Hasso-Plattner-Institut
 
    • de
 

Conference Papers on "Security and Trust Engineering" at the Chair of Prof. Dr. Christoph Meinel

Here you can find all our peer-reviewed conference papers about security and trust engineering:

[ 2023 ] [ 2022 ] [ 2021 ] [ 2020 ] [ 2019 ] [ 2018 ] [ 2017 ] [ 2016 ] [ 2015 ] [ 2014 ] [ 2013 ] [ 2012 ] [ 2011 ] [ 2010 ] [ 2009 ] [ 2008 ] [ 2007 ] [ 2006 ] [ 2005 ] [ 2004 ] [ 2003 ] [ 2001 ] [ 2000 ]

2023 [ nach oben ]

  • De-anonymising individual... - Download
    1.
    Podlesny, N.J., Kayem, A.V., Meinel, C.: De-anonymising individuals through unique patterns in movement data. Computing Conference 2023 (2023).
     

2022 [ nach oben ]

  • CoK: A Survey of Privacy ... - Download
    1.
    Podlesny, N.J., Kayem, A.V.D.M., Meinel, C.: CoK: A Survey of Privacy Challenges in Relation to Data Meshes. In: Strauss, C., Cuzzocrea, A., Kotsis, G., Tjoa, A.M., and Khalil, I. (eds.) Database and Expert Systems Applications - 33rd International Conference, DEXA 2022, Vienna, Austria, August 22-24, 2022, Proceedings, Part I. pp. 85–102. Springer, Cham, Vienna, Austria (2022).
     
  • A Comprehensive Review of... - Download
    2.
    Majd, M., Najafi, P., Alhosseini, S.A., Cheng, F., Meinel, C.: A Comprehensive Review of Anomaly Detection in Web Logs. Proceedings of the 9th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT’22). IEEE Press, Vancouver, Washington, USA (2022).
     
  • A Multi-agent Model to Su... - Download
    3.
    Motlagh, F.N., Kayem, A.V., Meinel, C.: A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media. In: Barolli, L., Hussain, F., and Enokido, T. (eds.) Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022). pp. 140–151. Spinger, Sydney, Australia (2022).
     

2021 [ nach oben ]

  • A Review of Scaling Genom... - Download
    1.
    Podlesny, N.J., Kayem, A.V.D.M., Meinel, C.: A Review of Scaling Genome Sequencing Data Anonymisation. In: Barolli, L., Woungang, I., and Enokido, T. (eds.) Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 3. pp. 491–501. Springer (2021).
     
  • Analyzing Interoperabilit... - Download
    2.
    Grüner, A., Mühle, A., Meinel, C.: Analyzing Interoperability and Portability Concepts for Self-Sovereign Identity. Proceedings of the 2021 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (accepted). IEEE, Shenyang, China (2021).
     
  • On the Structure and Asse... - Download
    3.
    Grüner, A., Mühle, A., Meinel, C.: On the Structure and Assessment of Trust Models in Attribute Assurance. Proceedings of the 35th International Conference on Advanced Information Networking and Applications. Springer, Toronto, Canada (2021).
     
  • 4.
    Ehrmann, L., Stolle, M., Klieme, E., Tietz, C., Meinel, C.: Detecting Interaction Activities While Walking Using Smartphone Sensors. In: Barolli, L., Woungang, I., and Enokido, T. (eds.) Advanced Information Networking and Applications. pp. 382–393. Springer (2021).
     
  • ATIB: Design and Evaluati... - Download
    5.
    Grüner, A., Mühle, A., Meinel, C.: ATIB: Design and Evaluation of an Architecture for Brokered Self-Sovereign Identity Integration and Trust-Enhancing Attribute Aggregation for Service Provider. IEEE Access. 9, 138553–138570 (2021).
     
  • 6.
    Klieme, E., Trenz, P., Paeschke, D., Tietz, C., Meinel, C.: DoorCollect: Towards a Smart Door Handle for User Identification based on a Data Collection System for unsupervised Long-Term Experiments. 2021 IEEE Symposium on Computers and Communications (ISCC). pp. 1–7 (2021).
     
  • Enabling Co-Owned Image P... - Download
    7.
    Motlagh, F.N., Kayem, A.V., Podlesny, N.J., Meinel, C.: Enabling Co-Owned Image Privacy on Social Media via Agent Negotiation. The 23rd International Conference on Information Integration and Web Intelligence. pp. 152–156. Association for Computing Machinery, Linz, Austria (2021).
     
  • 8.
    Podlesny, N.J., Kayem, A.V.D.M., Meinel, C.: GPU Accelerated Bayesian Inference for Quasi-Identifier Discovery in High-Dimensional Data. In: Barolli, L., Woungang, I., and Enokido, T. (eds.) Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 2. pp. 495–508. Springer (2021).
     
  • Consuming Security: Evalu... - Download
    9.
    Koehler, D., Serth, S., Meinel, C.: Consuming Security: Evaluating Podcasts to Promote Online Learning Integrated with Everyday Life. 2021 World Engineering Education Forum/Global Engineering Deans Council (WEEF/GEDC). pp. 476–481. IEEE, Madrid, Spain (2021).
     
  • 10.
    Koehler, D., Klieme, E., Kreuseler, M., Cheng, F., Meinel, C.: Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords. Proceedings of 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP 2021). IEEE (2021).
     
  • 11.
    Koehler, D., Klieme, E., Kreuseler, D., Cheng, F., Meinel, C.: Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords. Proceedings of 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP 2021). IEEE (2021).
     

2020 [ nach oben ]

  • 1.
    Klieme, E., Wilke, J., van Dornick, N., Meinel, C.: FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). pp. 1857–1867 (2020).
     
  • 2.
    Tietz, C., Klieme, E., Brabender, R., Lasarow, T., Rambold, L., Meinel, C.: Under Pressure: Pushing Down on Me - Touch Sensitive Door Handle to Identify Users at Room Entry. In: Samarati, P., di Vimercati, S.D.C., Obaidat, M.S., and Ben-Othman, J. (eds.) Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020. pp. 565–571. ScitePress (2020).
     
  • A Taxonomy of Trust Model... - Download
    3.
    Grüner, A., Mühle, A., Meinel, C.: A Taxonomy of Trust Models for Attribute Assurance in Identity Management. Proceedings of the Workshops of the International 34th Conference on Advanced Information Networking and Applications. Springer, Caserta, Italy (2020).
     

2019 [ nach oben ]

  • MalRank: A Measure of Mal... - Download
    1.
    Najafi, P., Mühle, A., Pünter, W., Cheng, F., Meinel, C.: MalRank: A Measure of Maliciousness in SIEM-based Knowledge Graphs. Proceedings of the 35th Annual Computer Security Applications Conference. pp. 417–429. ACM (2019).
     
  • 2.
    Bock, B., Matysik, J.-T., Krentz, K.-F., Meinel, C.: Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme. Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT). IEEE, Limerick, Ireland (2019).
     
  • A Comparative Analysis of... - Download
    3.
    Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C.: A Comparative Analysis of Trust Requirements in Decentralized Identity Management. Proceedings of the 33rd. International Conference on Advanced Information Networking and Applications. Springer, Matsue, Japan (2019).
     
  • 4.
    Torkura, K. .A, Sukmana, M.I.H., Cheng, F., Meinel, C.: SlingShot: Automated Threat Detection and Incident Response in Multi-Cloud Storage Systems. The Proceedings of 18th IEEE International Symposium on Network Computing and Applications (NCA 2019). IEEE (2019).
     
  • 5.
    Torkura, K. .A, Sukmana, M.I.H., Cheng, F., Meinel, C.: Security Chaos Engineering for Cloud Services. The Proceedings of 18th IEEE International Symposium on Network Computing and Applications (NCA 2019). IEEE (2019).
     
  • An Integration Architectu... - Download
    6.
    Grüner, A., Mühle, A., Meinel, C.: An Integration Architecture to Enable Service Providers for Self-sovereign Identity. Proceedings of the 18th. International Symposium on Network Computing and Applications. IEEE, Boston, MA (2019).
     
  • 7.
    Seidel, F., Krentz, K.-F., Meinel, C.: Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers. Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT). IEEE, Limerick, Ireland (2019).
     
  • 8.
    Podlesny, N.J., Kayem, A.V., Meinel, C., Jungmann, S.: How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect. Proceedings of the 9th International Conference on Digital Public Health. pp. 55–62. ACM (2019).
     
  • 9.
    Podlesny, N.J., Kayem, A.V., Meinel, C.: Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization. Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy. pp. 109–119. ACM (2019).
     
  • 10.
    Podlesny, N.J.: High-dimensional data anonymization for in-memory applications, (2019).
     
  • 11.
    Podlesny, N.J., Kayem, A.V., Meinel, C.: Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold. 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). pp. 556–563. IEEE (2019).
     
  • 12.
    Podlesny, N.J., Kayem, A.V., Meinel, C.: Towards Identifying De-anonymisation Risks in Distributed Health Data Silos. International Conference on Database and Expert Systems Applications. pp. 33–43. Springer (2019).
     
  • Using Probabilistic Attri... - Download
    13.
    Grüner, A., Mühle, A., Meinel, C.: Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance. Proceedings of the 2019 IEEE Symposium Series on Computational Intelligence in Cyber Security. IEEE, Xiamen, China (2019).
     
  • 14.
    Tietz, C., Klieme, E., Behrendt, L., Böning, P., Marschke, L., Meinel, C.: Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC. 2019 3rd Cyber Security in Networking Conference (CSNet). pp. 130–137 (2019).
     

2018 [ nach oben ]

  • 1.
    Torkura, K. .A, Sukmana, M.I.H., Kayem, A.V., Cheng, F., Meinel, C.: A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures. 32nd IEEE International Symposium on Parallel and Distributed Processing with Applications. IEEE (2018).
     
  • 2.
    Torkura, K.A., Sukmana, M.I., Meinig, M., Graupner, H., Cheng, F., Meinel, C.: A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems. 16th IEEE/IFIP Network Operations and Management Symposium (NOMS 2018). IEEE/IFIP (2018).
     
  • 3.
    Krentz, K.-F., Meinel, C., Graupner, H.: Denial-of-Sleep-Resilient Session Key Establishment for IEEE 802.15.4 Security: From Adaptive to Responsive. Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN 2018). Junction, Madrid, Spain (2018).
     
  • 4.
    Torkura, K. .A, Sukmana, M.I.H., Meinig, M., Kayem, A., Cheng, F., Graupner, H., Meinel, C.: Securing Cloud Storage Brokerage Systems through Threat Models. The 32nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2018). IEEE (2018).
     
  • 5.
    Torkura, K. .A, Sukmana, M.I.H., Cheng, F., Meinel, C.: CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era. 14th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2018). Springer (2018).
     
  • 6.
    Torkura, K. .A, Sukmana, M.I.H., Tim, S., Cheng, F., Graupner, H., Meinel, C.: CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems. The Proceedings of 17th IEEE International Symposium on Network Computing and Applications (NCA 2018). IEEE (2018).
     
  • 7.
    Torkura, K. .A, Sukmana, M.I.H., Tim, S., Cheng, F., Graupner, H., Meinel, C.: Defeating Malicious Intrusions in Multi-Cloud Storage Systems. Proceedings of the 6th HPI Cloud Symposium “Operating the Cloud” 2018. Hasso Plattner Institute, Potsdam, Germany (2018).
     
  • A Quantifiable Trust Mode... - Download
    8.
    Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C.: A Quantifiable Trust Model for Blockchain-Based Identity Management. Proceedings of the 2018 International Conference on Blockchain. IEEE, Halifax, Canada (2018).
     
  • Towards a Blockchain-base... - Download
    9.
    Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C.: Towards a Blockchain-based Identity Provider. Proceedings of the 12th. International Conference on Emerging Security Information, Systems and Technologies. IARIA, Venice, Italy (2018).
     
  • 10.
    Podlesny, N.J., Kayem, A.V., von Schorlemer, S., Uflacker, M.: Minimising Information Loss on Anonymised High Dimensional Data with Greedy In-Memory Processing. International Conference on Database and Expert Systems Applications. pp. 85–100. Springer (2018).
     
  • 11.
    Klieme, E., Tietz, C., Meinel, C.: Beware of SMOMBIES: Verification of Users Based on Activities While Walking. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). pp. 651–660 (2018).
     

2017 [ nach oben ]

  • 1.
    Krentz, K.-F., Meinel, C., Graupner, H.: Secure Self-Seeding with Power-Up SRAM States. Proceedings of the 22nd IEEE Symposium on Computers and Communications (ISCC 2017). IEEE, Heraklion, Greece (2017).
     
  • 2.
    Seitz, K., Serth, S., Krentz, K.-F., Meinel, C.: Demo: Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages. 15th ACM Conference on Embedded Networked Sensor Systems (SenSys 2017). ACM, Delft, The Netherlands (2017).
     
  • Countering Three Denial-o... - Download
    3.
    Krentz, K.-F., Meinel, C., Graupner, H.: Countering Three Denial-of-Sleep Attacks on ContikiMAC. Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN 2017). Junction, Uppsala, Sweden (2017).
     
  • 4.
    Krentz, K.-F., Meinel, C., Graupner, H.: More Lightweight, yet Stronger 802.15.4 Security through an Intra-Layer Optimization. Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS 2017). Springer, Nancy, France (2017).
     
  • 5.
    Torkura, K.A., Sukmana, M.I., Meinel, C.: Integrating Continuous Security Assessments in Microservices and Cloud Native Applications. Proceedings of the10th International Conference on Utility and Cloud Computing. pp. 171–180. ACM (2017).
     
  • 6.
    Gawron, M., Cheng, F., Meinel, C.: Automatic Vulnerability Classification using Machine Learning. Proceedings of the 12th International Conference on Risks and Security of Internet and Systems (CRiSIS 2017). Springer (2017).
     
  • Guilt-by-Association: Det... - Download
    7.
    Najafi, P., Sapegin, A., Cheng, F., Meinel, C.: Guilt-by-Association: Detecting Malicious Entities via Graph Mining. International Conference on Security and Privacy in Communication Systems. pp. 88–107. Springer (2017).
     
  • 8.
    Torkura, K.A., Sukmana, M.I., Cheng, F., Meinel, C.: Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications. Proceedings of the 2nd IEEE International Conference on Smart Cloud (SmartCloud). IEEE (2017).
     
  • Clustering Heuristics for... - Download
    9.
    Kayem, A., Meinel, C.: Clustering Heuristics for Efficient t-closeness Anonymisation. In: Benslimane, D., Damiani, E., Grosky, W.I., Hameurlain, A., Sheth, A.P., and Wagner, R.R. (eds.) Proceedings of the 28th International Conference on Database and Expert Systems Applications. pp. 27–34. Springer (2017).
     
  • Demo: Enabling En-Route F... - Download
    10.
    Seitz, K., Serth, S., Krentz, K.-F., Meinel, C.: Demo: Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages. Proceedings of the 15th ACM Conference on Embedded Networked Sensor Systems (SenSys 2017). ACM Press, New York, NY, USA (2017).
     

2016 [ nach oben ]

  • 1.
    Torkura, K., Meinel, C.: Towards Vulnerability Assessment as a Service in OpenStack Clouds. Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN). IEEE, Dubai, UAE (2016).
     
  • POTR: Practical On-the-fl... - Download
    2.
    Krentz, K.-F., Meinel, C., Schnjakin, M.: POTR: Practical On-the-fly Rejection of Injected and Replayed 802.15.4 Frames. Proceedings of the International Conference on Availability, Reliability and Security (ARES 2016). IEEE, Salzburg, Austria (2016).
     
  • 3.
    Jaeger, D., Pelchen, C., Graupner, H., Cheng, F., Meinel, C.: Analysis of Publicly Leaked Credentials and the Long Story of Password (Re-)use. Proceedings of the 11th International Conference on Passwords (PASSWORDS2016). Springer, Bochum, Germany (2016).
     
  • 4.
    Amirkhanyan, A., Meinel, C.: Analysis of the Value of Public Geotagged Data from Twitter from the Perspective of Providing Situational Awareness. Proceedings of the 15th IFIP Conference on e-Business, e-Services and e-Society (I3E2016) - Social Media: The Good, the Bad, and the Ugly. Springer, Swansea, Wales, UK (2016).
     
  • 5.
    Amirkhanyan, A., Meinel, C.: Visualization and Analysis of Public Social Geodata to Provide Situational Awareness. Proceedings of the 8th International Conference on Advanced Computational Intelligence (ICACI2016). IEEE, Chiang Mai, Thailand (2016).
     

2015 [ nach oben ]

  • 1.
    Torkura, K.A., Meinel, C.: Towards Cloud-Aware Vulnerability Assessments. Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS2015). IEEE (2015).
     
  • 2.
    Torkura, K.A., Cheng, F., Meinel, C.: Aggregating Vulnerability Information for Proactive Cloud Vulnerability Assessment. Journal of Internet Technology and Secured Transactions. 4, (2015).
     
  • Handling Reboots and Mobi... - Download
    3.
    Krentz, K.-F., Meinel, C.: Handling Reboots and Mobility in 802.15.4 Security. Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC 2015). ACM, Los Angeles, CA, USA (2015).
     
  • 4.
    Gawron, M., Cheng, F., Meinel, C.: Automatic Vulnerability Detection for Weakness Visualization and Advisory Creation. Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15). pp. 229–236. ACM Press (2015).
     
  • 5.
    Ussath, M., Cheng, F., Meinel, C.: Concept for a Security Investigation Framework. Proceedings of the 7th IFIP International Conference on New Technologies, Mobility, and Security (NTMS’15) (2015).
     
  • 6.
    Sapegin, A., Amirkhanyan, A., Gawron, M., Cheng, F., Meinel, C.: Poisson-based Anomaly Detection for Identifying Malicious User Behaviour. Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN’15). Springer (2015).
     
  • 7.
    Gawron, M., Cheng, F., Meinel, C.: Automatic Detection of Vulnerabilities for Advanced Security Analytics. Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium (APNOMS’15). pp. 471–474. IEEE (2015).
     
  • 8.
    Sapegin, A., Gawron, M., Jaeger, D., Cheng, F., Meinel, C.: High-speed Security Analytics Powered by In-memory Machine Learning Engine. Proceedings of the 14th International Symposium on Parallel and Distributed Computing (ISPDC 2015). pp. 74–81. IEEE (2015).
     
  • 9.
    Amirkhanyan, A., Sapegin, A., Cheng, F., Meinel, C.: Simulation User Behavior on A Security Testbed Using User Behavior States Graph. Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15). pp. 217–223. ACM Press (2015).
     
  • 10.
    Azodi, A., Gawron, M., Sapegin, A., Cheng, F., Meinel., C.: Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes. Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN’15). Springer (2015).
     
  • 11.
    Jaeger, D., Azodi, A., Cheng, F., Meinel, C.: Normalizing Security Events with a Hierarchical Knowledge Base. Proceedings of the 9th WISTP International Conference on Information Security Theory and Practice (WISTP’15) (2015).
     
  • 12.
    Torkura, K.A., Cheng, F., Meinel, C.: Application of Quantitative Security Metrics In Cloud Computing. Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST2015). IEEE (2015).
     
  • 13.
    Jaeger, D., Azodi, A., Cheng, F., Meinel, C.: Normalizing Security Events with a Hierarchical Knowledge Base. Proceedings of the 9th International Conference on Information Security Theory and Practice (WISTP’15). pp. 237–248. Springer Internation Publishing (2015).
     
  • 14.
    Cheng, F., Sapegin, A., Gawron, M., Meinel, C.: Analyzing Boundary Device Logs on the In-Memory Platform. Proceedings of the IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity‘15). IEEE (2015).
     
  • 15.
    Torkura, K.A., Cheng, F., Meinel, C.: A Proposed Framework For Proactive Vulnerability Assessments in Cloud Deployments. Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST2015). IEEE (2015).
     
  • 16.
    Amirkhanyan, A., Cheng, F., Meinel, C.: Real-Time Clustering of Massive Geodata for Online Maps to Improve Visual Analysis. Proceedings of the 11th International Conference on Innovations in Information Technology (IIT2015). IEEE, Dubai, UAE (2015).
     
  • 17.
    Sianipar, J.H., Meinel, C.: A verification mechanism for cloud brokerage system. Proceedings of the Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2015). pp. 143–148. IEEE Press, Lodz, Poland (2015).
     
  • 18.
    Sianipar, J.H., Meinel, C.: A verification mechanism for cloud brokerage system. Proceedings of the Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2015). pp. 143–148. IEEE Press, Lodz, Poland (2015).
     
  • 19.
    Elsaid, M.E., Meinel, C.: Friendship based Storage Allocation for Online Social Networks Cloud Computing. Proceedings of the International Conference of Cloud Computing Technologies and Applications (CloudTech 2015). IEEE Press, Marrakesh, Morrocco (2015).
     
  • 20.
    Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: Passive Network Monitoring using REAMS. Proceedings of the 6th International Conference on Information Science and Applications (ICISA 2015). pp. 205–215. Sprinter, Pattaya, Thailand (2015).
     

2014 [ nach oben ]

  • 1.
    Klieme, E., Engelbrecht, K.-P., Möller, S.: Poster: Towards Continuous Authentication Based on Mobile Messaging App Usage. Symposium on Usable Privacy and Security. (2014).
     
  • 2.
    Fleischhacker, N., Manulis, M., Azodi, A.: A Framework for Multi-Factor Authentication and Key Exchange. In Proceedings of the the 1st International Conference on Research in Security Standardisation (SSR 2014). Springer, London, UK (2014).
     
  • 3.
    Jaeger, D., Graupner, H., Sapegin, A., Cheng, F., Meinel, C.: Gathering and Analyzing Identity Leaks for Security Awareness. Proceedings of the 7th International Conference on Passwords (PASSWORDS 2014). Springer, Trondheim, Norway (2014).
     
  • 4.
    Sianipar, J., Saleh, E., Meinel, C.: Construction of Agent-Based Trust in Cloud Infrastructure. Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2014, London, United Kingdom, December 8-11, 2014. pp. 941–946. IEEE Computer Society, London, United Kingdom (2014).
     
  • 5.
    Saleh, E., Sianipar, J., Takouna, I., Meinel, C.: SecPlace: Security-Aware Placement Model for Multi-tenant SaaS Environments. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, December 9-12, 2014. pp. 596–602. IEEE Computer Society, Bali, Indonesia (2014).
     
  • 6.
    Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: Runtime Updatable and Dynamic Event Processing using Embedded ECMAScript Engines. In Proceedings of the 4rd IEEE International Conference on IT Convergence and Security (ICITCS 2014). IEEE Press, Beijing, China (2014).
     
  • 7.
    Elsaid, M.E., Meinel, C.: Live Migration Impact on Virtual Datacenter Performance. Proceedings of the 2nd International Conference on Future Internet of Things and Cloud (FiCloud 2014). pp. 216–221. IEEE Press, Barcelona, Spain (2014).
     

2013 [ nach oben ]

  • 1.
    Sapegin, A., Cheng, F., Meinel, C.: Catch the Spike: on the Locality of Individual BGP Update Bursts. Proceedings of the 9th IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2013). pp. 78–83. IEEE CS, Dalian, China (2013).
     
  • 2.
    Cheng, F., Azodi, A., Jaeger, D., Meinel, C.: Multi-Core Supported High Performance Security Analytics. Proceedings of the 13th IEEE International Conference on Scalable Computing and Communication (ScalCom 2013). IEEE CS, Chengdu, China (2013).
     
  • 3.
    Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems. Proceedings of the 1st International Conference on Advanced Cloud and Big Data. IEEE CS, Nanjing, China (2013).
     
  • Applying Erasure Codes fo... - Download
    4.
    Schnjakin, M., Metzke, T., Meinel, C.: Applying Erasure Codes for Fault Tolerance in Cloud-RAID. Proceedings of 16th IEEE International Conference on Computational Science and Engineering (CSE2013). IEEE, Sydney, Australia (2013).
     
  • 5.
    Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: A New Approach to Building a Multi-Tier Direct Access Knowledgebase For IDS/SIEM Systems. Proceedings of the 11th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2013). IEEE CS, Chengdu, China (2013).
     
  • 6.
    Cheng, F., Azodi, A., Jaeger, D., Meinel, C.: Security Event Correlation Supported by Multi-Core Architecture. Proceedings of the 3rd IEEE International Conference on IT Convergence and Security (ICITCS 2013). pp. 1–5. IEEE CS, Macau, China (2013).
     
  • 7.
    Sapegin, A., Jaeger, D., Azodi, A., Gawron, M., Cheng, F., Meinel, C.: Hierarchical Object Log Format for Normalisation of Security Events. Proceedings of the 9th International Conference on Information Assurance and Security (IAS 2013). IEEE CS, Tunis, Tunisia (2013).
     
  • Privacy and Security in I... - Download
    8.
    Rafiee, H., Meinel, C.: Privacy and Security in IPv6 Networks: Challenges and Possible Solutions. ACM. ACM press, Aksaray, Turkey (2013).
     
  • A Flexible Framework For ... - Download
    9.
    Rafiee, H., Mueller, C., Niemeier, L., Streek, J., Sterz, C., Meinel, C.: A Flexible Framework For Detecting IPv6 Vulnerabilities. Proceedings of The 6th International Conference on Security of Information and Networks (SIN 2013). ACM Press, Aksaray, Turkey (2013).
     
  • 6LoWPAN Security: Adding ... - Download
    10.
    Krentz, K.-F., Rafiee, H., Meinel, C.: 6LoWPAN Security: Adding Compromise Resilience to the 802.15.4 Security Sublayer. Proceedings of the 1st ACM International Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI 2013). ACM, Zurich, Switzerland (2013).
     
  • A Secure, Flexible Framew... - Download
    11.
    Rafiee, H., Meinel, C.: A Secure, Flexible Framework for DNS Authentication in IPv6 Autoconfiguration. Proceedings of the 12th IEEE International Symposium on Network Computing and Applications (NCA2013). pp. 165–172. IEEE Press, MA, USA (2013).
     
  • 12.
    Saleh, E., Takouna, I., Meinel, C.: SignedQuery: Protecting Users Data in Multi-tenant SaaS Environments. Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI2013). pp. 213–218. IEEE Press, Mysore, India (2013).
     
  • Evaluation of Cloud-RAID:... - Download
    13.
    Schnjakin, M., Meinel, C.: Evaluation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. Proceedings of the 22nd International Conference on Computer Communications and Networks (ICCCN2013). pp. 1–9. IEEE, Nassau, Bahamas (2013).
     
  • The State of Public Cloud... - Download
    14.
    Schnjakin, M., Meinel, C.: The State of Public Cloud Storage and Cloud-RAID: a Secure and Reliable Storage above the Clouds. Proceedings of the 13. Deutscher IT-Sicherheitskongress (Sicherheit2013) (2013).
     
  • Implementation of Cloud-R... - Download
    15.
    Schnjakin, M., Meinel, C.: Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. Proceedings of the 8th International Conference on Grid and Pervasive Computing (GPC2013). pp. 91–102. Springer, Seoul, Korea (2013).
     
  • HPISecure: Towards Data C... - Download
    16.
    Saleh, E., Meinel, C.: HPISecure: Towards Data Confidentiality in Cloud Applications. Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (CCGrid2013). pp. 605–609. IEEE CS, Delft, Netherlands (2013).
     
  • Implementation of a Secur... - Download
    17.
    Schnjakin, M., Korsch, D., Schoenberg, M., Meinel, C.: Implementation of a Secure and Reliable Storage Above the Untrusted Clouds. Proceedings of 8th International Conference on Computer Science and Education (ICCSE 2013). pp. 347–353. IEEE, Colombo (2013).
     
  • A Robust Optimization for... - Download
    18.
    Takouna, I., Dawoud, W., Sachs, K., Meinel, C.: A Robust Optimization for Proactive Energy Management in Virtualized Data Centers. Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering(ICPE2013). pp. 323–326. ACM Press, Prague, Czech Republic (2013).
     
  • DNS Update Extension to I... - Download
    19.
    Rafiee, H., von Löwis, M., Meinel, C.: DNS Update Extension to IPv6 Secure Addressing. Proceedings of the Ninth International Symposium on Frontiers of Information Systems and Network Applications (FINA2013). pp. 896–902. IEEE CS, Barcelona, Spain (2013).
     

2012 [ nach oben ]

  • Online Assessment for Han... - Download
    1.
    Willems, C., Meinel, C.: Online Assessment for Hands-On Cybersecurity Training in a Virtual Lab. Proceedings of the 3rd IEEE Global Engineering Education Conference (EDUCON 2012). IEEE Press, Marrakesh, Morocco (2012).
     
  • Dynamic Scalability and C... - Download
    2.
    Dawoud, W., Takouna, I., Meinel, C.: Dynamic Scalability and Contention Prediction in Public Infrastructure using Internet Application Profiling. Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012). , Taiwan, China (2012).
     
  • 3.
    Takouna, I., Dawoud, W., Meinel, C.: Analysis and Simulation of HPC Applications in Virtualized Data Centers. Proceedings of the IEEE International Conference on Green Computing and Communications (GreenCom 2012). IEEE Press, Besançon, France (2012).
     
  • IPv6 Stateless Address Au... - Download
    4.
    AlSa’deh, A., Rafiee, H., Meinel, C.: IPv6 Stateless Address Autoconfiguration: Balancing Between Security, Privacy and Usability. Proceedings of the 5th International Symposium on Foundations & Practice of Security (FPS 2012). Springer, Montreal, QC, Canada (2012).
     
  • Cryptographically Generat... - Download
    5.
    AlSa’deh, A., Rafiee, H., Meinel, C.: Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches. Proceedings of the 12th IEEE International Conference on Computer and Information Technology (IEEE CIT’12). IEEE CS Press, Chengdu, Sichuan, China (2012).
     
  • 6.
    Arulogun, T., AlSa’deh, A., Meinel, C.: IPv6 Private Networks: Security Consideration and recommendation. Proceedings of the Fourth International Conference on Mobile e-Services (ICOMeS). , LAUTECH, Ogbomoso (2012).
     
  • Reputation Objects for In... - Download
    7.
    Alnemr, R., Meinel, C.: Reputation Objects for Interoperable Reputation Exchange: Implementation and Design Decisions. The 7th IEEE International Workshop on Trusted Collaboration (TrustCol 2012). IEEE (2012).
     
  • 8.
    Arulogun, T., Meinel, C., Emuoyibofarhe, J.: IPv6 Based Wireless Sensor Networks Electronic Health Monitoring System. Proceedings of the Fourth International Conference on Mobile e-Services (ICOMeS). , LAUTECH , Ogbomoso (2012).
     
  • Reliable Approach to Sell... - Download
    9.
    Dawoud, W., Takouna, I., Meinel, C.: Reliable Approach to Sell the Spare Capacity in the Cloud. Proceedings of the 3rd International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2012). pp. 229–236. , Nice, France (2012).
     
  • Increasing Spot Instances... - Download
    10.
    Dawoud, W., Takouna, I., Meinel, C.: Increasing Spot Instances Reliability using Dynamic Scalability. IEEE Fifth International Conference on Cloud Computing (CLOUD 2012). pp. 959–961. IEEE CS Press, Honolulu, Hawaii, USA (2012).
     
  • 11.
    Neuhaus, C., Alnemr, R., Kessler, L., Schlegel, F., Polze, A.: InstantLab 2.0- A Platform for Operating System Experiments on Public Cloud Infrastructure. Presented at the May (2012).
     
  • Stopping Time Condition f... - Download
    12.
    AlSa’deh, A., Rafiee, H., Meinel, C.: Stopping Time Condition for Practical IPv6 Cryptographically Generated Addresses. Proceedings of the 26th International Conference on Information Networking (ICOIN 2012). IEEE CS Press, Bali, Indonesia (2012).
     
  • Multicore-Based Auto-Scal... - Download
    13.
    Rafiee, H., AlSa’deh, A., Meinel, C.: Multicore-Based Auto-Scaling SEcure Neighbor Discovery for Windows Operating Systems. Proceedings of the 26th International Conference on Information Networking (ICOIN 2012). IEEE Press, Bali, Indonesia (2012).
     

2011 [ nach oben ]

  • A Distributed Virtual Lab... - Download
    1.
    Willems, C., Klingbeil, T., Radvilavicius, L., Cenys, A., Meinel, C.: A Distributed Virtual Laboratory Architecture for Cybersecurity Training. Proceedings of the 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011). IEEE Press, Abu Dhabi, UAE (2011).
     
  • Elastic Virtual Machine f... - Download
    2.
    Dawoud, W., Takouna, I., Meinel, C.: Elastic Virtual Machine for Fine-grained Cloud Resource Provisioning. Proceedings of the 4th International Conference on Recent Trends of Computing, Communication & Information Technologies (ObCom 2011). Springer, Tamil Nadu, India (2011).
     
  • Dynamic Configuration of ... - Download
    3.
    Takouna, I., Dawoud, W., Meinel, C.: Dynamic Configuration of Virtual Machine for Power-proportional Resource Provisioning. Proceedings of 2nd International Workshop on Green Computing Middleware (GCM 2011) In conjunction with the 12th ACM/IFIP/USENIX International Middleware Conference (Middleware 2011). pp. 4:1–4:6. , Lisboa, Portugal (2011).
     
  • CS-CGA: Compact and More ... - Download
    4.
    AlSa’deh, A., Cheng, F., Meinel, C.: CS-CGA: Compact and More Secure CGA. Proceedings of the 17th IEEE International Conference on Networks (ICON 2011). IEEE Press, Singapore (2011).