Results 201-208 of 208.
Bookmark and Share    
Full Text
Peer Reviewed
See detailModeling and Reconfiguration of critical Business Processes for the purpose of a Business Continuity Management respecting Security Risk and Compliance requirements at Credit Suisse using Algebraic Graph Transformation
Brandt, Christoph; Hermann, Frank UL; Engel, Thomas UL

in Enterprise Distributed Object Computing Conference Workshops, 2009. EDOCW 2009. 13th, Proc. International Workshop on Dynamic and Declarative Business Processes (DDBP 2009) (2009)

Critical business processes can fail. Therefore, continuity processes are needed as backup solutions. At the same time business processes are required to comply with security, risk and compliance ... [more ▼]

Critical business processes can fail. Therefore, continuity processes are needed as backup solutions. At the same time business processes are required to comply with security, risk and compliance requirements. In the context discussed here, they should be modeled in a decentralized local and declarative way, including methodological support by tools. By discussing a simplified loan granting process in the context of a Business Continuity Management System at Credit Suisse, we show how algebraic graph transformation can contribute a methodologically sound solution being compatible with all these requirements in a coherent way. As a consequence significant benefits of automation and quality can be realized. The presented contribution is theoretically sound and implementable by the people in the field. [less ▲]

Detailed reference viewed: 167 (3 UL)
Full Text
Peer Reviewed
See detailUsing Game Theory to configure P2P SIP
Becker, Sheila UL; State, Radu UL; Engel, Thomas UL

in Lecture Notes in Computer Science (2009)

Detailed reference viewed: 153 (5 UL)
Full Text
Peer Reviewed
See detailSlotted Packet Counting Attacks on Anonymity Protocols
Fusenig, Volker UL; Staab, Eugen UL; Sorger, Ulrich UL et al

in The proceedings of the Australasian Information Security Conference (2009)

In this paper we present a slotted packet counting attack against anonymity protocols. Common packet counting attacks make strong assumptions on the setup and can easily lead to wrong conclusions, as we ... [more ▼]

In this paper we present a slotted packet counting attack against anonymity protocols. Common packet counting attacks make strong assumptions on the setup and can easily lead to wrong conclusions, as we will show in our work. To overcome these limitations, we account for the variation of traffic load over time. We use correlation to express the relation between sender and receiver nodes. Our attack is applicable to many anonymity protocols. It assumes a passive attacker and works with partial knowledge of the network traffic. [less ▲]

Detailed reference viewed: 116 (5 UL)
Full Text
Peer Reviewed
See detailInteroperable Networking Applications for Emergency Services
Frank, Raphaël UL; Hourte, Benjamin; Jungels, Dan et al

in International Journal of Multimedia and Ubiquitous Engineering (2009), 4(1), 1122

Detailed reference viewed: 97 (2 UL)
Peer Reviewed
See detailEmergency Group Calls over Interoperable Networks
Frank, Raphaël UL; Scherer, Thomas UL; Engel, Thomas UL

in Proceedings of the 11th IEEE International Conference on Computational Science and Engineering (2008)

Detailed reference viewed: 128 (3 UL)
Peer Reviewed
See detailTree Based Flooding Protocol for Multi-Hop Wireless Networks
Frank, Raphaël UL; Scherer, Thomas UL; Engel, Thomas UL

in Proceedings of the 3rd International Conference on Broadband Communications, Information Technology & Biomedical Applications (2008)

Detailed reference viewed: 152 (3 UL)
Peer Reviewed
See detailUnlinkable Communication
Fusenig, Volker UL; Staab, Eugen UL; Sorger, Ulrich UL et al

in Privacy, Security and Trust, 2008. PST '08. Sixth Annual Conference on (2008)

In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols either do not guarantee ... [more ▼]

In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols either do not guarantee unlinkability (e.g. Tor and Mix networks), or produce huge overhead -- the dining cryptographers network causes quadratic number of messages. Our protocol needs only a linear number of messages while it still guarantees unlinkability. We introduce a measure of unlinkability and show that our protocol offers the highest possible degree of unlinkability. We show how to use the protocol in practice by adapting it to internet and ad hoc communication. [less ▲]

Detailed reference viewed: 160 (1 UL)
Peer Reviewed
See detailA Governmental Vision on Public Safety Group Calls and Object Tracing
Frank, Raphaël UL; Scherer, Thomas UL; Simon, Carlo et al

in Proceedings of the 14th Annual Conference on Disaster Recovery And Relief, Current & Future Approaches (2007)

Detailed reference viewed: 97 (9 UL)