References of "Ries, Thorsten 40020603"
     in
Bookmark and Share    
See detailPerformance and Security of Low-Latency Anonymisation Systems
Ries, Thorsten UL

Doctoral thesis (2012)

Detailed reference viewed: 89 (2 UL)
Full Text
Peer Reviewed
See detailThree songs and you are disconnected from cyberspace??? Not in Germany where the industry may ‘turn piracy into profit’
Schmitz, Sandra UL; Ries, Thorsten UL

in European Journal of Law and Technology (2012), 3(1),

Musical and cinematographic works are shared on a large scale via the Internet, often disrespecting copyrights. State initiatives seek to curtail online copyright infringements in different ways; the ... [more ▼]

Musical and cinematographic works are shared on a large scale via the Internet, often disrespecting copyrights. State initiatives seek to curtail online copyright infringements in different ways; the latest being graduated response schemes, where the alleged infringer is initially warned twice before he is sanctioned. In this context questions arise inter alia as regards the identification of the actual infringer, information rights of the rightsholder, reliability of tracking methods or judicial review of the allegations. In this context, it is of some interest to see how these questions are dealt with under similar regimes. This paper outlines how these questions and online copyright infringements in general are targeted under German civil law and how this has become a profitable tool of the music and film industry, in particular following the introduction of further information rights by the Enforcement Directive. It critically evaluates the recent developments in Germany and argues for a more restrictive interpretation of the relevant provision of the German Copyright Act. [less ▲]

Detailed reference viewed: 106 (4 UL)
Full Text
Peer Reviewed
See detailInstant Degradation of Anonymity in Low-Latency Anonymisation Systems
Ries, Thorsten UL; State, Radu UL; Engel, Thomas UL

in Sadre, Ramin; Novotny, Jiri; Celeda, Pavel (Eds.) et al Dependable Networks and Services, LNCS 7279 (2012)

Detailed reference viewed: 188 (5 UL)
Full Text
Peer Reviewed
See detailVerification of Data Location in Cloud Networking
Ries, Thorsten UL; Fusenig, Volker UL; Vilbois, Christian UL et al

in IEEE/ACM International Conference on Utility and Cloud Computing (2011)

Cloud computing aims to provide services and resources on a pay-as-you-use basis with additional possibilities for efficient adaptation of the required resources to the actual needs. Cloud networking ... [more ▼]

Cloud computing aims to provide services and resources on a pay-as-you-use basis with additional possibilities for efficient adaptation of the required resources to the actual needs. Cloud networking extends this approach by providing more flexibility in the placement, movement, and interconnection of these virtual resources. Depending on the use, customers however require the data to be located under a certain jurisdiction. To ensure this without the need of trusting the cloud operator, we propose a geolocation approach based on network coordinate systems and evaluate the accuracy of three prevalent systems. Even if the cloud operator uses supplemental measures like traffic relaying to hide the resource location, a high probability of location disclosure is achieved by the means of supervised classification algorithms. [less ▲]

Detailed reference viewed: 150 (1 UL)
Full Text
Peer Reviewed
See detailComparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance
Ries, Thorsten UL; Panchenko, Andriy UL; State, Radu UL et al

in Ninth Australasian Information Security Conference (2011)

The most popular system for providing practical low-latency anonymity on the Internet is Tor. However, many other tools besides Tor exist as both free and commercial solutions. In this paper, we consider ... [more ▼]

The most popular system for providing practical low-latency anonymity on the Internet is Tor. However, many other tools besides Tor exist as both free and commercial solutions. In this paper, we consider five most popular low-latency anonymisation services that represent the current state of the art: single-hop proxies (Perfect Privacy and free proxies) and Onion Routing based solutions (Tor, I2P, and Jon-Donym). We assess their usability and rank them in regard to their anonymity. We also assess their efficiency and reliability. To this end, we define a set of metrics and present extensive measurements based on round-trip time, inter-packet delay variation and throughput. Apart from the technical realization, economic aspects are also crucial for anonymous communication systems. In order to attract more users, which is mandatory in order to improve anonymity per se, systems need to exhibit a certain payoff. We therefore define an economic model that takes all relevant aspects into consideration. In this paper, we describe the results obtained, lessons learned, and provide guidance for selecting the most appropriate system with respect to a set of requirements. [less ▲]

Detailed reference viewed: 604 (4 UL)
Full Text
Peer Reviewed
See detailMeasuring anonymity using network coordinate systems
Ries, Thorsten UL; State, Radu UL; Engel, Thomas UL

in International Symposium on Communications and Information Technologies (ISCIT), 2011 (2011)

Popularity and awareness of anonymisation systems increased tremendously over the past years, however only a very few systems made it from research to production. These systems usually add intermediate ... [more ▼]

Popularity and awareness of anonymisation systems increased tremendously over the past years, however only a very few systems made it from research to production. These systems usually add intermediate nodes in the communication path aiming to hide user identities. Several attacks against these systems exist, like timing attacks or exploitation of latency information. In this paper, we propose an alternative approach to disclose users of current popular anonymisation systems in practice by the means of virtual network coordinate systems, a widely accepted method for latency prediction and network optimisation. Mapping physical nodes to a n-dimensional space can reveal a geographical proximity that is used to disclose users, who expect to stay anonymous. We define a model that leverages network coordinates in order to measure quantitatively the anonymity services and evaluate it on the Planet-Lab research network. The basic idea is to analyse the relative distance between nodes and to calculate the probability of nodes being hosted in the same location. Evaluation proves that our proposed model can be used as a measure of anonymity. [less ▲]

Detailed reference viewed: 128 (2 UL)
See detailTransmission of Family Values and Intergenerational Solidarity in Luxembourg . Paper presented at the 4th Congress of the European Society on Family Relations, Jyväskylä (Finland)
Albert, Isabelle UL; Ries, Thorsten UL; Michels, Tom et al

in Abstract paper of the 4th Congress of the European Society on Family Relations, Jyväskylä, Finland. (2008)

Detailed reference viewed: 76 (1 UL)