audience; Securing the integrity of virtualized environments like clouds is challenging yet feasible. Operators have discovered the advantages of virtualization technology in terms of flexibility, scalability, c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8eb00a6c1419814ce517f160f0fa5af1
https://hal.inria.fr/hal-03440811/document
https://hal.inria.fr/hal-03440811/document
Publikováno v:
ARES
Integrity is a key protection objective in the context of system security. This holds for both hardware and software. Since hardware cannot be changed after its manufacturing process, the manufacturer must be trusted to build it properly. However, it
Autor:
Tom Laffey, Michael Eckel
Publikováno v:
Network Security. 2020:18-19
The world is interconnected by networks and those networks have become critical to the operation of a broad range of devices and services, such as Internet of Things (IoT) devices, industrial robots and systems and electrical power grids, to name jus