References of "Engel, Thomas 50001752"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailInteroperable Networking Applications for Emergency Services
Frank, Raphaël UL; Hourte, Benjamin; Jungels, Dan et al

in International Journal of Multimedia and Ubiquitous Engineering (2009), 4(1), 1122

Detailed reference viewed: 79 (1 UL)
Full Text
Peer Reviewed
See detailModeling and Reconfiguration of critical Business Processes for the purpose of a Business Continuity Management respecting Security Risk and Compliance requirements at Credit Suisse using Algebraic Graph Transformation
Brandt, Christoph; Hermann, Frank UL; Engel, Thomas UL

in Enterprise Distributed Object Computing Conference Workshops, 2009. EDOCW 2009. 13th, Proc. International Workshop on Dynamic and Declarative Business Processes (DDBP 2009) (2009)

Critical business processes can fail. Therefore, continuity processes are needed as backup solutions. At the same time business processes are required to comply with security, risk and compliance ... [more ▼]

Critical business processes can fail. Therefore, continuity processes are needed as backup solutions. At the same time business processes are required to comply with security, risk and compliance requirements. In the context discussed here, they should be modeled in a decentralized local and declarative way, including methodological support by tools. By discussing a simplified loan granting process in the context of a Business Continuity Management System at Credit Suisse, we show how algebraic graph transformation can contribute a methodologically sound solution being compatible with all these requirements in a coherent way. As a consequence significant benefits of automation and quality can be realized. The presented contribution is theoretically sound and implementable by the people in the field. [less ▲]

Detailed reference viewed: 155 (3 UL)
Full Text
Peer Reviewed
See detailSecurity and Consistency of IT and Business Models at Credit Suisse realized by Graph Constraints, Transformation and Integration using Algebraic Graph Theory
Brandt, Christoph; Hermann, Frank UL; Engel, Thomas UL

in Proc. Int. Conf. on Exploring Modeling Methods in Systems Analysis and Design 2009 (EMMSAD'09) (2009)

This paper shows typical security and consistency challenges regarding the models of the business and the IT universe of the dynamic service-, process- and rule-based environment at Credit Suisse. It ... [more ▼]

This paper shows typical security and consistency challenges regarding the models of the business and the IT universe of the dynamic service-, process- and rule-based environment at Credit Suisse. It presents a theoretical solution for enterprise engineering that is implementable, and fits smoothly with the daily needs and constraints of the people in the scenario. It further enables decentralized modeling based on cognitive and mathematical or logical concepts. Normative aspects of the models are analyzed by graph constraint checks, while consistency is checked and ensured by model integration and transformation. To cope with theoretical and practical necessities, the presented solution is kept sound and usable as well as extensible and scalable. All techniques are based on one theoretical framework: algebraic graph theory. Therefore, the techniques are compatible with each other. [less ▲]

Detailed reference viewed: 175 (1 UL)
Full Text
Peer Reviewed
See detailDefensive configuration with game theory
Becker, Sheila UL; State, Radu UL; Engel, Thomas UL

in The 11th IFIP/IEEE International Symposium on Integrated Network Management (2009)

Detailed reference viewed: 90 (1 UL)
Full Text
Peer Reviewed
See detailSlotted Packet Counting Attacks on Anonymity Protocols
Fusenig, Volker UL; Staab, Eugen UL; Sorger, Ulrich UL et al

in The proceedings of the Australasian Information Security Conference (2009)

In this paper we present a slotted packet counting attack against anonymity protocols. Common packet counting attacks make strong assumptions on the setup and can easily lead to wrong conclusions, as we ... [more ▼]

In this paper we present a slotted packet counting attack against anonymity protocols. Common packet counting attacks make strong assumptions on the setup and can easily lead to wrong conclusions, as we will show in our work. To overcome these limitations, we account for the variation of traffic load over time. We use correlation to express the relation between sender and receiver nodes. Our attack is applicable to many anonymity protocols. It assumes a passive attacker and works with partial knowledge of the network traffic. [less ▲]

Detailed reference viewed: 100 (4 UL)
Peer Reviewed
See detailUnlinkable Communication
Fusenig, Volker UL; Staab, Eugen UL; Sorger, Ulrich UL et al

in Privacy, Security and Trust, 2008. PST '08. Sixth Annual Conference on (2008)

In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols either do not guarantee ... [more ▼]

In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols either do not guarantee unlinkability (e.g. Tor and Mix networks), or produce huge overhead -- the dining cryptographers network causes quadratic number of messages. Our protocol needs only a linear number of messages while it still guarantees unlinkability. We introduce a measure of unlinkability and show that our protocol offers the highest possible degree of unlinkability. We show how to use the protocol in practice by adapting it to internet and ad hoc communication. [less ▲]

Detailed reference viewed: 141 (1 UL)
Peer Reviewed
See detailTree Based Flooding Protocol for Multi-Hop Wireless Networks
Frank, Raphaël UL; Scherer, Thomas UL; Engel, Thomas UL

in Proceedings of the 3rd International Conference on Broadband Communications, Information Technology & Biomedical Applications (2008)

Detailed reference viewed: 128 (1 UL)
Peer Reviewed
See detailEmergency Group Calls over Interoperable Networks
Frank, Raphaël UL; Scherer, Thomas UL; Engel, Thomas UL

in Proceedings of the 11th IEEE International Conference on Computational Science and Engineering (2008)

Detailed reference viewed: 106 (0 UL)
Peer Reviewed
See detailA Governmental Vision on Public Safety Group Calls and Object Tracing
Frank, Raphaël UL; Scherer, Thomas UL; Simon, Carlo et al

in Proceedings of the 14th Annual Conference on Disaster Recovery And Relief, Current & Future Approaches (2007)

Detailed reference viewed: 76 (6 UL)