Refine
Year of publication
- 2018 (115) (remove)
Document Type
- Part of a Book (64)
- Other (15)
- Conference Proceeding (11)
- Article (unreviewed) (8)
- Contribution to a Periodical (7)
- Book (6)
- Article (reviewed) (3)
- Report (1)
Conference Type
- Konferenzartikel (9)
- Konferenz-Abstract (1)
- Konferenz-Poster (1)
Has Fulltext
- no (115) (remove)
Is part of the Bibliography
- yes (115)
Keywords
- Digitalisierung (13)
- Data Analytics (12)
- Social Media Marketing (12)
- Big Data (11)
- Fraud Analytics (11)
- Industrie 4.0 (11)
- Smart City (11)
- Surveillance (11)
- Autonomie (4)
- Controlling (2)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (115) (remove)
Open Access
- Closed Access (87)
- Open Access (10)
The authors claim that location information of stationary ICT components can never be unclassified. They describe how swarm-mapping crowd sourcing is used by Apple and Google to worldwide harvest geo-location information on wireless access points and mobile telecommunication systems' base stations to build up gigantic databases with very exclusive access rights. After having highlighted the known technical facts, in the speculative part of this article, the authors argue how this may impact cyber deterrence strategies of states and alliances understanding the cyberspace as another domain of geostrategic relevance. The states and alliances spectrum of activities due to the potential existence of such databases may range from geopolitical negotiations by institutions understanding international affairs as their core business, mitigation approaches at a technical level, over means of cyber deterrence-by-retaliation.
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
The economic dispatch (ED) problem is a large-scale optimization problem in electricity power grids. Its goal is to find a power output combination of all generator nodes that meet the demand of the customers at minimum operating cost. In recent years, distributed protocols have been proposed to replace the traditional centralized ED calculation for modern smart grid infrastructures with the most realistic being the one proposed by Binetti et al. (2014). However, we show that this protocol leaks private information of the generator nodes. We then propose a privacy-preserving distributed protocol that solves the ED problem. We analyze the security of our protocol and give experimental results from a prototype implementation to show the feasibility of the solution.
Our media-artistic performances and installations, INTERCORPOREAL SPLITS (2010–2013), BUZZ (2014–2015), W ASTELAND (2015–2016), as well as our new collaboration with Bruno Latour , DE\GLOBALIZE (2018–2020), are not just about polyphony. Here, however, we rediscover them under this heading, thus giving them a new twist, while mapping out issues, mechanisms and functional modes of the polyphonic.
Mit Gendering Marteloskope stellen wir Entwicklungsprozess dar: Entstanden ist videografisches Material in Marteloskopen, die im Wald Bäume, Tablets und Menschen in Dialog zueinander setzen. Die Videografie und die Erfahrungen vor Ort werden mit Ansätzen aus Gender in Science and Technlogy Studies reflektiert sowie mit digital unterstützter kollaborativer Didaktik über interaktive Webdokumentationen zu Open Science Modulen zusammengeführt.
Autonome Systeme im Consumerbereich - Was bedeutet die Autonomie technischer Systeme für den Kunden
(2018)
Der Spion im Klassenzimmer
(2018)
Bildung statt Profilbildung
(2018)