In this project an administrative model was extended to support the translation of abstract, semantic security policies into XACML policies. XACML […]
News
Secure Real-Time Textcollaboration
Tool for demonstrating secure real-time textcollaboration. Google Docs and Office 365 come to mind on cloud-based data processing. The success […]
Fingerprinting Code of Mobile Applications
The analysis of applications for mobile platforms (Android, iOS) has shown that security-relevant problems are often not to be found […]
Device Enrolment Using Flexible Authentication
In order to provide solutions such as managed devices to end users, we compiled concepts for authenticating devices, with a focus […]
Utilizing Policy Enforcement System to Control Mobile Distributed Applications
XACML is the de-facto standard in the area of data security policy languages. It enables to centralize the evaluation and […]
Traces on the Internet
A study deals with daily activities on the Internet, which leave traces, and shows how these can be used to […]
Blockchain & Smart Contracts
This report explains different types of Blockchains as well as different consensus algorithms. Blockchain is a distributed ledger that consists […]
Rich End-to-End Encryption
This project discusses the requirements of a solution to decouple the authentication process from an application that uses the Skytrust […]
LOD and LOV for Authorization Concepts
Vocabularies to represent security relevant concepts. Linked Open Data (LOD) and Linked Open Vocabularies (LOV) deal with the definition of […]
Traffic Analysis of Mobile Applications
As a supporting measure for the inspection of mobile applications, the data sent and received to/from the Internet has always […]