|
|
@inproceedings {INPROC-2018-15, author = {Christoph Stach and Sascha Alpers and Stefanie Betz and Frank D{\"u}rr and Andreas Fritsch and Kai Mindermann and Saravana Murthy Palanisamy and Gunther Schiefer and Manuela Wagner and Bernhard Mitschang and Andreas Oberweis and Stefan Wagner}, title = {{The AVARE PATRON: A Holistic Privacy Approach for the Internet of Things}}, booktitle = {Proceedings of the 15th International Conference on Security and Cryptography (SECRYPT '18)}, publisher = {INSTICC Press}, institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany}, pages = {1--8}, type = {Konferenz-Beitrag}, month = {Juli}, year = {2018}, keywords = {Privacy; IoT Apps; Smart Things; Stream Processing; Privacy Preferences Elicitation \& Veri\&\#64257; cation}, language = {Englisch}, cr-category = {K.4.1 Computers and Society Public Policy Issues,
D.4.6 Operating Systems Security and Protection}, contact = {Senden Sie eine E-Mail an Christoph.Stach@ipvs.uni-stuttgart.de}, department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Anwendersoftware;
Universit{\"a}t Stuttgart, Institut f{\"u}r Softwaretechnologie, Software Engineering;
Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Verteilte Systeme}, abstract = {Applications for the Internet of Things are becoming increasingly popular. Due
to the large amount of available context data, such applications can be used
effectively in many domains. By interlinking these data and analyzing them, it
is possible to gather a lot of knowledge about a user. Therefore, these
applications pose a threat to privacy. In this paper, we illustrate this threat
by looking at a real-world application scenario. Current state of the art
focuses on privacy mechanisms either for Smart Things or for big data
processing systems. However, our studies show that for a comprehensive privacy
protection a holistic view on these applications is required. Therefore, we
describe how to combine two promising privacy approaches from both categories,
namely AVARE and PATRON. Evaluation results confirm the thereby achieved
synergy effects.}, url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2018-15&engl=0} }
@inproceedings {INPROC-2018-04, author = {Christoph Stach and Frank D{\"u}rr and Kai Mindermann and Saravana Murthy Palanisamy and Stefan Wagner}, title = {{How a Pattern-based Privacy System Contributes to Improve Context Recognition}}, booktitle = {Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (CoMoRea)}, publisher = {IEEE Computer Society}, institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany}, pages = {1--6}, type = {Workshop-Beitrag}, month = {M{\"a}rz}, year = {2018}, keywords = {privacy; access control; pattern concealing; stream processing; complex event processing; databases}, language = {Englisch}, cr-category = {K.4.1 Computers and Society Public Policy Issues,
D.4.6 Operating Systems Security and Protection}, contact = {Senden Sie eine E-Mail an Christoph.Stach@ipvs.uni-stuttgart.de}, department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Anwendersoftware;
Universit{\"a}t Stuttgart, Institut f{\"u}r Softwaretechnologie, Software Engineering;
Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Verteilte Systeme}, abstract = {As Smart Devices have access to a lot of user-preferential data, they come in
handy in any situation. Although such data - as well as the knowledge which can
be derived from it - is highly beneficial as apps are able to adapt their
services appropriate to the respective context, it also poses a privacy threat.
Thus, a lot of research work is done regarding privacy. Yet, all approaches
obfuscate certain attributes which has a negative impact on context recognition
and thus service quality. Therefore, we introduce a novel access control
mechanism called PATRON. The basic idea is to control access to information
patterns. For instance, a person suffering from diabetes might not want to
reveal his or her unhealthy eating habit, which can be derived from the pattern
``rising blood sugar level'' -$>$ ``adding bread units''. Such a pattern which must
not be discoverable by some parties (e.g., insurance companies) is called
private pattern whereas a pattern which improves an app's service quality is
labeled as public pattern. PATRON employs different techniques to conceal
private patterns and, in case of available alternatives, selects the one with
the least negative impact on service quality, such that the recognition of
public patterns is supported as good as possible.}, url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2018-04&engl=0} }
@inproceedings {INPROC-2017-32, author = {Christoph Stach and Frank D{\"u}rr and Kai Mindermann and Saravana Murthy Palanisamy and Muhammad Adnan Tariq and Bernhard Mitschang and Stefan Wagner}, title = {{PATRON - Datenschutz in Datenstromverarbeitungssystemen}}, booktitle = {Informatik 2017: Digitale Kulturen, Tagungsband der 47. Jahrestagung der Gesellschaft f{\"u}r Informatik e.V. (GI), 25.09. - 29.09.2017, Technische Universit{\"a}t Chemnitz}, publisher = {Gesellschaft f{\"u}r Informatik e.V. (GI)}, institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany}, series = {LNI}, pages = {1--12}, type = {Workshop-Beitrag}, month = {September}, year = {2017}, keywords = {Datenschutz; Zugriffskontrolle; Datenstr{\"o}me; Internet der Dinge; Privatheit; Sensoren}, language = {Deutsch}, cr-category = {K.4.1 Computers and Society Public Policy Issues,
D.4.6 Operating Systems Security and Protection}, contact = {Senden Sie eine E-Mail an Christoph.Stach@ipvs.uni-stuttgart.de}, department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Anwendersoftware;
Universit{\"a}t Stuttgart, Institut f{\"u}r Softwaretechnologie, Software Engineering;
Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Verteilte Systeme}, abstract = {Angetrieben durch die stetig voranschreitende Digitalisierung gewinnt das
Internet der Dinge (engl. IoT) immer mehr an Bedeutung. Im IoT werden
technische Ger{\"a}te mit unterschiedlichen Sensoren ausgestattet und miteinander
vernetzt. Dadurch werden neuartige Anwendungen beispielsweise im Bereich
E-Health erm{\"o}glicht, in denen Sensordaten miteinander kombiniert und so in
h{\"o}herwertige Informationen umgewandelt werden. Die von diesen Anwendungen
abgeleiteten Informationen verraten viel {\"u}ber den Nutzer und m{\"u}ssen daher
besonders gesch{\"u}tzt werden. H{\"a}ufig hat der Nutzer allerdings keine Kontrolle
{\"u}ber die Verarbeitung seiner Daten, ganz davon zu schweigen, dass er das Ausma{\ss}
und die Art der daraus ableitbaren Informationen nicht ermessen kann.
In diesem Artikel stellen wir daher einen neuartigen Kontrollmechanismus vor,
der private Informationen im IoT sch{\"u}tzt. Anstelle von abstrakten
Datenschutzregeln f{\"u}r einzelne Sensoren definiert der Nutzer Muster, die es zu
sch{\"u}tzen gilt. Ein Muster kann beispielsweise eine Kombination aus Messwerten
sein, die auf eine bestimmte Krankheit schlie{\ss}en lassen. Der Nutzer definiert
die zu verheimlichenden Informationen nat{\"u}rlichsprachlich, und ein
Dom{\"a}nenexperte setzt diese in formale Regeln um. Sind diese Regeln zu
restriktiv, so kann die Anwendung ihre angedachte Funktionalit{\"a}t nicht
erbringen. Daher muss bez{\"u}glich der Servicequalit{\"a}t ein Kompromiss zwischen
gew{\"u}nschter Privatheit und ben{\"o}tigter Funktionalit{\"a}t gefunden werden.}, url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2017-32&engl=0} }
@inproceedings {INPROC-2015-61, author = {Stefan Wagner and Dirk Pfl{\"u}ger and Miriam Mehl}, title = {{Simulation Software Engineering: Experiences and Challenges}}, booktitle = {Proceedings of the 3rd International Workshop on Software Engineering for High Performance Computing in Computational Science and Engineering}, publisher = {ACM}, institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany}, series = {SE-HPCCSE '15}, pages = {1--4}, type = {Konferenz-Beitrag}, month = {Januar}, year = {2015}, doi = {10.1145/2830168.2830171}, isbn = {978-1-4503-4012-0}, keywords = {simulation software, software engineering}, language = {Deutsch}, cr-category = {D.2.0 Software Engineering General}, department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Simulation gro{\ss}er Systeme;
Universit{\"a}t Stuttgart, Institut f{\"u}r Softwaretechnologie, Software Engineering}, abstract = {Using software for large-scale simulations has become an important research
method in many disciplines. With increasingly complex simulations, simulation
software becomes a valuable assest. Yet, the quality of many simulation codes
is worrying. In this paper, we want to collect and structure the challenges for
a systematic simulation software engineering as a reference and the basis for
further research. We describe our own experiences with developing simulation
software and collaborating with non-computer-scientists. We complement our
experienced challenges with a brief literature review. We structured the
challenges for simulation software engineering into six areas: motivation and
recognition; education and training; developer turnover; software length of
life; verification, validation and debugging; and efficiency vs.
maintainability. Overcoming these challenges needs efforts from research
agencies, scientific computing researchers as well as software engineering
researchers.}, url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2015-61&engl=0} }
@article {ART-2019-16, author = {Giuliano Casale and Matej Arta\&\#269; and Willem-Jan van den Heuvel and Andr{\'e} van Hoorn and Pelle Jakovits and Frank Leymann and Michael Long and Vasileios Papanikolaou and Domenico Presenza and Alessandra Russo and Satish N. Srirama and Damian A. Tamburri and Michael Wurster and Lulai Zhu}, title = {{RADON: Rational Decomposition and Orchestration for Serverless Computing}}, journal = {SICS Software-Intensive Cyber-Physical Systems}, publisher = {Springer}, type = {Artikel in Zeitschrift}, month = {August}, year = {2019}, doi = {10.1007/s00450-019-00413-w}, language = {Englisch}, cr-category = {C.0 Computer Systems Organization, General,
C.2.4 Distributed Systems,
D.1 Programming Techniques,
D.2 Software Engineering}, contact = {Michael Wurster wurster@iaas.uni-stuttgart.de}, department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Architektur von Anwendungssystemen;
Universit{\"a}t Stuttgart, Institut f{\"u}r Softwaretechnologie, Sichere und Zuverl{\"a}ssige Softwaresysteme;
Universit{\"a}t Stuttgart, Institut f{\"u}r Softwaretechnologie, Software Engineering}, abstract = {Emerging serverless computing technologies, such as function as a service
(FaaS), enable developers to virtualize the internal logic of an application,
simplifying the management of cloud-native services and allowing cost savings
through billing and scaling at the level of individual functions. Serverless
computing is therefore rapidly shifting the attention of software vendors to
the challenge of developing cloud applications deployable on FaaS platforms. In
this vision paper, we present the research agenda of the RADON project
(http://radon-h2020.eu), which aims to develop a model-driven DevOps framework
for creating and managing applications based on serverless computing. RADON
applications will consist of fine-grained and independent microservices that
can efficiently and optimally exploit FaaS and container technologies. Our
methodology strives to tackle complexity in designing such applications,
including the solution of optimal decomposition, the reuse of serverless
functions as well as the abstraction and actuation of event processing chains,
while avoiding cloud vendor lock-in through models.}, url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=ART-2019-16&engl=0} }
|
|