Titel |
Autor/en |
Jahr |
Quelle |
Datensouveränität im Internet der Dinge – Der Trusted |
Schütte, J.; Brost, G.; Wessel, S. |
2018 |
Fraunhofer AISEC Bericht |
LUCON: Data Flow Control for Message-Based IoT Systems. Projekt: Data Security in IoT Systems |
Schütte, J.; Brost, G. |
2018 |
Proceedings of IEEE TrustCom 2018 |
Goal-Oriented |
Chakrabart, A.; Quix, C.; Geisler, S.; Pullmann, J.; Khromov, A.; Jarke, M. |
2018 |
Proceedings of the |
An Ecosystem |
Brost, G.; Huber, M.; Weiß, M.; Protsenko, M.; Schütte, J.; Wessel, S. |
2018 |
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security (CPSS) |
Distributed Usage Control Enforcement through |
Wagner, P. G.; Birnstill, P.; Beyerer, J. |
2018 |
Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies (SACMAT) S. 85-91 |
Extending model-based privacy analysis for the |
Ahmadian, A. S.; Jürjens, J.; Strüber, D. |
2018 |
Proceedings of the 33rd Annual ACM Symposium on Applied Computing (SAC) S. 1142-1149 |
Engineering Cloud Services for Data Science: How to maintain data privacy and software quality in an interconnected datadriven |
Quix, C.; Correira, M.; Maciari, E.; Rmachandra, M. |
2018 |
Panel discussion at 7th International Conference on Data Science, Technology and Applications (DATA). Porto, Portugal |
Eine Programmiersprache zur souveränen Datenverarbeitung |
Bruckner, F.; Nagel, R.; Krüger, D.; Wenzel, S.; Otto, B. |
2018 |
Proceedings of D-A-CH Security 2018 S. 35-46 |
A Framework to Conduct and Report on Empirical User Studies in SemanticWeb Contexts |
Pesquita, C.; Ivanova, V.; Lohmann, S.; Lambrix, P. |
2018 |
Proceedings of the 21st International Conference on Knowledge Engineering and Knowledge Management (EKAW '18), Springer-Verlag |
A Comparative User Evaluation on Visual Ontology Modeling using Node-Link Diagrams |
Asmat M.; Wiens, V.; Lohmann, S. |
2018 |
E. Demidova, A.J. Zaveri, E. Simperl (Eds.): Emerging Topics in Semantic Technologies, AKA-Verlag |
WebVOWL Editor: Device-Independent Visual Ontology Modeling |
Wiens, V.; Lohmann, S.; Auer, S. |
2018 |
Proceedings of the ISWC 2018 Posters & Demonstrations and Industry Tracks, CEUR-WS.org |
Scanclave: Verifying Application Runtime Integrity in Untrusted Environments |
Morbitzer, M. |
2019 |
2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) |
Dominance as a New Trusted Computing Primitive for the Internet of Things |
Meng Xu, Manuel Huber, Zhichuang Sun, Paul England, Marcus Peinado, Sangho Lee, Andrey Marochko , Dennis Mattoon, Rob Spiger and Stefan Thom |
2019 |
40th IEEE Symposium on Security and Privacy |
Towards Enforceable Usage Policies for Industry 4.0 |
Sebastian Bader and Maria Maleshkova |
2019 |
Large Scale RDF Analytics (LASCAR) at ESWC 2019 |
Digital Twin for Real-Time Data Processing in Logistics |
Haße H.; Li, B.; Cirullies, J.; Weißenberg, N.; Otto, B. |
2019 |
Hamburg International Conference of Logistics (HICL) 2019, hicl.org |
Challenges of Using Trusted Computing for Collaborative Data Processing |
Paul Wagner, Pascal Birnstill, Jürgen Beyerer |
2019 |
STM Workshop der ESORICS 2019, Luxembourg |
Usage Control Architecture Options for Data Sovereignty in Business Ecosystems |
Johannes Zrenner, Frederik Möller, Jung, Christian Eitel, Andreas , Boris Otto |
2019 |
ISSN: 0263-5577 |
Structuring the Industry 4.0 Landscape |
Sebastian R. Bader, Irlán Grangel-González, Mayesha Tasnim, Steffen Lohmann |
2019 |
ETFA2019 |
The Semantic Asset Administration Shell |
S. R. Bader and M. Maleshkova |
2019 |
Semantics2019 |
Structuring Reference Architectures for the Industrial Internet of Things |
Bader, Sebastian R., Maria Maleshkova, and Steffen Lohmann |
2019 |
Future Internet |
Annotary: A Concolic Execution System for Developing Secure Smart Contracts |
Weiss K., Schütte J. |
2019 |
ESORICS 2019 |
Model Checking Smart Contracts for Ethereum |
Osterland, T. and Rose T. |
||
Designing a multi-sided data platform: findings from the International Data Spaces case |
Otto, Boris & Jarke, Matthias |
2019 |
Electronic Markets |
reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption |
Martin Schanzenbach, Georg Bramm, Julian Schütte |
2018 |
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering |
Blockchain-based Distributed Attribute Based Encryption |
Georg Bramm, Mark Gall, Julian Schütte |
2018 |
2018 International Conference on Security and Cryptography (SECRYPT) |
Sebastian Bader, Jaroslav Pullmann, Christian Mader, Sebastian Tramp, Christoph Quix, Andreas W. Müller, Haydar Akyürek, Matthias Böckmann, Benedikt T. Imbusch, Johannes Lipp, Sandra Geisler, Christoph Lange |
2020 |
International Semantic Web Conference
|
|
Shared Digital Twins: Data Sovereignty in Logistics Networks |
Hendrik Haße, Hendrik van der Valk, Norbert Weißenberg, Boris Otto |
2020 |
Hamburg International Conference of Logistics (HICL) 2020, hicl.org |
Requirements for Usage Control based Exchange of Sensitive Data in Automotive Supply Chains |
Sebastian Opriel, Frederik Möller, Ute Burkhardt, Boris Otto |
2021 |
54th Hawaii International Conference on System Sciences (HICSS) |