Veröffentlichungen

Strea­ming-Ba­sed Ve­ri­fi­ca­ti­on of XML Si­gna­tu­res in SOAP Mes­sa­ges

2010 - Juraj Somorovsky, Meiko Jensen, Jörg Schwenk

In Pro­cee­dings of the IEEE In­ter­na­tio­nal Work­shop on Web Ser­vice and Busi­ness Pro­cess Se­cu­ri­ty (WSBPS), Miami, Flo­ri­da, U.S.A., 2010.

Ethernet communication for detection of emergency locations and dynamic evacuation in underground infrastructures

2010 - Dipl.-Ing. Christoph Müller, Prof. Dr. Iuliu Szekely, Andreas Noack

OPTIM 2010 - 12th International Conference on Optimization of Electrical and Electronic Equipment [Conference Link]

Trusted Virtual Domains: Color Your Network

2010 - Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

Datenschutz und Datensicherheit (DuD) 5/2010, p. 289-298. [SpringerLink] [PDF]

Attack Surfaces: A Taxonomy for Attacks on Cloud Services

2010 - Meiko Jensen, Nils Gruschka

In Proceedings of the 3rd IEEE International Conference on Cloud Computing (IEEE CLOUD 2010), Miami, FL, USA.

On In­ter­ope­ra­bi­li­ty Failu­res in WS-Se­cu­ri­ty: The XML Si­gna­tu­re Wrap­ping At­tack

2010 - Lijun Liao, Meiko Jensen, Florian Kohlar, Nils Gruschka

In E. Kajan: Elec­tro­nic Busi­ness In­ter­ope­ra­bi­li­ty: Con­cepts, Op­por­tu­nities and Chal­len­ges, In­for­ma­ti­on Sci­ence Re­fe­rence, (to be pu­blis­hed in 2011).

Streaming-based verification of XML Signatures in SOAP Messages

2010 - Jörg Schwenk, Meiko Jensen,

In Proceedings of the IEEE 2010 International Workshop on Web Service and Business Process Security (WSBPS 2010), Miami, FL, USA.

Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing

2010 - Jörg Schwenk, Sven Schäge, Meiko Jensen,

In Proceedings of the 3rd IEEE International Conference on Cloud Computing (IEEE CLOUD 2010), Miami, FL, USA. [IEEE]

Towards Automated Processing of the Right of Access in Inter-Organizational Web Service Compositions

2010 - Meiko Jensen, Ralph Herkenhöner, Henrich C. Pöhls, Hermann de Meer

In Proceedings of the IEEE 2010 International Workshop on Web Service and Business Process Security (WSBPS 2010), Miami, FL, USA.

A Sur­vey of At­tacks in the Web Ser­vices World

2010 - Meiko Jensen, Nils Gruschka

In C. Gutier­rez, E. Fer­nan­dez-Me­di­na, M. Piat­ti­ni: Web Ser­vices Se­cu­ri­ty De­ve­lop­ment and Ar­chi­tec­tu­re, In­for­ma­ti­on Sci­ence Re­fe­rence, ISBN: 978-1-60566-950-2, 2010.

A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys

2010 - Jörg Schwenk, Sven Schäge,

Financial Cryptography Fourteenth International Conference, FC 2010, Tenerife, Spain, January 25-28, 2010. [Springer Link]

A Design Pattern for Event-Based Processing of Security-enriched SOAP Messages

2010 - Meiko Jensen, Nils Gruschka, Luigi Lo Iacono

Proceedings of the Second International Workshop on Security Aspects in Grid and Cloud Computing (SAGC 2010), Krakow, Poland.

Secure Bindings of SAML Assertions to TLS Sessions

2010 - Jörg Schwenk, Sebastian Gajek, Meiko Jensen, Florian Kohlar,

Proceedings of the Fifth International Conference on Availability, Reliability and Security (ARES), Krakow, Poland.

On the analysis of cryptographic assumptions in the generic ring model

2009 - Tibor Jager, Jörg Schwenk

ASIACRYPT 2009

A Security Modeling Approach for Web-Service-based Business Processes

2009 - Meiko Jensen, Sven Feja

Proceedings of the 7th IEEE Workshop on Model-Based Development for Computer-Based Systems (MBD 2009), held as part of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2009), San Francisco, USA

Analysis of Signature Wrapping Attacks and Countermeasures

2009 - Jörg Schwenk, Sebastian Gajek, Lijun Liao, Meiko Jensen,

Proceedings of the 7th IEEE International Conference on Web Services (ICWS), Los Angeles, USA, 2009.

Dynamic Threshold Cryptosystem without Group Manager

2009 - Andreas Noack, M.Sc. Stefan Spitz

International Journal of Network Protocols and Algorithms (ISSN: 1943-3581) [Journal]

Efficient Authenticated Wireless Roaming via Tunnels

2009 - Andreas Noack,

Third International Workshop on Advanced Architectures and Algorithms for Internet DElivery and Applications, Las Palmas de Gran Canaria, Spain; 25 November 2009

Efficient Authenticated Wireless Roaming via Tunnels

2009 - Andreas Noack,

Technical Report. Full paper with security proof. [PDF]

Extending the Similarity-Based XML Multicast Approach with Digital Signatures

2009 - Jörg Schwenk, Meiko Jensen, Antonia Azzini, Stefania Marrara

Proceedings of the ACM Workshop on Secure Web Services (SWS), Chicago, Illinois, U.S.A.

Generating WS-SecurityPolicy Documents via Security Model Transformation

2009 - Meiko Jensen,

Proceedings of the Young Researchers Workshop on Modeling and Management of Business Processes (YRW-MBP 2009), held as part of SABRE 2009, Leipzig, Germany
Seite: