References of "Engel, Thomas 50001752"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailModeling and Reconfiguration of critical Business Processes for the purpose of a Business Continuity Management respecting Security Risk and Compliance requirements at Credit Suisse using Algebraic Graph Transformation
Brandt, Christoph; Hermann, Frank UL; Engel, Thomas UL

in Enterprise Distributed Object Computing Conference Workshops, 2009. EDOCW 2009. 13th, Proc. International Workshop on Dynamic and Declarative Business Processes (DDBP 2009) (2009)

Critical business processes can fail. Therefore, continuity processes are needed as backup solutions. At the same time business processes are required to comply with security, risk and compliance ... [more ▼]

Critical business processes can fail. Therefore, continuity processes are needed as backup solutions. At the same time business processes are required to comply with security, risk and compliance requirements. In the context discussed here, they should be modeled in a decentralized local and declarative way, including methodological support by tools. By discussing a simplified loan granting process in the context of a Business Continuity Management System at Credit Suisse, we show how algebraic graph transformation can contribute a methodologically sound solution being compatible with all these requirements in a coherent way. As a consequence significant benefits of automation and quality can be realized. The presented contribution is theoretically sound and implementable by the people in the field. [less ▲]

Detailed reference viewed: 166 (3 UL)
Full Text
Peer Reviewed
See detailDefensive configuration with game theory
Becker, Sheila UL; State, Radu UL; Engel, Thomas UL

in The 11th IFIP/IEEE International Symposium on Integrated Network Management (2009)

Detailed reference viewed: 110 (1 UL)
Peer Reviewed
See detailTree Based Flooding Protocol for Multi-Hop Wireless Networks
Frank, Raphaël UL; Scherer, Thomas UL; Engel, Thomas UL

in Proceedings of the 3rd International Conference on Broadband Communications, Information Technology & Biomedical Applications (2008)

Detailed reference viewed: 150 (3 UL)
Peer Reviewed
See detailEmergency Group Calls over Interoperable Networks
Frank, Raphaël UL; Scherer, Thomas UL; Engel, Thomas UL

in Proceedings of the 11th IEEE International Conference on Computational Science and Engineering (2008)

Detailed reference viewed: 126 (3 UL)
Peer Reviewed
See detailUnlinkable Communication
Fusenig, Volker UL; Staab, Eugen UL; Sorger, Ulrich UL et al

in Privacy, Security and Trust, 2008. PST '08. Sixth Annual Conference on (2008)

In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols either do not guarantee ... [more ▼]

In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols either do not guarantee unlinkability (e.g. Tor and Mix networks), or produce huge overhead -- the dining cryptographers network causes quadratic number of messages. Our protocol needs only a linear number of messages while it still guarantees unlinkability. We introduce a measure of unlinkability and show that our protocol offers the highest possible degree of unlinkability. We show how to use the protocol in practice by adapting it to internet and ad hoc communication. [less ▲]

Detailed reference viewed: 159 (1 UL)
Peer Reviewed
See detailA Governmental Vision on Public Safety Group Calls and Object Tracing
Frank, Raphaël UL; Scherer, Thomas UL; Simon, Carlo et al

in Proceedings of the 14th Annual Conference on Disaster Recovery And Relief, Current & Future Approaches (2007)

Detailed reference viewed: 93 (9 UL)