Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Schütte, Julian"'
As cloud services become central in an increasing number of applications, they process and store more personal and business-critical data. At the same time, privacy and compliance regulations such as GDPR, the EU ePrivacy regulation, PCI, and the upc
Externí odkaz:
http://arxiv.org/abs/2007.05212
Autor:
Schütte, Julian, Titze, Dennis
Although iOS is the second most popular mobile operating system and is often considered the more secure one, approaches to automatically analyze iOS applications are scarce and generic app analysis frameworks do not exist. This is on the one hand due
Externí odkaz:
http://arxiv.org/abs/2003.12901
Publikováno v:
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT, 325-332, 2019, Prague, Czech Republic
In this paper we present ZKlaims: a system that allows users to present attribute-based credentials in a privacy-preserving way. We achieve a zero-knowledge property on the basis of Succinct Non-interactive Arguments of Knowledge (SNARKs). ZKlaims al
Externí odkaz:
http://arxiv.org/abs/1907.09579
Autor:
Weiss, Konrad, Schütte, Julian
Ethereum smart contracts are executable programs, deployed on a peer-to-peer network and executed in a consensus-based fashion. Their bytecode is public, immutable and once deployed to the blockchain, cannot be patched anymore. As smart contracts may
Externí odkaz:
http://arxiv.org/abs/1907.03868
Publikováno v:
TrustCom/BigDataSE 2018: 244-251
Identity and trust in the modern Internet are centralized around an oligopoly of identity service providers consisting solely of major tech companies. The problem with centralizing trust has become evident in recent discoveries of mass surveillance a
Externí odkaz:
http://arxiv.org/abs/1805.06398
Publikováno v:
TrustCom/BigDataSE 2018: 946-957
In this paper we present reclaimID: An architecture that allows users to reclaim their digital identities by securely sharing identity attributes without the need for a centralised service provider. We propose a design where user attributes are store
Externí odkaz:
http://arxiv.org/abs/1805.06253
Autor:
Schütte, Julian, Brost, Gerd Stefan
Today's emerging Industrial Internet of Things (IIoT) scenarios are characterized by the exchange of data between services across enterprises. Traditional access and usage control mechanisms are only able to determine if data may be used by a subject
Externí odkaz:
http://arxiv.org/abs/1805.05887
Digitalization affects all industrial domains and causes disruption of various business models. Especially in domains such as logistics and manufacturing, inter-connected devices and near-realtime exchange of sensor data across enterprises allows to
Externí odkaz:
http://arxiv.org/abs/1804.09442
With malware detection techniques increasingly adopting machine learning approaches, the creation of precise training sets becomes more and more important. Large data sets of realistic web traffic, correctly classified as benign or malicious are need
Externí odkaz:
http://arxiv.org/abs/1802.06012
Autor:
Otto, Boris, Steinbuss, Sebastian, Teuscher, Andreas, Lohmann, Steffen, Bader, Sebastian, Birnstil, P., Böhmer, M., Brost, Gerd, Cirullies, Jan, Eitel, Andreas, Ernst, Thilo, Geisler, S., Gelhaar, J., Gude, Roland, Haas, Christian, Huber, Manuel, Jung, Christian, Jürjens, Jan, Lange, Christoph, Lis, Dominik, Mader, Christian, Menz, Nadja, Nagel, Ralf, Patzer, Florian, Pettenpohl, Heinrich, Pullmann, Jaroslav, Quix, Christoph, Schulz, Daniel, Schütte, Julian
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4a0199fe1e39a309767015bd73f37959