We present a reusable data structure that addresses the issues of static, inflexible and practically non-interoperable authorization definitions. We first […]
News
Flexible Two-Factor Authentication with FIDO
FIDO Universal Second Factor (U2F) is an industry standard for a generally applicable two-factor authentication. Using a USB security token […]
Server-Side Solutions for Cloud-Based Mobile Augmentation
Mobile devices are becoming increasingly powerful, but also consume increasingly more power. For this reason, frameworks have been developed in […]
Dynamic Key Usage Policies
More and more data and resources are moved to the cloud. Even cryptographic primitives do benefit from the advantages of […]
Certificate Status Application
The Certificate Status Tool is designed to provide certificate status information based on manually defined trust anchors as well as […]
Managing Security of API-based Integration Workflows
Security requirements, particularly those on confidentiality, require IT processes to be compliant to the least privilege principle. OAuth 2.0, a […]
Ontologies in the e-Government Domain
A survey of areas of application for ontologies in E-Government. During the past years, ontology-based concepts have gained importance especially […]
Secure Integration in the Cloud
A study explored how existing approaches to interacting across domain boundaries work together with cloud platforms. The focus was on […]
Privacy Implications of Emerging Web-Technologies
In this report existing web-tracking technologies are analyzed. Backed by this knowledge, two new web technologies, WebSockets and WebRTC, are […]
Security Recommendations for the Public Sector
The application of cryptographic methods is a complex task. It requires the selection of appropriate methods that are able to […]