As part of this project, a survey on Distributed Ledger Technologies (commonly referred to as Blockchain) was conducted. The attached […]
Category: IT Security
Analysis of Car Applications
This survey evaluates the state of the art of mobile applications for cars. It gives an overview of popular mobile […]
Contextual Data Exchange
We present a reusable data structure that addresses the issues of static, inflexible and practically non-interoperable authorization definitions. We first […]
Flexible Two-Factor Authentication with FIDO
FIDO Universal Second Factor (U2F) is an industry standard for a generally applicable two-factor authentication. Using a USB security token […]
Dynamic Key Usage Policies
More and more data and resources are moved to the cloud. Even cryptographic primitives do benefit from the advantages of […]
Certificate Status Application
The Certificate Status Tool is designed to provide certificate status information based on manually defined trust anchors as well as […]
Privacy Implications of Emerging Web-Technologies
In this report existing web-tracking technologies are analyzed. Backed by this knowledge, two new web technologies, WebSockets and WebRTC, are […]
Security Recommendations for the Public Sector
The application of cryptographic methods is a complex task. It requires the selection of appropriate methods that are able to […]
Multidimensional Security Policies
A-SIT developed a framework consisting of OWL vocabularies for cross-system definition and representation of web resources and security policies. This […]
Browser Plugin to interact with SkyTrust
Plugin to securely store data in cloud storage services. Online services for data storage (e.g. Dropbox, Google Drive) provide no […]