In order to gain information about the context, purpose, and functionality of mobile applications and to classify them accordingly, this […]
Category: Mobile & Cloud
Overview of Modern Cryptocurrencies
This study gives an overview of cryptocurrencies that are optimized for privacy or scalability. In detail, this study covers the […]
Secure Peer-to-Peer Networking Based on Self-Certification
Peer-to-peer networks enable separation of identity (identifier) and location (network address). This separation makes it possible to implement virtual, homogeneous […]
Android Browser – Security and Privacy
We investigated how advertisement blocking (ad blocking) can be implemented in Android browsers. Online advertising is growing rapidly. In 2007 […]
Multilateral Integration of XACML Policies
In this project an administrative model was extended to support the translation of abstract, semantic security policies into XACML policies. XACML […]
Secure Real-Time Textcollaboration
Tool for demonstrating secure real-time textcollaboration. Google Docs and Office 365 come to mind on cloud-based data processing. The success […]
Fingerprinting Code of Mobile Applications
The analysis of applications for mobile platforms (Android, iOS) has shown that security-relevant problems are often not to be found […]
Utilizing Policy Enforcement System to Control Mobile Distributed Applications
XACML is the de-facto standard in the area of data security policy languages. It enables to centralize the evaluation and […]
LOD and LOV for Authorization Concepts
Vocabularies to represent security relevant concepts. Linked Open Data (LOD) and Linked Open Vocabularies (LOV) deal with the definition of […]
Traffic Analysis of Mobile Applications
As a supporting measure for the inspection of mobile applications, the data sent and received to/from the Internet has always […]