Security requirements, particularly those on confidentiality, require IT processes to be compliant to the least privilege principle. OAuth 2.0, a […]
News
Ontologies in the e-Government Domain
A survey of areas of application for ontologies in E-Government. During the past years, ontology-based concepts have gained importance especially […]
Secure Integration in the Cloud
A study explored how existing approaches to interacting across domain boundaries work together with cloud platforms. The focus was on […]
Privacy Implications of Emerging Web-Technologies
In this report existing web-tracking technologies are analyzed. Backed by this knowledge, two new web technologies, WebSockets and WebRTC, are […]
Security Recommendations for the Public Sector
The application of cryptographic methods is a complex task. It requires the selection of appropriate methods that are able to […]
SSL/TLS Check for Clients/Server
The A-SIT SSL/TLS tool tests the security properties of Web browsers and Web Servers. The A-SIT SSL/TLS tool consists of […]
Multidimensional Security Policies
A-SIT developed a framework consisting of OWL vocabularies for cross-system definition and representation of web resources and security policies. This […]
Analysis of Modern Cross-platform Development Frameworks for Mobile Applications
This study analyzes which security mechanisms are available in popular cross-platform frameworks. Two most popular frameworks are considered – Apache […]
Static Analysis of Windows Phone Applications
The objective of the project was to analyse a number of Windows Phone Apps on common security issues. It started […]
Browser Plugin to interact with SkyTrust
Plugin to securely store data in cloud storage services. Online services for data storage (e.g. Dropbox, Google Drive) provide no […]