This project evaluates different authentication methods that can be used to authenticate services and entities without relying on a CA. Recent […]
News
Orchestration of distributed cloud applications
Development of a meta-model for categorizing Web-APIs. Today, many web services offer a separate interface in the form of a […]
Technology Overview Blockchain
As part of this project, a survey on Distributed Ledger Technologies (commonly referred to as Blockchain) was conducted. The attached […]
Analysis of Car Applications
This survey evaluates the state of the art of mobile applications for cars. It gives an overview of popular mobile […]
Contextual Data Exchange
We present a reusable data structure that addresses the issues of static, inflexible and practically non-interoperable authorization definitions. We first […]
Flexible Two-Factor Authentication with FIDO
FIDO Universal Second Factor (U2F) is an industry standard for a generally applicable two-factor authentication. Using a USB security token […]
Server-Side Solutions for Cloud-Based Mobile Augmentation
Mobile devices are becoming increasingly powerful, but also consume increasingly more power. For this reason, frameworks have been developed in […]
Dynamic Key Usage Policies
More and more data and resources are moved to the cloud. Even cryptographic primitives do benefit from the advantages of […]
Certificate Status Application
The Certificate Status Tool is designed to provide certificate status information based on manually defined trust anchors as well as […]
Managing Security of API-based Integration Workflows
Security requirements, particularly those on confidentiality, require IT processes to be compliant to the least privilege principle. OAuth 2.0, a […]