Peer-to-peer networks enable separation of identity (identifier) and location (network address). This separation makes it possible to implement virtual, homogeneous […]
Category: Mobile & Cloud
Android Browser – Security and Privacy
We investigated how advertisement blocking (ad blocking) can be implemented in Android browsers. Online advertising is growing rapidly. In 2007 […]
Multilateral Integration of XACML Policies
In this project an administrative model was extended to support the translation of abstract, semantic security policies into XACML policies. XACML […]
Secure Real-Time Textcollaboration
Tool for demonstrating secure real-time textcollaboration. Google Docs and Office 365 come to mind on cloud-based data processing. The success […]
Fingerprinting Code of Mobile Applications
The analysis of applications for mobile platforms (Android, iOS) has shown that security-relevant problems are often not to be found […]
Utilizing Policy Enforcement System to Control Mobile Distributed Applications
XACML is the de-facto standard in the area of data security policy languages. It enables to centralize the evaluation and […]
LOD and LOV for Authorization Concepts
Vocabularies to represent security relevant concepts. Linked Open Data (LOD) and Linked Open Vocabularies (LOV) deal with the definition of […]
Traffic Analysis of Mobile Applications
As a supporting measure for the inspection of mobile applications, the data sent and received to/from the Internet has always […]
Migrating Edge Computing to Hybrid Edge Computing
This project shows that approaches, as they are followed by Edge Computing and Mobile Edge Computing are insufficient and further […]
Automated Reasoning over Security Policies
Applied approaches on authorization management often focus on a single system or environment, neglecting the need to address the security […]