XACML is the de-facto standard in the area of data security policy languages. It enables to centralize the evaluation and […]
News
Traces on the Internet
A study deals with daily activities on the Internet, which leave traces, and shows how these can be used to […]
Blockchain & Smart Contracts
This report explains different types of Blockchains as well as different consensus algorithms. Blockchain is a distributed ledger that consists […]
Rich End-to-End Encryption
This project discusses the requirements of a solution to decouple the authentication process from an application that uses the Skytrust […]
LOD and LOV for Authorization Concepts
Vocabularies to represent security relevant concepts. Linked Open Data (LOD) and Linked Open Vocabularies (LOV) deal with the definition of […]
Traffic Analysis of Mobile Applications
As a supporting measure for the inspection of mobile applications, the data sent and received to/from the Internet has always […]
Citizen Card Encrypted (CCE)
CCE enables container-based encryption of files and folders. Encryption of data can be performed using smart-cards (hardware based keys, currently various versions of Austrian […]
Analysis of Browser-Extensions
This study deals with dangers potentially posed from browser extensions. Browser extensions can extend the functionality of modern web browsers […]
Migrating Edge Computing to Hybrid Edge Computing
This project shows that approaches, as they are followed by Edge Computing and Mobile Edge Computing are insufficient and further […]
State of the Art Services for Direct Communication
Direct data transfer and direct communication services are becoming increasingly relevant due to widespread availability of high bandwidth Internet connections. […]