Bild von Institut mit Unilogo
home uni uni suche suche sitemap sitemap kontakt kontakt
unilogo Universität Stuttgart

Software Engineering : Publications

Bibliography BibTeX

search germanicon
 
@inproceedings {INPROC-2018-15,
   author = {Christoph Stach and Sascha Alpers and Stefanie Betz and Frank D{\"u}rr and Andreas Fritsch and Kai Mindermann and Saravana Murthy Palanisamy and Gunther Schiefer and Manuela Wagner and Bernhard Mitschang and Andreas Oberweis and Stefan Wagner},
   title = {{The AVARE PATRON: A Holistic Privacy Approach for the Internet of Things}},
   booktitle = {Proceedings of the 15th International Conference on Security and Cryptography (SECRYPT '18)},
   publisher = {INSTICC Press},
   institution = {University of Stuttgart, Faculty of Computer Science, Electrical Engineering, and Information Technology, Germany},
   pages = {1--8},
   type = {Conference Paper},
   month = {July},
   year = {2018},
   keywords = {Privacy; IoT Apps; Smart Things; Stream Processing; Privacy Preferences Elicitation \& Veri\&\#64257; cation},
   language = {English},
   cr-category = {K.4.1 Computers and Society Public Policy Issues,     D.4.6 Operating Systems Security and Protection},
   contact = {Senden Sie eine E-Mail an Christoph.Stach@ipvs.uni-stuttgart.de},
   department = {University of Stuttgart, Institute of Parallel and Distributed Systems, Applications of Parallel and Distributed Systems;     University of Stuttgart, Institute of Software Technology, Software Engineering;     University of Stuttgart, Institute of Parallel and Distributed Systems, Distributed Systems},
   abstract = {Applications for the Internet of Things are becoming increasingly popular. Due to the large amount of available context data, such applications can be used effectively in many domains. By interlinking these data and analyzing them, it is possible to gather a lot of knowledge about a user. Therefore, these applications pose a threat to privacy. In this paper, we illustrate this threat by looking at a real-world application scenario. Current state of the art focuses on privacy mechanisms either for Smart Things or for big data processing systems. However, our studies show that for a comprehensive privacy protection a holistic view on these applications is required. Therefore, we describe how to combine two promising privacy approaches from both categories, namely AVARE and PATRON. Evaluation results confirm the thereby achieved synergy effects.},
   url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2018-15&engl=1}
}
@inproceedings {INPROC-2018-04,
   author = {Christoph Stach and Frank D{\"u}rr and Kai Mindermann and Saravana Murthy Palanisamy and Stefan Wagner},
   title = {{How a Pattern-based Privacy System Contributes to Improve Context Recognition}},
   booktitle = {Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (CoMoRea)},
   publisher = {IEEE Computer Society},
   institution = {University of Stuttgart, Faculty of Computer Science, Electrical Engineering, and Information Technology, Germany},
   pages = {1--6},
   type = {Workshop Paper},
   month = {March},
   year = {2018},
   keywords = {privacy; access control; pattern concealing; stream processing; complex event processing; databases},
   language = {English},
   cr-category = {K.4.1 Computers and Society Public Policy Issues,     D.4.6 Operating Systems Security and Protection},
   contact = {Senden Sie eine E-Mail an Christoph.Stach@ipvs.uni-stuttgart.de},
   department = {University of Stuttgart, Institute of Parallel and Distributed Systems, Applications of Parallel and Distributed Systems;     University of Stuttgart, Institute of Software Technology, Software Engineering;     University of Stuttgart, Institute of Parallel and Distributed Systems, Distributed Systems},
   abstract = {As Smart Devices have access to a lot of user-preferential data, they come in handy in any situation. Although such data - as well as the knowledge which can be derived from it - is highly beneficial as apps are able to adapt their services appropriate to the respective context, it also poses a privacy threat. Thus, a lot of research work is done regarding privacy. Yet, all approaches obfuscate certain attributes which has a negative impact on context recognition and thus service quality. Therefore, we introduce a novel access control mechanism called PATRON. The basic idea is to control access to information patterns. For instance, a person suffering from diabetes might not want to reveal his or her unhealthy eating habit, which can be derived from the pattern ``rising blood sugar level'' -$>$ ``adding bread units''. Such a pattern which must not be discoverable by some parties (e.g., insurance companies) is called private pattern whereas a pattern which improves an app's service quality is labeled as public pattern. PATRON employs different techniques to conceal private patterns and, in case of available alternatives, selects the one with the least negative impact on service quality, such that the recognition of public patterns is supported as good as possible.},
   url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2018-04&engl=1}
}
@inproceedings {INPROC-2017-32,
   author = {Christoph Stach and Frank D{\"u}rr and Kai Mindermann and Saravana Murthy Palanisamy and Muhammad Adnan Tariq and Bernhard Mitschang and Stefan Wagner},
   title = {{PATRON - Datenschutz in Datenstromverarbeitungssystemen}},
   booktitle = {Informatik 2017: Digitale Kulturen, Tagungsband der 47. Jahrestagung der Gesellschaft f{\"u}r Informatik e.V. (GI), 25.09. - 29.09.2017, Technische Universit{\"a}t Chemnitz},
   publisher = {Gesellschaft f{\"u}r Informatik e.V. (GI)},
   institution = {University of Stuttgart, Faculty of Computer Science, Electrical Engineering, and Information Technology, Germany},
   series = {LNI},
   pages = {1--12},
   type = {Workshop Paper},
   month = {September},
   year = {2017},
   keywords = {Datenschutz; Zugriffskontrolle; Datenstr{\"o}me; Internet der Dinge; Privatheit; Sensoren},
   language = {German},
   cr-category = {K.4.1 Computers and Society Public Policy Issues,     D.4.6 Operating Systems Security and Protection},
   contact = {Senden Sie eine E-Mail an Christoph.Stach@ipvs.uni-stuttgart.de},
   department = {University of Stuttgart, Institute of Parallel and Distributed Systems, Applications of Parallel and Distributed Systems;     University of Stuttgart, Institute of Software Technology, Software Engineering;     University of Stuttgart, Institute of Parallel and Distributed Systems, Distributed Systems},
   abstract = {Angetrieben durch die stetig voranschreitende Digitalisierung gewinnt das Internet der Dinge (engl. IoT) immer mehr an Bedeutung. Im IoT werden technische Ger{\"a}te mit unterschiedlichen Sensoren ausgestattet und miteinander vernetzt. Dadurch werden neuartige Anwendungen beispielsweise im Bereich E-Health erm{\"o}glicht, in denen Sensordaten miteinander kombiniert und so in h{\"o}herwertige Informationen umgewandelt werden. Die von diesen Anwendungen abgeleiteten Informationen verraten viel {\"u}ber den Nutzer und m{\"u}ssen daher besonders gesch{\"u}tzt werden. H{\"a}ufig hat der Nutzer allerdings keine Kontrolle {\"u}ber die Verarbeitung seiner Daten, ganz davon zu schweigen, dass er das Ausma{\ss} und die Art der daraus ableitbaren Informationen nicht ermessen kann. In diesem Artikel stellen wir daher einen neuartigen Kontrollmechanismus vor, der private Informationen im IoT sch{\"u}tzt. Anstelle von abstrakten Datenschutzregeln f{\"u}r einzelne Sensoren definiert der Nutzer Muster, die es zu sch{\"u}tzen gilt. Ein Muster kann beispielsweise eine Kombination aus Messwerten sein, die auf eine bestimmte Krankheit schlie{\ss}en lassen. Der Nutzer definiert die zu verheimlichenden Informationen nat{\"u}rlichsprachlich, und ein Dom{\"a}nenexperte setzt diese in formale Regeln um. Sind diese Regeln zu restriktiv, so kann die Anwendung ihre angedachte Funktionalit{\"a}t nicht erbringen. Daher muss bez{\"u}glich der Servicequalit{\"a}t ein Kompromiss zwischen gew{\"u}nschter Privatheit und ben{\"o}tigter Funktionalit{\"a}t gefunden werden.},
   url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2017-32&engl=1}
}
@inproceedings {INPROC-2015-61,
   author = {Stefan Wagner and Dirk Pfl{\"u}ger and Miriam Mehl},
   title = {{Simulation Software Engineering: Experiences and Challenges}},
   booktitle = {Proceedings of the 3rd International Workshop on Software Engineering for High Performance Computing in Computational Science and Engineering},
   publisher = {ACM},
   institution = {University of Stuttgart, Faculty of Computer Science, Electrical Engineering, and Information Technology, Germany},
   series = {SE-HPCCSE '15},
   pages = {1--4},
   type = {Conference Paper},
   month = {January},
   year = {2015},
   doi = {10.1145/2830168.2830171},
   isbn = {978-1-4503-4012-0},
   keywords = {simulation software, software engineering},
   language = {German},
   cr-category = {D.2.0 Software Engineering General},
   department = {University of Stuttgart, Institute of Parallel and Distributed Systems, Simulation of Large Systems;     University of Stuttgart, Institute of Software Technology, Software Engineering},
   abstract = {Using software for large-scale simulations has become an important research method in many disciplines. With increasingly complex simulations, simulation software becomes a valuable assest. Yet, the quality of many simulation codes is worrying. In this paper, we want to collect and structure the challenges for a systematic simulation software engineering as a reference and the basis for further research. We describe our own experiences with developing simulation software and collaborating with non-computer-scientists. We complement our experienced challenges with a brief literature review. We structured the challenges for simulation software engineering into six areas: motivation and recognition; education and training; developer turnover; software length of life; verification, validation and debugging; and efficiency vs. maintainability. Overcoming these challenges needs efforts from research agencies, scientific computing researchers as well as software engineering researchers.},
   url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2015-61&engl=1}
}
@article {ART-2019-16,
   author = {Giuliano Casale and Matej Arta\&\#269; and Willem-Jan van den Heuvel and Andr{\'e} van Hoorn and Pelle Jakovits and Frank Leymann and Michael Long and Vasileios Papanikolaou and Domenico Presenza and Alessandra Russo and Satish N. Srirama and Damian A. Tamburri and Michael Wurster and Lulai Zhu},
   title = {{RADON: Rational Decomposition and Orchestration for Serverless Computing}},
   journal = {SICS Software-Intensive Cyber-Physical Systems},
   publisher = {Springer},
   type = {Article in Journal},
   month = {August},
   year = {2019},
   doi = {10.1007/s00450-019-00413-w},
   language = {English},
   cr-category = {C.0 Computer Systems Organization, General,     C.2.4 Distributed Systems,     D.1 Programming Techniques,     D.2 Software Engineering},
   contact = {Michael Wurster wurster@iaas.uni-stuttgart.de},
   department = {University of Stuttgart, Institute of Architecture of Application Systems;     University of Stuttgart, Institute of Software Technology, Software Reliability and Security;     University of Stuttgart, Institute of Software Technology, Software Engineering},
   abstract = {Emerging serverless computing technologies, such as function as a service (FaaS), enable developers to virtualize the internal logic of an application, simplifying the management of cloud-native services and allowing cost savings through billing and scaling at the level of individual functions. Serverless computing is therefore rapidly shifting the attention of software vendors to the challenge of developing cloud applications deployable on FaaS platforms. In this vision paper, we present the research agenda of the RADON project (http://radon-h2020.eu), which aims to develop a model-driven DevOps framework for creating and managing applications based on serverless computing. RADON applications will consist of fine-grained and independent microservices that can efficiently and optimally exploit FaaS and container technologies. Our methodology strives to tackle complexity in designing such applications, including the solution of optimal decomposition, the reuse of serverless functions as well as the abstraction and actuation of event processing chains, while avoiding cloud vendor lock-in through models.},
   url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=ART-2019-16&engl=1}
}