Hasso-Plattner-Institut
 
    • de
 

Conference Papers on "Security and Trust Engineering" at the Chair of Prof. Dr. Christoph Meinel

Here you can find all our peer-reviewed conference papers about security and trust engineering:

[ 2023 ] [ 2022 ] [ 2021 ] [ 2020 ] [ 2019 ] [ 2018 ] [ 2017 ] [ 2016 ] [ 2015 ] [ 2014 ] [ 2013 ] [ 2012 ] [ 2011 ] [ 2010 ] [ 2009 ] [ 2008 ] [ 2007 ] [ 2006 ] [ 2005 ] [ 2004 ] [ 2003 ] [ 2001 ] [ 2000 ]

2023 [ nach oben ]

  • De-anonymising individual... - Download
    1.
    Podlesny, N.J., Kayem, A.V., Meinel, C.: De-anonymising individuals through unique patterns in movement data. Computing Conference 2023 (2023).
     

2022 [ nach oben ]

  • CoK: A Survey of Privacy ... - Download
    1.
    Podlesny, N.J., Kayem, A.V.D.M., Meinel, C.: CoK: A Survey of Privacy Challenges in Relation to Data Meshes. In: Strauss, C., Cuzzocrea, A., Kotsis, G., Tjoa, A.M., and Khalil, I. (eds.) Database and Expert Systems Applications - 33rd International Conference, DEXA 2022, Vienna, Austria, August 22-24, 2022, Proceedings, Part I. pp. 85–102. Springer, Cham, Vienna, Austria (2022).
     
  • A Comprehensive Review of... - Download
    2.
    Majd, M., Najafi, P., Alhosseini, S.A., Cheng, F., Meinel, C.: A Comprehensive Review of Anomaly Detection in Web Logs. Proceedings of the 9th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT’22). IEEE Press, Vancouver, Washington, USA (2022).
     
  • A Multi-agent Model to Su... - Download
    3.
    Motlagh, F.N., Kayem, A.V., Meinel, C.: A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media. In: Barolli, L., Hussain, F., and Enokido, T. (eds.) Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022). pp. 140–151. Spinger, Sydney, Australia (2022).
     

2021 [ nach oben ]

  • A Review of Scaling Genom... - Download
    1.
    Podlesny, N.J., Kayem, A.V.D.M., Meinel, C.: A Review of Scaling Genome Sequencing Data Anonymisation. In: Barolli, L., Woungang, I., and Enokido, T. (eds.) Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 3. pp. 491–501. Springer (2021).
     
  • Analyzing Interoperabilit... - Download
    2.
    Grüner, A., Mühle, A., Meinel, C.: Analyzing Interoperability and Portability Concepts for Self-Sovereign Identity. Proceedings of the 2021 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (accepted). IEEE, Shenyang, China (2021).
     
  • On the Structure and Asse... - Download
    3.
    Grüner, A., Mühle, A., Meinel, C.: On the Structure and Assessment of Trust Models in Attribute Assurance. Proceedings of the 35th International Conference on Advanced Information Networking and Applications. Springer, Toronto, Canada (2021).
     
  • 4.
    Ehrmann, L., Stolle, M., Klieme, E., Tietz, C., Meinel, C.: Detecting Interaction Activities While Walking Using Smartphone Sensors. In: Barolli, L., Woungang, I., and Enokido, T. (eds.) Advanced Information Networking and Applications. pp. 382–393. Springer (2021).
     
  • ATIB: Design and Evaluati... - Download
    5.
    Grüner, A., Mühle, A., Meinel, C.: ATIB: Design and Evaluation of an Architecture for Brokered Self-Sovereign Identity Integration and Trust-Enhancing Attribute Aggregation for Service Provider. IEEE Access. 9, 138553–138570 (2021).
     
  • 6.
    Klieme, E., Trenz, P., Paeschke, D., Tietz, C., Meinel, C.: DoorCollect: Towards a Smart Door Handle for User Identification based on a Data Collection System for unsupervised Long-Term Experiments. 2021 IEEE Symposium on Computers and Communications (ISCC). pp. 1–7 (2021).
     
  • Enabling Co-Owned Image P... - Download
    7.
    Motlagh, F.N., Kayem, A.V., Podlesny, N.J., Meinel, C.: Enabling Co-Owned Image Privacy on Social Media via Agent Negotiation. The 23rd International Conference on Information Integration and Web Intelligence. pp. 152–156. Association for Computing Machinery, Linz, Austria (2021).
     
  • 8.
    Podlesny, N.J., Kayem, A.V.D.M., Meinel, C.: GPU Accelerated Bayesian Inference for Quasi-Identifier Discovery in High-Dimensional Data. In: Barolli, L., Woungang, I., and Enokido, T. (eds.) Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 2. pp. 495–508. Springer (2021).
     
  • Consuming Security: Evalu... - Download
    9.
    Koehler, D., Serth, S., Meinel, C.: Consuming Security: Evaluating Podcasts to Promote Online Learning Integrated with Everyday Life. 2021 World Engineering Education Forum/Global Engineering Deans Council (WEEF/GEDC). pp. 476–481. IEEE, Madrid, Spain (2021).
     
  • 10.
    Koehler, D., Klieme, E., Kreuseler, M., Cheng, F., Meinel, C.: Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords. Proceedings of 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP 2021). IEEE (2021).
     
  • 11.
    Koehler, D., Klieme, E., Kreuseler, D., Cheng, F., Meinel, C.: Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords. Proceedings of 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP 2021). IEEE (2021).
     

2020 [ nach oben ]

  • 1.
    Klieme, E., Wilke, J., van Dornick, N., Meinel, C.: FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). pp. 1857–1867 (2020).
     
  • 2.
    Tietz, C., Klieme, E., Brabender, R., Lasarow, T., Rambold, L., Meinel, C.: Under Pressure: Pushing Down on Me - Touch Sensitive Door Handle to Identify Users at Room Entry. In: Samarati, P., di Vimercati, S.D.C., Obaidat, M.S., and Ben-Othman, J. (eds.) Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020. pp. 565–571. ScitePress (2020).
     
  • A Taxonomy of Trust Model... - Download
    3.
    Grüner, A., Mühle, A., Meinel, C.: A Taxonomy of Trust Models for Attribute Assurance in Identity Management. Proceedings of the Workshops of the International 34th Conference on Advanced Information Networking and Applications. Springer, Caserta, Italy (2020).
     

2019 [ nach oben ]

  • MalRank: A Measure of Mal... - Download
    1.
    Najafi, P., Mühle, A., Pünter, W., Cheng, F., Meinel, C.: MalRank: A Measure of Maliciousness in SIEM-based Knowledge Graphs. Proceedings of the 35th Annual Computer Security Applications Conference. pp. 417–429. ACM (2019).
     
  • 2.
    Seidel, F., Krentz, K.-F., Meinel, C.: Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers. Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT). IEEE, Limerick, Ireland (2019).
     
  • 3.
    Bock, B., Matysik, J.-T., Krentz, K.-F., Meinel, C.: Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme. Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT). IEEE, Limerick, Ireland (2019).
     
  • A Comparative Analysis of... - Download
    4.
    Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C.: A Comparative Analysis of Trust Requirements in Decentralized Identity Management. Proceedings of the 33rd. International Conference on Advanced Information Networking and Applications. Springer, Matsue, Japan (2019).
     
  • 5.
    Torkura, K. .A, Sukmana, M.I.H., Cheng, F., Meinel, C.: SlingShot: Automated Threat Detection and Incident Response in Multi-Cloud Storage Systems. The Proceedings of 18th IEEE International Symposium on Network Computing and Applications (NCA 2019). IEEE (2019).
     
  • 6.
    Torkura, K. .A, Sukmana, M.I.H., Cheng, F., Meinel, C.: Security Chaos Engineering for Cloud Services. The Proceedings of 18th IEEE International Symposium on Network Computing and Applications (NCA 2019). IEEE (2019).
     
  • An Integration Architectu... - Download
    7.
    Grüner, A., Mühle, A., Meinel, C.: An Integration Architecture to Enable Service Providers for Self-sovereign Identity. Proceedings of the 18th. International Symposium on Network Computing and Applications. IEEE, Boston, MA (2019).
     
  • 8.
    Podlesny, N.J.: High-dimensional data anonymization for in-memory applications, (2019).
     
  • 9.
    Podlesny, N.J., Kayem, A.V., Meinel, C., Jungmann, S.: How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect. Proceedings of the 9th International Conference on Digital Public Health. pp. 55–62. ACM (2019).
     
  • 10.
    Podlesny, N.J., Kayem, A.V., Meinel, C.: Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization. Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy. pp. 109–119. ACM (2019).
     
  • 11.
    Podlesny, N.J., Kayem, A.V., Meinel, C.: Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold. 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). pp. 556–563. IEEE (2019).
     
  • 12.
    Podlesny, N.J., Kayem, A.V., Meinel, C.: Towards Identifying De-anonymisation Risks in Distributed Health Data Silos. International Conference on Database and Expert Systems Applications. pp. 33–43. Springer (2019).
     
  • Using Probabilistic Attri... - Download
    13.
    Grüner, A., Mühle, A., Meinel, C.: Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance. Proceedings of the 2019 IEEE Symposium Series on Computational Intelligence in Cyber Security. IEEE, Xiamen, China (2019).
     
  • 14.
    Tietz, C., Klieme, E., Behrendt, L., Böning, P., Marschke, L., Meinel, C.: Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC. 2019 3rd Cyber Security in Networking Conference (CSNet). pp. 130–137 (2019).
     

2018 [ nach oben ]

  • 1.
    Podlesny, N.J., Kayem, A.V., von Schorlemer, S., Uflacker, M.: Minimising Information Loss on Anonymised High Dimensional Data with Greedy In-Memory Processing. International Conference on Database and Expert Systems Applications. pp. 85–100. Springer (2018).
     
  • 2.
    Torkura, K. .A, Sukmana, M.I.H., Kayem, A.V., Cheng, F., Meinel, C.: A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures. 32nd IEEE International Symposium on Parallel and Distributed Processing with Applications. IEEE (2018).
     
  • 3.
    Krentz, K.-F., Meinel, C., Graupner, H.: Denial-of-Sleep-Resilient Session Key Establishment for IEEE 802.15.4 Security: From Adaptive to Responsive. Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN 2018). Junction, Madrid, Spain (2018).
     
  • 4.
    Torkura, K. .A, Sukmana, M.I.H., Meinig, M., Kayem, A., Cheng, F., Graupner, H., Meinel, C.: Securing Cloud Storage Brokerage Systems through Threat Models. The 32nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2018). IEEE (2018).
     
  • 5.
    Torkura, K. .A, Sukmana, M.I.H., Cheng, F., Meinel, C.: CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era. 14th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2018). Springer (2018).
     
  • 6.
    Torkura, K. .A, Sukmana, M.I.H., Tim, S., Cheng, F., Graupner, H., Meinel, C.: CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems. The Proceedings of 17th IEEE International Symposium on Network Computing and Applications (NCA 2018). IEEE (2018).
     
  • 7.
    Torkura, K. .A, Sukmana, M.I.H., Tim, S., Cheng, F., Graupner, H., Meinel, C.: Defeating Malicious Intrusions in Multi-Cloud Storage Systems. Proceedings of the 6th HPI Cloud Symposium “Operating the Cloud” 2018. Hasso Plattner Institute, Potsdam, Germany (2018).
     
  • A Quantifiable Trust Mode... - Download
    8.
    Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C.: A Quantifiable Trust Model for Blockchain-Based Identity Management. Proceedings of the 2018 International Conference on Blockchain. IEEE, Halifax, Canada (2018).
     
  • Towards a Blockchain-base... - Download
    9.
    Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C.: Towards a Blockchain-based Identity Provider. Proceedings of the 12th. International Conference on Emerging Security Information, Systems and Technologies. IARIA, Venice, Italy (2018).
     
  • 10.
    Torkura, K.A., Sukmana, M.I., Meinig, M., Graupner, H., Cheng, F., Meinel, C.: A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems. 16th IEEE/IFIP Network Operations and Management Symposium (NOMS 2018). IEEE/IFIP (2018).
     
  • 11.
    Klieme, E., Tietz, C., Meinel, C.: Beware of SMOMBIES: Verification of Users Based on Activities While Walking. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). pp. 651–660 (2018).
     

2017 [ nach oben ]

  • 1.
    Krentz, K.-F., Meinel, C., Graupner, H.: Secure Self-Seeding with Power-Up SRAM States. Proceedings of the 22nd IEEE Symposium on Computers and Communications (ISCC 2017). IEEE, Heraklion, Greece (2017).
     
  • Countering Three Denial-o... - Download
    2.
    Krentz, K.-F., Meinel, C., Graupner, H.: Countering Three Denial-of-Sleep Attacks on ContikiMAC. Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN 2017). Junction, Uppsala, Sweden (2017).
     
  • 3.
    Seitz, K., Serth, S., Krentz, K.-F., Meinel, C.: Demo: Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages. 15th ACM Conference on Embedded Networked Sensor Systems (SenSys 2017). ACM, Delft, The Netherlands (2017).
     
  • 4.
    Krentz, K.-F., Meinel, C., Graupner, H.: More Lightweight, yet Stronger 802.15.4 Security through an Intra-Layer Optimization. Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS 2017). Springer, Nancy, France (2017).
     
  • 5.
    Torkura, K.A., Sukmana, M.I., Meinel, C.: Integrating Continuous Security Assessments in Microservices and Cloud Native Applications. Proceedings of the10th International Conference on Utility and Cloud Computing. pp. 171–180. ACM (2017).
     
  • Guilt-by-Association: Det... - Download
    6.
    Najafi, P., Sapegin, A., Cheng, F., Meinel, C.: Guilt-by-Association: Detecting Malicious Entities via Graph Mining. International Conference on Security and Privacy in Communication Systems. pp. 88–107. Springer (2017).
     
  • 7.
    Gawron, M., Cheng, F., Meinel, C.: Automatic Vulnerability Classification using Machine Learning. Proceedings of the 12th International Conference on Risks and Security of Internet and Systems (CRiSIS 2017). Springer (2017).
     
  • 8.
    Torkura, K.A., Sukmana, M.I., Cheng, F., Meinel, C.: Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications. Proceedings of the 2nd IEEE International Conference on Smart Cloud (SmartCloud). IEEE (2017).
     
  • Clustering Heuristics for... - Download
    9.
    Kayem, A., Meinel, C.: Clustering Heuristics for Efficient t-closeness Anonymisation. In: Benslimane, D., Damiani, E., Grosky, W.I., Hameurlain, A., Sheth, A.P., and Wagner, R.R. (eds.) Proceedings of the 28th International Conference on Database and Expert Systems Applications. pp. 27–34. Springer (2017).
     
  • Demo: Enabling En-Route F... - Download
    10.
    Seitz, K., Serth, S., Krentz, K.-F., Meinel, C.: Demo: Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages. Proceedings of the 15th ACM Conference on Embedded Networked Sensor Systems (SenSys 2017). ACM Press, New York, NY, USA (2017).
     

2016 [ nach oben ]

  • POTR: Practical On-the-fl... - Download
    1.
    Krentz, K.-F., Meinel, C., Schnjakin, M.: POTR: Practical On-the-fly Rejection of Injected and Replayed 802.15.4 Frames. Proceedings of the International Conference on Availability, Reliability and Security (ARES 2016). IEEE, Salzburg, Austria (2016).
     
  • 2.
    Torkura, K., Meinel, C.: Towards Vulnerability Assessment as a Service in OpenStack Clouds. Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN). IEEE, Dubai, UAE (2016).
     
  • 3.
    Jaeger, D., Pelchen, C., Graupner, H., Cheng, F., Meinel, C.: Analysis of Publicly Leaked Credentials and the Long Story of Password (Re-)use. Proceedings of the 11th International Conference on Passwords (PASSWORDS2016). Springer, Bochum, Germany (2016).
     
  • 4.
    Amirkhanyan, A., Meinel, C.: Analysis of the Value of Public Geotagged Data from Twitter from the Perspective of Providing Situational Awareness. Proceedings of the 15th IFIP Conference on e-Business, e-Services and e-Society (I3E2016) - Social Media: The Good, the Bad, and the Ugly. Springer, Swansea, Wales, UK (2016).
     
  • 5.
    Amirkhanyan, A., Meinel, C.: Visualization and Analysis of Public Social Geodata to Provide Situational Awareness. Proceedings of the 8th International Conference on Advanced Computational Intelligence (ICACI2016). IEEE, Chiang Mai, Thailand (2016).
     

2015 [ nach oben ]

  • 1.
    Torkura, K.A., Meinel, C.: Towards Cloud-Aware Vulnerability Assessments. Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS2015). IEEE (2015).
     
  • 2.
    Jaeger, D., Azodi, A., Cheng, F., Meinel, C.: Normalizing Security Events with a Hierarchical Knowledge Base. Proceedings of the 9th WISTP International Conference on Information Security Theory and Practice (WISTP’15) (2015).
     
  • 3.
    Jaeger, D., Azodi, A., Cheng, F., Meinel, C.: Normalizing Security Events with a Hierarchical Knowledge Base. Proceedings of the 9th International Conference on Information Security Theory and Practice (WISTP’15). pp. 237–248. Springer Internation Publishing (2015).
     
  • 4.
    Torkura, K.A., Cheng, F., Meinel, C.: A Proposed Framework For Proactive Vulnerability Assessments in Cloud Deployments. Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST2015). IEEE (2015).
     
  • Handling Reboots and Mobi... - Download
    5.
    Krentz, K.-F., Meinel, C.: Handling Reboots and Mobility in 802.15.4 Security. Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC 2015). ACM, Los Angeles, CA, USA (2015).
     
  • 6.
    Ussath, M., Cheng, F., Meinel, C.: Concept for a Security Investigation Framework. Proceedings of the 7th IFIP International Conference on New Technologies, Mobility, and Security (NTMS’15) (2015).
     
  • 7.
    Cheng, F., Sapegin, A., Gawron, M., Meinel, C.: Analyzing Boundary Device Logs on the In-Memory Platform. Proceedings of the IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity‘15). IEEE (2015).
     
  • 8.
    Torkura, K.A., Cheng, F., Meinel, C.: Aggregating Vulnerability Information for Proactive Cloud Vulnerability Assessment. Journal of Internet Technology and Secured Transactions. 4, (2015).
     
  • 9.
    Sapegin, A., Gawron, M., Jaeger, D., Cheng, F., Meinel, C.: High-speed Security Analytics Powered by In-memory Machine Learning Engine. Proceedings of the 14th International Symposium on Parallel and Distributed Computing (ISPDC 2015). pp. 74–81. IEEE (2015).
     
  • 10.
    Gawron, M., Cheng, F., Meinel, C.: Automatic Detection of Vulnerabilities for Advanced Security Analytics. Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium (APNOMS’15). pp. 471–474. IEEE (2015).
     
  • 11.
    Azodi, A., Gawron, M., Sapegin, A., Cheng, F., Meinel., C.: Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes. Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN’15). Springer (2015).
     
  • 12.
    Torkura, K.A., Cheng, F., Meinel, C.: Application of Quantitative Security Metrics In Cloud Computing. Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST2015). IEEE (2015).
     
  • 13.
    Gawron, M., Cheng, F., Meinel, C.: Automatic Vulnerability Detection for Weakness Visualization and Advisory Creation. Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15). pp. 229–236. ACM Press (2015).
     
  • 14.
    Amirkhanyan, A., Sapegin, A., Cheng, F., Meinel, C.: Simulation User Behavior on A Security Testbed Using User Behavior States Graph. Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15). pp. 217–223. ACM Press (2015).
     
  • 15.
    Sapegin, A., Amirkhanyan, A., Gawron, M., Cheng, F., Meinel, C.: Poisson-based Anomaly Detection for Identifying Malicious User Behaviour. Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN’15). Springer (2015).
     
  • 16.
    Amirkhanyan, A., Cheng, F., Meinel, C.: Real-Time Clustering of Massive Geodata for Online Maps to Improve Visual Analysis. Proceedings of the 11th International Conference on Innovations in Information Technology (IIT2015). IEEE, Dubai, UAE (2015).
     
  • 17.
    Sianipar, J.H., Meinel, C.: A verification mechanism for cloud brokerage system. Proceedings of the Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2015). pp. 143–148. IEEE Press, Lodz, Poland (2015).
     
  • 18.
    Sianipar, J.H., Meinel, C.: A verification mechanism for cloud brokerage system. Proceedings of the Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2015). pp. 143–148. IEEE Press, Lodz, Poland (2015).
     
  • 19.
    Elsaid, M.E., Meinel, C.: Friendship based Storage Allocation for Online Social Networks Cloud Computing. Proceedings of the International Conference of Cloud Computing Technologies and Applications (CloudTech 2015). IEEE Press, Marrakesh, Morrocco (2015).
     
  • 20.
    Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: Passive Network Monitoring using REAMS. Proceedings of the 6th International Conference on Information Science and Applications (ICISA 2015). pp. 205–215. Sprinter, Pattaya, Thailand (2015).
     

2014 [ nach oben ]

  • 1.
    Klieme, E., Engelbrecht, K.-P., Möller, S.: Poster: Towards Continuous Authentication Based on Mobile Messaging App Usage. Symposium on Usable Privacy and Security. (2014).
     
  • 2.
    Saleh, E., Sianipar, J., Takouna, I., Meinel, C.: SecPlace: Security-Aware Placement Model for Multi-tenant SaaS Environments. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, December 9-12, 2014. pp. 596–602. IEEE Computer Society, Bali, Indonesia (2014).
     
  • 3.
    Fleischhacker, N., Manulis, M., Azodi, A.: A Framework for Multi-Factor Authentication and Key Exchange. In Proceedings of the the 1st International Conference on Research in Security Standardisation (SSR 2014). Springer, London, UK (2014).
     
  • 4.
    Jaeger, D., Graupner, H., Sapegin, A., Cheng, F., Meinel, C.: Gathering and Analyzing Identity Leaks for Security Awareness. Proceedings of the 7th International Conference on Passwords (PASSWORDS 2014). Springer, Trondheim, Norway (2014).
     
  • 5.
    Sianipar, J., Saleh, E., Meinel, C.: Construction of Agent-Based Trust in Cloud Infrastructure. Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2014, London, United Kingdom, December 8-11, 2014. pp. 941–946. IEEE Computer Society, London, United Kingdom (2014).
     
  • 6.
    Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: Runtime Updatable and Dynamic Event Processing using Embedded ECMAScript Engines. In Proceedings of the 4rd IEEE International Conference on IT Convergence and Security (ICITCS 2014). IEEE Press, Beijing, China (2014).
     
  • 7.
    Elsaid, M.E., Meinel, C.: Live Migration Impact on Virtual Datacenter Performance. Proceedings of the 2nd International Conference on Future Internet of Things and Cloud (FiCloud 2014). pp. 216–221. IEEE Press, Barcelona, Spain (2014).
     

2013 [ nach oben ]

  • 1.
    Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems. Proceedings of the 1st International Conference on Advanced Cloud and Big Data. IEEE CS, Nanjing, China (2013).
     
  • 2.
    Cheng, F., Azodi, A., Jaeger, D., Meinel, C.: Multi-Core Supported High Performance Security Analytics. Proceedings of the 13th IEEE International Conference on Scalable Computing and Communication (ScalCom 2013). IEEE CS, Chengdu, China (2013).
     
  • 3.
    Sapegin, A., Cheng, F., Meinel, C.: Catch the Spike: on the Locality of Individual BGP Update Bursts. Proceedings of the 9th IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2013). pp. 78–83. IEEE CS, Dalian, China (2013).
     
  • 4.
    Cheng, F., Azodi, A., Jaeger, D., Meinel, C.: Security Event Correlation Supported by Multi-Core Architecture. Proceedings of the 3rd IEEE International Conference on IT Convergence and Security (ICITCS 2013). pp. 1–5. IEEE CS, Macau, China (2013).
     
  • Applying Erasure Codes fo... - Download
    5.
    Schnjakin, M., Metzke, T., Meinel, C.: Applying Erasure Codes for Fault Tolerance in Cloud-RAID. Proceedings of 16th IEEE International Conference on Computational Science and Engineering (CSE2013). IEEE, Sydney, Australia (2013).
     
  • 6.
    Sapegin, A., Jaeger, D., Azodi, A., Gawron, M., Cheng, F., Meinel, C.: Hierarchical Object Log Format for Normalisation of Security Events. Proceedings of the 9th International Conference on Information Assurance and Security (IAS 2013). IEEE CS, Tunis, Tunisia (2013).
     
  • 7.
    Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: A New Approach to Building a Multi-Tier Direct Access Knowledgebase For IDS/SIEM Systems. Proceedings of the 11th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2013). IEEE CS, Chengdu, China (2013).
     
  • A Flexible Framework For ... - Download
    8.
    Rafiee, H., Mueller, C., Niemeier, L., Streek, J., Sterz, C., Meinel, C.: A Flexible Framework For Detecting IPv6 Vulnerabilities. Proceedings of The 6th International Conference on Security of Information and Networks (SIN 2013). ACM Press, Aksaray, Turkey (2013).
     
  • Privacy and Security in I... - Download
    9.
    Rafiee, H., Meinel, C.: Privacy and Security in IPv6 Networks: Challenges and Possible Solutions. ACM. ACM press, Aksaray, Turkey (2013).
     
  • 6LoWPAN Security: Adding ... - Download
    10.
    Krentz, K.-F., Rafiee, H., Meinel, C.: 6LoWPAN Security: Adding Compromise Resilience to the 802.15.4 Security Sublayer. Proceedings of the 1st ACM International Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI 2013). ACM, Zurich, Switzerland (2013).
     
  • Evaluation of Cloud-RAID:... - Download
    11.
    Schnjakin, M., Meinel, C.: Evaluation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. Proceedings of the 22nd International Conference on Computer Communications and Networks (ICCCN2013). pp. 1–9. IEEE, Nassau, Bahamas (2013).
     
  • 12.
    Saleh, E., Takouna, I., Meinel, C.: SignedQuery: Protecting Users Data in Multi-tenant SaaS Environments. Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI2013). pp. 213–218. IEEE Press, Mysore, India (2013).
     
  • A Secure, Flexible Framew... - Download
    13.
    Rafiee, H., Meinel, C.: A Secure, Flexible Framework for DNS Authentication in IPv6 Autoconfiguration. Proceedings of the 12th IEEE International Symposium on Network Computing and Applications (NCA2013). pp. 165–172. IEEE Press, MA, USA (2013).
     
  • The State of Public Cloud... - Download
    14.
    Schnjakin, M., Meinel, C.: The State of Public Cloud Storage and Cloud-RAID: a Secure and Reliable Storage above the Clouds. Proceedings of the 13. Deutscher IT-Sicherheitskongress (Sicherheit2013) (2013).
     
  • Implementation of Cloud-R... - Download
    15.
    Schnjakin, M., Meinel, C.: Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. Proceedings of the 8th International Conference on Grid and Pervasive Computing (GPC2013). pp. 91–102. Springer, Seoul, Korea (2013).
     
  • HPISecure: Towards Data C... - Download
    16.
    Saleh, E., Meinel, C.: HPISecure: Towards Data Confidentiality in Cloud Applications. Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (CCGrid2013). pp. 605–609. IEEE CS, Delft, Netherlands (2013).
     
  • Implementation of a Secur... - Download
    17.
    Schnjakin, M., Korsch, D., Schoenberg, M., Meinel, C.: Implementation of a Secure and Reliable Storage Above the Untrusted Clouds. Proceedings of 8th International Conference on Computer Science and Education (ICCSE 2013). pp. 347–353. IEEE, Colombo (2013).
     
  • A Robust Optimization for... - Download
    18.
    Takouna, I., Dawoud, W., Sachs, K., Meinel, C.: A Robust Optimization for Proactive Energy Management in Virtualized Data Centers. Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering(ICPE2013). pp. 323–326. ACM Press, Prague, Czech Republic (2013).
     
  • DNS Update Extension to I... - Download
    19.
    Rafiee, H., von Löwis, M., Meinel, C.: DNS Update Extension to IPv6 Secure Addressing. Proceedings of the Ninth International Symposium on Frontiers of Information Systems and Network Applications (FINA2013). pp. 896–902. IEEE CS, Barcelona, Spain (2013).
     

2012 [ nach oben ]

  • Online Assessment for Han... - Download
    1.
    Willems, C., Meinel, C.: Online Assessment for Hands-On Cybersecurity Training in a Virtual Lab. Proceedings of the 3rd IEEE Global Engineering Education Conference (EDUCON 2012). IEEE Press, Marrakesh, Morocco (2012).
     
  • Dynamic Scalability and C... - Download
    2.
    Dawoud, W., Takouna, I., Meinel, C.: Dynamic Scalability and Contention Prediction in Public Infrastructure using Internet Application Profiling. Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012). , Taiwan, China (2012).
     
  • 3.
    Takouna, I., Dawoud, W., Meinel, C.: Analysis and Simulation of HPC Applications in Virtualized Data Centers. Proceedings of the IEEE International Conference on Green Computing and Communications (GreenCom 2012). IEEE Press, Besançon, France (2012).
     
  • Cryptographically Generat... - Download
    4.
    AlSa’deh, A., Rafiee, H., Meinel, C.: Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches. Proceedings of the 12th IEEE International Conference on Computer and Information Technology (IEEE CIT’12). IEEE CS Press, Chengdu, Sichuan, China (2012).
     
  • 5.
    Arulogun, T., AlSa’deh, A., Meinel, C.: IPv6 Private Networks: Security Consideration and recommendation. Proceedings of the Fourth International Conference on Mobile e-Services (ICOMeS). , LAUTECH, Ogbomoso (2012).
     
  • 6.
    Arulogun, T., Meinel, C., Emuoyibofarhe, J.: IPv6 Based Wireless Sensor Networks Electronic Health Monitoring System. Proceedings of the Fourth International Conference on Mobile e-Services (ICOMeS). , LAUTECH , Ogbomoso (2012).
     
  • Reputation Objects for In... - Download
    7.
    Alnemr, R., Meinel, C.: Reputation Objects for Interoperable Reputation Exchange: Implementation and Design Decisions. The 7th IEEE International Workshop on Trusted Collaboration (TrustCol 2012). IEEE (2012).
     
  • IPv6 Stateless Address Au... - Download
    8.
    AlSa’deh, A., Rafiee, H., Meinel, C.: IPv6 Stateless Address Autoconfiguration: Balancing Between Security, Privacy and Usability. Proceedings of the 5th International Symposium on Foundations & Practice of Security (FPS 2012). Springer, Montreal, QC, Canada (2012).
     
  • Reliable Approach to Sell... - Download
    9.
    Dawoud, W., Takouna, I., Meinel, C.: Reliable Approach to Sell the Spare Capacity in the Cloud. Proceedings of the 3rd International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2012). pp. 229–236. , Nice, France (2012).
     
  • Increasing Spot Instances... - Download
    10.
    Dawoud, W., Takouna, I., Meinel, C.: Increasing Spot Instances Reliability using Dynamic Scalability. IEEE Fifth International Conference on Cloud Computing (CLOUD 2012). pp. 959–961. IEEE CS Press, Honolulu, Hawaii, USA (2012).
     
  • 11.
    Neuhaus, C., Alnemr, R., Kessler, L., Schlegel, F., Polze, A.: InstantLab 2.0- A Platform for Operating System Experiments on Public Cloud Infrastructure. Presented at the May (2012).
     
  • Multicore-Based Auto-Scal... - Download
    12.
    Rafiee, H., AlSa’deh, A., Meinel, C.: Multicore-Based Auto-Scaling SEcure Neighbor Discovery for Windows Operating Systems. Proceedings of the 26th International Conference on Information Networking (ICOIN 2012). IEEE Press, Bali, Indonesia (2012).
     
  • Stopping Time Condition f... - Download
    13.
    AlSa’deh, A., Rafiee, H., Meinel, C.: Stopping Time Condition for Practical IPv6 Cryptographically Generated Addresses. Proceedings of the 26th International Conference on Information Networking (ICOIN 2012). IEEE CS Press, Bali, Indonesia (2012).
     

2011 [ nach oben ]

  • Elastic Virtual Machine f... - Download
    1.
    Dawoud, W., Takouna, I., Meinel, C.: Elastic Virtual Machine for Fine-grained Cloud Resource Provisioning. Proceedings of the 4th International Conference on Recent Trends of Computing, Communication & Information Technologies (ObCom 2011). Springer, Tamil Nadu, India (2011).
     
  • Dynamic Configuration of ... - Download
    2.
    Takouna, I., Dawoud, W., Meinel, C.: Dynamic Configuration of Virtual Machine for Power-proportional Resource Provisioning. Proceedings of 2nd International Workshop on Green Computing Middleware (GCM 2011) In conjunction with the 12th ACM/IFIP/USENIX International Middleware Conference (Middleware 2011). pp. 4:1–4:6. , Lisboa, Portugal (2011).
     
  • A Distributed Virtual Lab... - Download
    3.
    Willems, C., Klingbeil, T., Radvilavicius, L., Cenys, A., Meinel, C.: A Distributed Virtual Laboratory Architecture for Cybersecurity Training. Proceedings of the 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011). IEEE Press, Abu Dhabi, UAE (2011).
     
  • Accurate Multicore Proces... - Download
    4.
    Takouna, I., Dawoud, W., Meinel, C.: Accurate Multicore Processor Power Models for Power-Aware Resource Management. Proceedings of the 2011 International Conference on Cloud and Green Computing (CGC 2011). pp. 419–426. IEEE Press, Sydney, Australia (2011).
     
  • CS-CGA: Compact and More ... - Download
    5.
    AlSa’deh, A., Cheng, F., Meinel, C.: CS-CGA: Compact and More Secure CGA. Proceedings of the 17th IEEE International Conference on Networks (ICON 2011). IEEE Press, Singapore (2011).
     
  • WinSEND: Windows SEcure N... - Download
    6.
    Rafiee, H., AlSa’deh, A., Meinel, C.: WinSEND: Windows SEcure Neighbor Discovery. Proceedings of the 4th International Conference on Security of Information and Networks (SIN 2011). pp. 243–246. ACM Press, Sydney, Australia (2011).
     
  • Towards Context-aware Ser... - Download
    7.
    Alnemr, R., Schnjakin, M., Meinel, C.: Towards Context-aware Service-oriented Semantic Reputation Framework. Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). IEEE Press (2011).
     
  • Elastic VM for Rapid and ... - Download
    8.
    Dawoud, W., Takouna, I., Meinel, C.: Elastic VM for Rapid and Optimum Virtualized Resources Allocation. Proceedings of the 5th International DMTF Academic Alliance Workshop On Systems and Virtualization Management (SVM 2011). pp. 1–4. IEEE Press, Paris, France (2011).
     
  • Trend-based and Reputatio... - Download
    9.
    Streibel, O., Alnemr, R.: Trend-based and Reputation-Versed Personalized News Network. Proceedings of the 3rd International Workshop on Search and Mining User-generated Contents (SMUC 2011), in conjunction with 20th ACM Conference on Information and Knowledge Management (CIKM 2011). ACM Press, Glasgow, UK (2011).
     
  • Why Rating is not Enough:... - Download
    10.
    Alnemr, R., Meinel, C.: Why Rating is not Enough: A Study on Online Reputation Systems. Proceedings of the 2011, Collaborative Communities for Social Computing Workshop (CCSocialComp 2011), in conjunction with the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2011). IEEE Press, Orlando, Florida, USA (2011).
     
  • Whom to trust? – Genera... - Download
    11.
    Thomas, I., Warschofsky, R., Meinel, C.: Whom to trust? – Generating WS-Security Policies based on Assurance Information. Proceedings of the 9th IEEE European Conference on Web Services (ECOWS 2011). pp. 65–72. IEEE Computer Society, Lugano, Switzerland (2011).
     
  • An Attribute Assurance Fr... - Download
    12.
    Thomas, I., Meinel, C.: An Attribute Assurance Framework to Define and Match Trust in Identity Attributes. Proceedings of the 2011 IEEE International Conference on Web Services (ICWS 2011). pp. 580–587. IEEE Computer Society, Washington DC, USA (2011).
     
  • Elastic VM for Cloud Reso... - Download
    13.
    Dawoud, W., Takouna, I., Meinel, C.: Elastic VM for Cloud Resources Provisioning Optimization. Proceedings of the First International Conference on Advances in Computing and Communications (ACC 2011). pp. 431–445. Springer, Kochi, India (2011).
     
  • Efficient Virtual Machine... - Download
    14.
    Takouna, I., Dawoud, W., Meinel, C.: Efficient Virtual Machine Scheduling-policy for Virtualized heterogeneous Multicore Systems. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA2011). CSREA Press, Las Vegas, Nevada, USA (2011).
     
  • Practical Network Securit... - Download
    15.
    Willems, C., Meinel, C.: Practical Network Security Teaching in an Online Virtual Laboratory. Proceedings of the 2011 International Conference on Security & Management (SAM 2011). CSREA Press, Las Vegas, Nevada, USA (2011).
     
  • Automated Security Servic... - Download
    16.
    Warschofsky, R., Menzel, M., Meinel, C.: Automated Security Service Orchestration for the Identity Management in Web Service based Systems. Proceedings of the 2011 IEEE International Conference on Web Services (ICWS 2011). pp. 596–603. IEEE Computer Science, Washington DC, USA (2011).
     
  • 17.
    Alnemr, R., Meinel, C.: From Reputation Models and Systems to Reputation Ontologies. Proceedings of the 5th IFIP International Conference on Trust Management(IFIPTM 2011). pp. 98–116. Springer, Copenhagen, Denmark (2011).
     
  • A New Correlation Algorit... - Download
    18.
    Roschke, S., Cheng, F., Meinel, C.: A New Correlation Algorithm based on Attack Graph. Proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2011). pp. 58–67. Springer, Torremolinos, Spain (2011).
     
  • BALG: Bypassing Applicati... - Download
    19.
    Roschke, S., Cheng, F., Meinel, C.: BALG: Bypassing Application Layer Gateways Using Multi-Staged Encrypted Shellcodes. Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). pp. 399–406. IEEE Press, Dublin, Ireland (2011).
     
  • An Integrated Network Sca... - Download
    20.
    Cheng, F., Roschke, S., Meinel, C.: An Integrated Network Scanning Tool for Attack Graph Construction. Proceedings of the 6th International Conference on Advances in Grid and Pervasive Computing (GPC 2011). pp. 138–147. Springer, Oulu, Finland (2011).
     
  • Platform for a Secure Sto... - Download
    21.
    Schnjakin, M., Meinel, C.: Platform for a Secure Storage-Infrastructure in the Cloud. Proceedings of the 12th Deutscher IT-Sicherheitskongress (Sicherheit 2011). , Bonn, Germany (2011).
     
  • IPv4/IPv6 Handoff on Lock... - Download
    22.
    AlSa’deh, A., Cheng, F., Roschke, S., Meinel, C.: IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and Security. Proceedings of the 4th IFIP/IEEE International Conference on New Technologies, Mobility and Seurity (NTMS 2011). pp. 1–6. IEEE Press, Paris, France (2011).
     

2010 [ nach oben ]

  • A Security and High-Avail... - Download
    1.
    Schnjakin, M., Alnemr, R., Meinel, C.: A Security and High-Availability Layer for Cloud Storage. Proceedings of the 1st International Workshop (In conjunction with WISE 2010) on Cloud Information System Engineering (CISE 2010). pp. 449–462. Springer, Hong Kong, China (2010).
     
  • Transformation and Aggreg... - Download
    2.
    Warschofsky, R., Menzel, M., Meinel, C.: Transformation and Aggregation of Web Service Security Requirements. Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010). pp. 43–50. IEEE Computer Society, Ayia Napa, Cyprus (2010).
     
  • Contract-based Cloud Arch... - Download
    3.
    Schnjakin, M., Alnemr, R., Meinel, C.: Contract-based Cloud Architecture. Proceedings of the 2nd international workshop (in conjunction with CIKM 2010) on Cloud data management (CloudDB 2011). ACM Press, Toronto, Canada (2010).
     
  • Rule Responder Distribute... - Download
    4.
    Paschke, A., Alnemr, R., Meinel, C.: Rule Responder Distributed Reputation Management System for the Semantic Web. Proceedings of the 4th International Rule Challenges (RuleML 2010). , Washington, DC, USA (2010).
     
  • A Flexible and Efficient ... - Download
    5.
    Roschke, S., Cheng, F., Meinel, C.: A Flexible and Efficient Alert Correlation Platform for Distributed IDS. Proceedings of the 4th International Conference on Network and System Security (NSS 2010). pp. 24–31. IEEE Press, Melbourne, Australia (2010).
     
  • Enabling Reputation Inter... - Download
    6.
    Alnemr, R., Paschke, A., Meinel, C.: Enabling Reputation Interoperability through Semantic Technologies. Proceedings of the 7th International Conference on Semantic Systems (I-Semantics 2010). p. No.13. ACM Press, Graz, Austria (2010).
     
  • Using Vulnerability Infor... - Download
    7.
    Roschke, S., Cheng, F., Meinel, C.: Using Vulnerability Information and Attack Graphs for Intrusion Detection. Proceedings of the 6th International Conference on Information Assurance and Security (IAS 2010). pp. 104–109. IEEE Press, Atlanta, USA (2010).
     
  • SecureSOA - Modelling Sec... - Download
    8.
    Menzel, M., Meinel, C.: SecureSOA - Modelling Security Requirements for Service-oriented Architectures. Proceedings of the 2010 IEEE International Conference on Services Computing (SCC 2010). pp. 146–153. IEEE Computer Society, Miami, Florida, USA (2010).
     
  • The Service Security Lab:... - Download
    9.
    Menzel, M., Warschofsky, R., Thomas, I., Willems, C., Meinel, C.: The Service Security Lab: A Model-Driven Platform to Compose and Explore Service Security in the Cloud. Proceedings of the 6th IEEE World Congress on Services (SERVICES 2010). pp. 115–122. IEEE Computer Society, Miami, Florida, USA (2010).
     
  • A Pattern-driven Generati... - Download
    10.
    Menzel, M., Warschofsky, R., Meinel, C.: A Pattern-driven Generation of Security Policies for Service-oriented Architectures. Proceedings of the 2010 IEEE International Conference on Web Services (ICWS 2010). pp. 243–250. IEEE Computer Society, Miami, Florida, USA (2010).
     
  • A Security Laboratory for... - Download
    11.
    Roschke, S., Willems, C., Meinel, C.: A Security Laboratory for CTF Scenarios and Teaching IDS. Proceedings of the 2nd IEEE International Conference on in: Education Technology and Computer (ICETC 2010). pp. 433–437. IEEE Press, Shanghai, China (2010).
     
  • Secure Communication Usin... - Download
    12.
    Roschke, S., Ibraimi, L., Cheng, F., Meinel, C.: Secure Communication Using Identity Based Encryption. Proceedings of the 11th IFIP Conference on Communications and Multimedia Security (CMS 2010). pp. 256–267. Springer, Linz, Austria (2010).
     
  • 13.
    Thomas, I., Meinel, C.: An Identity Provider to manage Reliable Digital Identities for SOA and the Web. Proceedings of the 9th Symposium on Identity and Trust on the Internet (IDTrust 2010). pp. 26–36. ACM Press, Gaithersburg, MD, USA (2010).
     
  • A Specialized Tool for Si... - Download
    14.
    Cheng, F., Tran, T.-D., Roschke, S., Meinel, C.: A Specialized Tool for Simulating Lock-Keeper Data Transfer. Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010). pp. 182–189. IEEE Press, Perth, Australia (2010).
     
  • 15.
    Dawoud, W., Takounah, I., Meinel, C.: Infrastructure as a Service Security: Challenges and Solutions. Proceedings of the 7th International Conference on Informatics and Systems (INFOS 2010). pp. 1–8. IEEE Press, Cairo, Egypt (2010).
     

2009 [ nach oben ]

  • 1.
    Teymourian, K., Streibel, O., Paschke, A., Alnemr, R., Meinel, C.: Towards Semantic Event-driven Systems. Proceedings of the 3th International Conference on New Technologies, Mobility and Security (NTMS 2009). pp. 1–6. IEEE Press, Cairo, Egypt (2009).
     
  • 2.
    Roschke, S., Cheng, F., Meinel, C.: Intrusion Detection in the Cloud. Proceedings of the 2009 SCC workshop (in conjunction with 8th PICom) on Services Computing (SCC 2009). pp. 729–734. IEEE Press, Chengdu, China (2009).
     
  • 3.
    Cheng, F., Roschke, S., Schuppenies, R., Meinel, C.: Remodeling Vulnerability Information. Proceedings of the 10th International Conference on Information Security and Cryptology (Inscrypt 2009). pp. 324–336. Springer, Beijing, China (2009).
     
  • 4.
    Wolf, M., Thomas, I., Menzel, M., Meinel, C.: A Message Meta Model for Federated Authentication in Service-oriented Architectures. Proceedings of IEEE International Conference on Service-Oriented Computing and Applications (SOCA 2009). pp. 1–8. IEEE Press, Taiwan, China (2009).
     
  • 5.
    Schnjakin, M., Menzel, M., Meinel, C.: A Pattern-driven Security Advisor for Service-oriented Architectures. Proceedings of the 6th SWS workshop (in conjunction with 16th ACM CCS) on Secure web services (SWS 2009). pp. 13–20. ACM Press, Chicago, USA (2009).
     
  • Security in Tele-Lab – ... - Download
    6.
    Willems, C., Dawoud, W., Klingbeil, T., Meinel, C.: Security in Tele-Lab – Protecting an Online Virtual Lab for Security Training. Proceedings of the 2009 ELS workshop (in conjunction with 4th ICITST) on E-Learning Security (ELS 2009). pp. 1–7. IEEE Press, London, UK (2009).
     
  • 7.
    Roschke, S., Cheng, F., Tran, T.-D., Meinel, C.: A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification. Proceedings of the 6th IFIP International Conference on Network and Parallel Computing (NPC 2009). pp. 190–196. IEEE Press, Gold Coast, Australia (2009).
     
  • Distributed Trust Managem... - Download
    8.
    Haq, I.U., Alnemr, R., Paschke, A., Schikuta, E., Boley, H., Meinel, C.: Distributed Trust Management for Validating SLA Choreographies. Proceedings of Workshop SLAs in Grids (in conjunction with Grid’09) on SERVICE LEVEL AGREEMENTS (SLAs 2009). Springer, Banff, Canada (2009).
     
  • 9.
    Thomas, I., Meinel, C.: Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims. Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009). pp. 243–250. IEEE Press, Bangalore, India (2009).
     
  • A Security Meta-Model for... - Download
    10.
    Menzel, M., Meinel, C.: A Security Meta-Model for Service-oriented Architectures. Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009). pp. 251–259. IEEE Computer Society, Bangalore, India (2009).
     
  • 11.
    Alnemr, R., Bross, J., Meinel, C.: Constructing a Context-aware Service-Oriented Reputation Model using Attention Allocation Points. Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009). pp. 451–457. IEEE Press, Bangalore, India (2009).
     
  • 12.
    Roschke, S., Cheng, F., Schuppenies, R., Meinel, C.: Towards Unifying Vulnerability Information for Attack Graph Construction. Proceedings of the 12th International Conference on Information Security (ISC 2009). pp. 218–233. Springer, Pisa, Italy (2009).
     
  • 13.
    Roschke, S., Cheng, F., Meinel, C.: An Extensible and Virtualization-Compatible IDS Management Architecture. Proceedings of the 5th International Conference on Information Assurance and Security (IAS 2009). pp. 130–134. IEEE Press, Xi’an, China (2009).
     
  • 14.
    Wolter, C., Weiß, C., Meinel, C.: An XACML Extension for Business Process-Centric Access Control Policies. Proceedings of IEEE International Symposium on Policies for Distributed Systems and Networks (Policy 2009). pp. 166–169. IEEE Press, London, UK (2009).
     
  • A Web Service Architectur... - Download
    15.
    Hebig, R.N., Meinel, C., Menzel, M., Thomas, I., Warschofsky, R.: A Web Service Architecture for Decentralised Identity- and Attribute-Based Access Control. Proceedings of the 2009 IEEE International Conference on Web Services (ICWS 2009), Application and Industry Track. pp. 551–558. IEEE Computer Society, Los Alamitos, CA, USA (2009).
     
  • Security Requirements Spe... - Download
    16.
    Menzel, M., Thomas, I., Meinel, C.: Security Requirements Specification in Service-oriented Business Process Management. Proceedings of the 4th International Conference on Availability, Reliability and Security (ARES 2009). pp. 41–48. IEEE Computer Science, Fukuoka, Japan (2009).
     
  • Trust Requirements in Ide... - Download
    17.
    Kylau, U., Thomas, I., Menzel, M., Meinel, C.: Trust Requirements in Identity Federation Topologies. Proceedings of the 23rd International Conference on Advanced Information Networking and Applications (AINA 2009). pp. 137–145. IEEE Computer Society, Bradford, UK (2009).
     
  • 18.
    Cheng, F., Roschke, S., Meinel, C.: Implementing IDS Management on Lock-Keeper. Proceedings of the 5th International Conference on Information Security Practice and Experience (ISPEC 2009). pp. 360–371. Springer Press, Xi’an, China (2009).
     
  • 19.
    Wolter, C., Miseldine, P., Meinel, C.: Verification of Business Process Entailment Constraints Using SPIN. Proceedings of the 1st International Symposium on Engineering Secure Software and Systems (ESSoS 2009). pp. 1–15. Springer Press, Leuven, Belgium (2009).
     
  • 20.
    Cheng, F., Meinel, C.: Design of Lock-Keeper Federated Authentication Gateway. Proceedings of the 11th International Conference on Advanced Communication Technology (ICACT 2009). pp. 1041–1046. IEEE Press, Phoenix Park, Korea (2009).
     

2008 [ nach oben ]

  • 1.
    Thomas, I., Menzel, M., Meinel, C.: Using Quantified Trust Level to Describe Authentication Requirements in Federated Identity Management. Proceedings of the 5th ACM Workshop on Secure Web Services (SWS 2008), in conjunction with the 15th ACM Conference on Computer and Communications Security (CCS 2008). pp. 71–80. ACM Press, Alexandria, VA, USA (2008).
     
  • Tele-Lab IT-Security: an ... - Download
    2.
    Willems, C.: Tele-Lab IT-Security: an architecture for an online virtual IT security lab. Proceedings of 2nd International Workshop on E-Learning and Virtual and Remote Laboratories 2008 (VIRTUAL-LAB). Universitätsverlag Potsdam, Potsdam, Germany (2008).
     
  • 3.
    Thomas, I., Michael, M., Meinel, C.: Quantified Trust Levels for Authentication. Proceedings of the 2008 ACM workshop on Secure web services (ISSE 2008). pp. 71–80. ACM Press, Madrid, Spain (2008).
     
  • 4.
    Zhou, W., Meinel, C.: Enforcing Information Flow Constraints in RBAC Environments. Proceedings of the 1st International Symposium on Electronic Commerce and Security (ISECS 2008). pp. 153–158. IEEE Press, Guangzhou, China (2008).
     
  • 5.
    Alnemr, R., Meinel, C.: Getting more from Reputation Systems: A Context–aware Reputation Framework based on Trust Centers and Agent Lists. Proceedings of the 3rd International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008). pp. 137–142. IEEE Press, Athens, Greece (2008).
     
  • 6.
    Wolter, C., Schaad, A., Meinel, C.: Task-Based Entailment Constraints For Basic Workflow Patterns. Proceedings of the 13th ACM symposium on Access control models and technologies (SACMAT 2008). pp. 51–60. ACM Press, Colorado, USA (2008).
     
  • Towards the Aggregation o... - Download
    7.
    Menzel, M., Wolter, C., Meinel, C.: Towards the Aggregation of Security Requirements in Cross-Organisational Service Compositions. Proceedings of the 11th International Conference on Business Information Systems (BIS 2008). pp. 297–308. Springer, Innsbruck, Austria (2008).
     
  • 8.
    Zhang, G., Cheng, F., Meinel, C.: SIMPA: A SIP-based Mobile Payment Architecture. Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2008). pp. 287–292. IEEE Press, Portland, Oregon (2008).
     
  • Awareness Creation mit Te... - Download
    9.
    Willems, C., Meinel, C.: Awareness Creation mit Tele-Lab IT-Security: praktisches IT-Sicherheitstraining am Beispiel Trojanischer Pferde. Proceedings of GI 2008 International Conference on Sicherheit (Sicherheit 2008). pp. 513–532. GI Press, Saarbrücken, Germany (2008).
     
  • Towards Secure Mobile Pay... - Download
    10.
    Zhang, G., Cheng, F., Meinel, C.: Towards Secure Mobile Payment Based on SIP. Proceedings of the 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2008). pp. 96–104. IEEE Press, Belfast, Northern Ireland, UK (2008).
     
  • 11.
    Wolter, C., Menzel, M., Meinel, C.: Modelling Security Goals in Business Processes. Proceedings of GI 2008 International Conference on Modellierung (Modellierung 2008). pp. 197–212. GI Press, Berlin, Germany (2008).
     
  • 12.
    Wolter, C., Schaad, A., Meinel, C.: A Transformation Approach for Security Enhanced Business Processes. Proceedings of the IASTED International Conference on Software Engineering (SE 2008). pp. 14–19. ACTA Press, Innsbruck, Austria (2008).
     
  • 13.
    Cheng, F., Meinel, C.: Strong Authentication over Lock-Keeper. Proceedings of the 34th conference on Current trends in theory and practice of computer science (SOFSEM 2008). pp. 572–584. Springer, High Tatras, Slovakia (2008).
     

2007 [ nach oben ]

  • SOA Security - Secure Cro... - Download
    1.
    Menzel, M., Thomas, I., Wolter, C., Meinel, C.: SOA Security - Secure Cross-Organizational Service Composition. Proceedings of the Stuttgarter Softwaretechnik Forum 2007 (SSF 2007). pp. 41–53. Fraunhofer IRB-Verlag, Stuttgart, Germany (2007).
     
  • 2.
    Wolter, C., Schaad, A., Meinel, C.: Deriving XACML Policies from Business Process Models. Proceedings of International Workshops on Web Information Systems Engineering (WISE 2007). pp. 142–153. Springer, Nancy, France (2007).
     
  • 3.
    Menzel, M., Cheng, F., Meinel, C.: Providing Secure Web Services Using Physical Separation. Proceedings of the 9th International Conference on Information and Communications Security (ICICS 2007). Springer, Zhengzhou, China (2007).
     
  • Access Control for Cross-... - Download
    4.
    Menzel, M., Wolter, C., Meinel, C.: Access Control for Cross-Organisational Web Service Composition. Information Assurance and Security 2 (2007) 155–160. pp. 701–711 (2007).
     
  • 5.
    Cheng, F., Menzel, M., Meinel, C.: A Secure Web Services Providing Framework based on Lock-Keeper. Proceedings of the 10th International Conference on Managing Next Generation Networks and Services (APNOMS 2007). pp. 375–384. Springer, Sapporo, Japan (2007).
     
  • 6.
    Zhou, W., Meinel, C.: Team and Task Based RBAC Access Control Model. Proceedings of the 5th International Conference on Network Operations and Management Symposium (LANOMS 2007). pp. 84–94. IEEE Press, Petrópolis, Brazil (2007).
     
  • A Policy Language for Int... - Download
    7.
    Zhou, W., Meinel, C.: A Policy Language for Integrating Heterogeneous Authorization Policies. Proceedings of the 4th International Conference on Grid Service Engineering and Management (GSEM 2007). pp. 9–23. , Leipzig, Germany (2007).
     
  • 8.
    Zhou, W., Meinel, C.: Function-Based Authorization Constraints Specification and Enforcement. Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS 2007). pp. 119–124. IEEE Press, Manchester, United Kingdom (2007).
     
  • 9.
    Cheng, F., Wolter, C., Meinel, C.: A Simple, Smart and Extensible Framework for Network Security Measurement. Proceedings of the 3rd International Conference on Information Security and Cryptology (Inscrypt 2007). pp. 517–531. Springer, Xining, China (2007).
     

2006 [ nach oben ]

  • 1.
    Cheng, F., Meinel, C.: Lock-Keeper: A New Implementation of Physical Separation Technology. Proceedings of International Conference on Securing Electronic Busines Processes (ISSE 2006). pp. 275–286. Springer, Rome, Italy (2006).
     
  • New Media for Teaching Ap... - Download
    2.
    Hu, J., Cordel, D., Meinel, C.: New Media for Teaching Applied Cryptography and Network Security. Proceedings of the 1st European Conference on Technology Enhanced Learning (EC-TEL 2006). pp. 488–493. Springer, Crete, Greece (2006).
     
  • 3.
    Cheng, F., Meinel, C.: Deployment of Virtual Machines in Lock-Keeper. Proceedings of the 7th International Conference on Information Security Applications (WISA 2006). pp. 339–351. Springer, Jeju Island, South Korea (2006).
     
  • 4.
    Zhou, W., Raja, V.H., Meinel, C., Ahmad, M.: Label-Based Access Control Policy Enforcement and Management. Proceedings of the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2006). pp. 395–400. IEEE Press, Las Vegas, Nevada (2006).
     

2005 [ nach oben ]

  • A Framework for Cross-Ins... - Download
    1.
    Zhou, W., Raja, V.H., Meinel, C., Ahmad, M.: A Framework for Cross-Institutional Authentication and Authorisation. Proceedings of the 6th Annual Conferences on eBusiness, eGovernment, eWork, eEurope 2005 (eChallenges 2005). pp. 1259–1266. IEEE Press, Ljubljana, Slovenia (2005).
     
  • 2.
    Ghasemzadeh, M., Klotz, V., Meinel, C.: Splitting Versus Unfolding. Proceedings of the 7th International Symposium on Representations and Methodology of Future Computing Technology (RM 2005). pp. 30–34 (2005).
     
  • An Authentication and Aut... - Download
    3.
    Zhou, W., Raja, V.H., Meinel, C.: An Authentication and Authorization System for Virtual Organizations. Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2005). pp. 150–155. INT INST INFORMATICS & SYSTEMICS, Florida, USA (2005).
     
  • Virtual Machine Managemen... - Download
    4.
    Hu, J., Cordel, D., Meinel, C.: Virtual Machine Management for Tele-Lab "IT-Security" Server. Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005). pp. 448–453. IEEE Press, Cartagena, Spain (2005).
     
  • 5.
    Zhou, W., Meinel, C., Raja, V.H.: A Framework for Supporting Distributed Access Control Policies. Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005). pp. 442–447. IEEE Press, Cartagena, Spain (2005).
     
  • 6.
    Zhang, X., Jiang, C., Huang, W., Meinel, C.: A XML Format Secure Protocal - OpenSST. Proceedings of the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2005). p. 89. IEEE Press, Cairo, Egypt (2005).
     
  • 7.
    Cordel, D., Hu, J., Meinel, C.: Tele-Lab IT-Security - IT Sicherheitstraining im Internet. Proceedings of International Symposium one-Lecturing und tele-TASK: Grenzenloses elektronisches Lernen für alle (D-A-C-H Security 2005). syssec Verlag, Darmstadt, Germany (2005).
     

2004 [ nach oben ]

  • A Virtual Laboratory for ... - Download
    1.
    Hu, J., Meinel, C.: A Virtual Laboratory for IT Security Education. Proceedings of EMISA International Conference on Informationssysteme im E-Business und E-Government (EMISA 2004). pp. 60–71. GI Press, Luxemburg (2004).
     
  • 2.
    Zhang, X., Cheng, F., Dulaunoy, A., Meinel, C.: An Http-based implementation of OpenSST. Proceedings of International Conference on Computer Communication (ICCC 2004). , Beijing, China (2004).
     
  • Tele-Lab IT-Security: A M... - Download
    3.
    Hu, J., Meinel, C.: Tele-Lab IT-Security: A Means to Build Security Laboratories on the Web. Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004). pp. 285–288. IEEE Press, Fukuoka, Japan (2004).
     
  • Tele-Lab IT Security: An ... - Download
    4.
    Hu, J., Meinel, C., Schmitt, M.: Tele-Lab IT Security: An Architecture for Interactive Lessons for Security Education. Proceedings of the 35th SIGCSE technical symposium on Computer science education (SIGCSE 2004). pp. 412–416. ACM Press, Norfolk, Virginia, USA (2004).
     
  • Implement Role based Acce... - Download
    5.
    Zhou, W., Meinel, C.: Implement Role based Access Control with Attribute Certificates. Proceedings of the 6th International Conference Advanced Communication Technology (ICACT 2004). pp. 536–541. IEEE Press, Phoenix Park, Republic of Korea (2004).
     

2003 [ nach oben ]

  • 1.
    Zhang, X., Dulaunoy, A., Meinel, C.: Enhance opensst Protocol´s Security with Smart Card. Proceedings of the IADIS International Conference WWW/Internet (WWW/Internet 2003). pp. 565–571. IADIS Press, Algarve, Portugal (2003).
     
  • A Security Improved opens... - Download
    2.
    Zhang, X., Meinel, C., Dulaunoy, A.: A Security Improved opensst Prototype combining with Smart Card. Proceedings of International Conference on Computer Networks and Mobile Computing (ICCNMC 2003). pp. 358–361. IEEE Press, Shanghai, China (2003).
     
  • The DualGate Lock-Keeper:... - Download
    3.
    Cheng, F., Ferring, P., Meinel, C., Müllenheim, G., Bern, J.: The DualGate Lock-Keeper: A Highly Efficient Flexible and Applicable Network Security Solution. Proceedings of the 4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003). pp. 152–159. ACIS Press, Lübeck, Germany (2003).
     
  • Sicherheit: Der entscheid... - Download
    4.
    Becker, T., Meinel, C.: Sicherheit: Der entscheidende Erfolgsfaktor für E-Commerce und M-Commerce. Presented at the , Düsseldorf, Germany September (2003).
     
  • A Complete Solution for H... - Download
    5.
    Cheng, F., Meinel, C., Engel, T., Müllenheim, G., Bern, J., Thewes, D.: A Complete Solution for Highly Secure Data Exchange: Lock-Keeper and its Advancements. Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2003). pp. 201–205. IEEE Press, Chengdu, China (2003).
     
  • A Tutoring System for IT-... - Download
    6.
    Hu, J., Meinel, C., Schmitt, M., Willems, C.: A Tutoring System for IT-Security. Proceedings of the 3rd World Conference in Information Security Education (WISE 2003). pp. 51–60. Kluwer Press, Monterey, California, USA (2003).
     

2001 [ nach oben ]

  • Managing Distributed Pers... - Download
    1.
    Haffner, E.-G., Roth, U., Heuer, A., Engel, T., Meinel, C.: Managing Distributed Personal Firewalls with Smart Data Servers. Proceedings of World Conference on the WWW and Internet (WebNet 2001). pp. 466–471. AACE Press, Orlando, Florida, USA (2001).
     
  • How Much Middle-Tier Do Y... - Download
    2.
    Roth, U., Louizi, K., Haffner, E.-G., Meinel, C.: How Much Middle-Tier Do You Need?. Proceedings of World Conference on the WWW and Internet (WebNet 2001). pp. 1053–1056. AACE Press, Orlando, Florida, USA (2001).
     
  • Elektronische Signaturen ... - Download
    3.
    Gollan, L., Meinel, C.: Elektronische Signaturen - eine amerikanische und europäische Perspektive. Proceedings of the 7th Deutsche IT-Sicherheitskongress des BSI (BSI 2001). pp. 97–112. SecuMedia Press, Bonn, Germany (2001).
     
  • Suggestion for an Alterna... - Download
    4.
    Vorwerk, L., Losemann, F., Meinel, C.: Suggestion for an Alternative of watermarking and digital Signatures. Proceedings of SPIE Conference on Photonics West (PhotonicsWest 2001). pp. 158–165. SPIE Press, San Jose, California, USA (2001).
     

2000 [ nach oben ]

  • 1.
    Vorwerk, L., Meinel, C.: Integration of TLS in an Intern/Intranet/based Application. Proceedings of the International Conference on Emerging Technologies and Life Sciences: Medicine and Communication (MEDICOM 2000). pp. 143–149. Books Express, Remagen, Germany (2000).
     
  • Integration der Schleusen... - Download
    2.
    Haffner, E.-G., Engel, T., Meinel, C.: Integration der Schleusentechnologie "Lock-Keeper" in moderne Sicherheitsarchitekturen. Proceedings GI-Workshop "Internet-Datenbanken" (GI Jahrestagung 2000). , Berlin, Germany (2000).
     
  • Functional Integration Te... - Download
    3.
    Lüpken, B., Losemann, F., Engel, T., Meinel, C.: Functional Integration Test of Mass Processes with Electronic Signatures in Public Administrations. Proceedings of the 8th European Conference on Information Systems (ECIS 2000). , Wien, Österreich (2000).
     
  • 4.
    Haffner, E.G., Engel, T., Meinel, C.: Techniques for Securing Networks Against Criminal Attacks. Proceedings of the International Conference on Internet Computing (IC 2000). pp. 365–369. CSREA Press, Las Vegas, Nevada, USA (2000).
     

 

You can find other sub-lists of our conference papers focusing on 

Go back to the complete list of peer-reviewed conference papers.

Other Links

... to our Research
              Security Engineering - Learning & Knowledge Tech - Design Thinking - former
... to our Teaching
              Tele-Lectures - MOOCs - Labs - Systems 
... to our Publications
              Books - Journals - Conference-Papers - Patents
... and to our Annual Reports.