If you made any changes in Pure these will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Security of data Engineering & Materials Science
Data privacy Engineering & Materials Science
Access control Engineering & Materials Science
Public administration Engineering & Materials Science
Web services Engineering & Materials Science
Scalability Engineering & Materials Science
Application programming interfaces (API) Engineering & Materials Science
Peer to peer networks Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2014 2019

  • 8 Conference contribution
  • 2 Other contribution
  • 1 Article

Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption

Ziegler, D., Sabongui, J. & Palfinger, G., 2019, (Accepted/In press) Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D., 2018, Security and Privacy in Communication Networks. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham: Springer International, p. 122-138 16 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 255)

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Peer to peer networks
Communication

Best of two worlds: Secure cloud federations meet eIDAS

Zefferer, T., Ziegler, D. & Reiter, A., 10 May 2018, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). p. 396-401 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

On The Structure and Authorization Management of RESTful Web Services

Suzic, B., Prünster, B. & Ziegler, D., 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing. Association of Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Web services
Application programming interfaces (API)
Data privacy
Security of data
Interoperability

Activities 2016 2018

  • 3 Talk at conference or symposium

Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes

Dominik Ziegler (Speaker)
28 Jul 2018

Activity: Talk or presentationTalk at conference or symposiumScience to science

On The Structure and Authorization Management of RESTful Web Services

Bojan Suzic (Speaker), Bernd Prünster (Contributor), Dominik Ziegler (Contributor)
13 Apr 2018

Activity: Talk or presentationTalk at conference or symposiumScience to science

Balancing Utility and Security: Securing Cloud Federations of Public Entities

Bojan Suzic (Speaker), Bernd Prünster (Contributor), Dominik Ziegler (Contributor), Alexander Marsalek (Contributor), Andreas Reiter (Contributor)
Oct 2016

Activity: Talk or presentationTalk at conference or symposiumScience to science