More and more data and resources are moved to the cloud. Even cryptographic primitives do benefit from the advantages of […]
News
Certificate Status Application
The Certificate Status Tool is designed to provide certificate status information based on manually defined trust anchors as well as […]
Managing Security of API-based Integration Workflows
Security requirements, particularly those on confidentiality, require IT processes to be compliant to the least privilege principle. OAuth 2.0, a […]
Ontologies in the e-Government Domain
A survey of areas of application for ontologies in E-Government. During the past years, ontology-based concepts have gained importance especially […]
Secure Integration in the Cloud
A study explored how existing approaches to interacting across domain boundaries work together with cloud platforms. The focus was on […]
Privacy Implications of Emerging Web-Technologies
In this report existing web-tracking technologies are analyzed. Backed by this knowledge, two new web technologies, WebSockets and WebRTC, are […]
Security Recommendations for the Public Sector
The application of cryptographic methods is a complex task. It requires the selection of appropriate methods that are able to […]
SSL/TLS Check for Clients/Server
The A-SIT SSL/TLS tool tests the security properties of Web browsers and Web Servers. The A-SIT SSL/TLS tool consists of […]
Multidimensional Security Policies
A-SIT developed a framework consisting of OWL vocabularies for cross-system definition and representation of web resources and security policies. This […]
Analysis of Modern Cross-platform Development Frameworks for Mobile Applications
This study analyzes which security mechanisms are available in popular cross-platform frameworks. Two most popular frameworks are considered – Apache […]