ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange
|
|
- Cassandra Myra Richardson
- 8 years ago
- Views:
Transcription
1 ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Overview on Activities Related to Academic Utilization Contributors: Cassidian Systems ERNW Enno Rey Netzwerke GmbH Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Hochschule Augsburg Nokia Siemens Networks GmbH & Co KG RWTH Aachen Editor: André Egners (RWTH Aachen)
2 Author(s) Company André Egners RWTH Aachen About the ASMONIA project Given their inherent complexity, protecting telecommunication networks from attacks requires the implementation of a multitude of technical and organizational controls. Furthermore, to be fully effective these measures call for the collaboration between different administrative domains such as network operators, manufacturers, service providers, government authorities, and users of the services. ASMONIA is the acronym for the German name* of a research project that aims to improve the resilience, reliability and security of current and future mobile telecommunication networks. For this purpose the ASMONIA consortium made up of several partners from academia and industry performs a number of research tasks, based on the specific expertise of the individual partners. The project running from September 2011 till May 2013 receives funding from the German Federal Ministry of Education and Research (Bundesministerium für Bildung und Forschung, BMBF). Various associated partners further contribute on a voluntary basis. * The full name is "Angriffsanalyse und Schutzkonzepte für MObilfunkbasierte Netzinfrastrukturen unterstützt durch kooperativen InformationsAustausch" (Attack analysis and security concepts for mobile network infrastructures, supported by collaborative information exchange). Partners: Associated Partners: Cassidian Systems ERNW Enno Rey Netzwerke GmbH Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Hochschule Augsburg Nokia Siemens Networks GmbH & Co KG RWTH Aachen Federal Agency for Digital Radio of Security Authorities and Organizations (BDBOS) Federal Office for Information Security (BSI) Deutsche Telecom AG (DTAG) For more details about the project please visit 2 Copyright 2012 ASMONIA consortium. All rights reserved.
3 Executive Summary The purpose of this document is to collect and summarize ongoing and finished work with respect to the academic utilization. Each of the partners involved in the ASMONIA project devoted some resources to utilizing the results achieved during the project s runtime. This includes publications at various conferences, the organization of project workshops, talks or posters at external events, as well as the thematic integration into teaching curricula. Copyright 2012 ASMONIA consortium. All rights reserved. 3
4
5 Table of Contents 1 Publications 6 2 External Workshops st External ASMONIA Workshop 7 3 Posters & Talks Posters Talks 8 4 ASMONIA Website 9 References 10 Glossary and Abbreviations 11 Glossary 11 Abbreviations 11 Revision History 12 Copyright 2012 ASMONIA consortium. All rights reserved. 5
6 1 Publications This chapter presents the publications in conferences proceedings, academic journals, and other written formats of the ASMONIA project as of January Tailored Concepts for Software Integrity Protection in Mobile Networks, Manfred Schäfer (NSN) and Wolf-Dietrich Moeller (NSN), Germany, in International Journal on Advances in Security Volume 4, 2011 [SM2011] Mit Sicherheit zum Geschäftserfolg: Ökonomische Einflüsse von Sicherheitsmechanismen auf die Wertschöpfung in Mobilfunknetzen, Michael Hoche (CASSIDIAN) and Heiko Kirsch (CASSIDIAN), in Praxis der Informationsverarbeitung und Kommunikation (PIK), Volume 34, Issue 4, Walter de Gruyter GmbH & Co. KG, Berlin/Boston, 2011 [HK_PIK2011] 6 Copyright 2012 ASMONIA consortium. All rights reserved.
7 2 External Workshops This chapter presents the workshops of the ASMONIA project as of January st External ASMONIA Workshop Date: This external workshop has been organized by ERNW and was held in conjunction with the Troopers 2011 IT-Security conference in Heidelberg. The slide set of each talk can be found on the ASMONIA website The agenda can be seen below: ASMONIA Overview and Reference Architecture for Collaborative Information Exchange, Hans Hofinger, Fraunhofer AISEC, Garching near Munich, Germany Cyber Fed Model - a Collaborative Threat Mitigation Tool, Scott C. Pinkerton, Argonne National Laboratory, Chicago, IL, US Input for the Local Security Overview and Dashboard, Heiko Kirsch and Michael Hoche, Cassidian Systems, Friedrichshafen, Germany FIDeS: Event Correlation based on Knowledge-Supported Machine Learning, Mirko Horstmann, Technologie-Zentrum Informatik und Informationstechnik, Bremen, Germany Integrity Protection for 4G Devices and NW Elements, Manfred Schäfer and Sascha Wessel, Nokia Siemens Networks and Fraunhofer AISEC, Munich, Germany Femtocell: Femtostep to the Holy Grail, Ravishankar Borgaonkar and Kevin Redon, T-Labs, Berlin, Germany Future Directions in Malware Detection on Mobile Handsets, André Egners, RWTH Aachen University, Germany Project AMSEL: Automatically Collect and Learn to Detect Malware, Michael Meier, Technical University Dortmund, Germany Worldwide Observatory of Malicious Behaviours and Attack Threats, Apostolis Zarras, Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Greece Usage Scenarios of Elastic Systems in a Telco Infrastrucutre, Mark Gall, Fraunhofer AISEC, Garching near Munich, Germany Cloud Networking Research in SAIL Project, Dominique Dudkowski, NEC Europe Ltd., Heidelberg, Germany Threats and risks for 4G Mobile Communication Networks and Terminals, Peter Schneider, Nokia Siemens Networks, Munich, Germany Copyright 2012 ASMONIA consortium. All rights reserved. 7
8 3 Posters & Talks This chapter presents the posters and talks of the ASMONIA project as of January Posters "Sharing Knowledge to Improve Misuse Prevention and Situational Awareness", Peter Schoo (Fraunhofer AISEC), BMBF Kongress Zukünftiges Internet 2011, Juli 2011, Berlin ( 3.2 Talks Security and Regulatory Requirements for Public Could Offerings to Support Selected Customer Use Cases, Joachim Lüken (NSN) and Mark Gall (FRAUNHOFER AISEC), Troopers IT-Security Conference 2011 ( _for_cloud_offerings.pdf) Future Directions in Mobile Malware Detection on Mobile Handsets, André Egners (RWTH Aachen), Troopers IT-Security Conference 2011 ( Business Transparency via Security Dashboards, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), Troopers IT-Security Conference 2011 ( "Innovative Schutzkonzepte für Mobilfunkbasierte Netzinfrastrukturen", Peter Schoo (Fraunhofer AISEC), Kolloquium Universität der Bundeswehr München, 2011 Sicherheit hat ihren Preis: Modellierung des Einflusses von Sicherheitsmechanismen auf Werteflüsse in Informations- und Kommunikationssystemen, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), in Essener Workshop zur Netzsicherheit 2011 (EWNS11) [HK2011] Business meets Security Risk Economical Insights for Risk-Based Decisions, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), in 3 rd International Workshop on Early Warning Systems in IT (EWS11) [KH2011] 8 Copyright 2012 ASMONIA consortium. All rights reserved.
9 4 ASMONIA Website Relevant external information concerning the ongoing project is presented on the ASMONIA website News about the project status, press releases, as well the publication of project deliverables can be found on the website. The website is maintained at Fraunhofer AISEC by Hans Hofinger. Figure 1 : ASMONIA Website (December 2011) Copyright 2012 ASMONIA consortium. All rights reserved. 9
10 References [SM_IJAS2011] Manfred Schäfer, Wolf-Dietrich Moeller, "Tailored Concepts for Software Integrity Protection in Mobile Networks", International Journal On Advances in Security Vol.4, September [KH_EWNS2011] Heiko Kirsch, Michael Hoche, "Sicherheit hat ihren Preis: Modellierung des Einflusses von Sicherheitsmechanismen auf Werteflüsse in Informations- und Kommunikationssystemen", Essener Workshop zur Netzsicherheit _CASSIDIAN.pdf [HK_EWS2011] [HK_PIK2011] Michael Hoche, Heiko Kirsch, Business meets Security Risk Economical Insights for Risk-Based Decisions, 3 rd International Workshop on Early Warning Systems in IT (EWS11) Michael Hoche, Heiko Kirsch, Mit Sicherheit zum Geschäftserfolg: Ökonomische Einflüsse von Sicherheitsmechanismen auf die Wertschöpfung in Mobilfunknetzen, Praxis der Informationsverarbeitung und Kommunikation (PIK) Journal, Copyright 2012 ASMONIA consortium. All rights reserved.
11 Glossary and Abbreviations Glossary Term Explanation Source Abbreviations Copyright 2012 ASMONIA consortium. All rights reserved. 11
12 Revision History Version Date Changes Initial Version Review Version Final Version 12 Copyright 2012 ASMONIA consortium. All rights reserved.
ASMONIA. Analysis of Requirements for the Deployment of Cloud Systems. WP 3.1 Deliverable (public) D31-1.0
ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Analysis of Requirements for the Deployment of Cloud Systems Contributors:
More informationASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange
ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Evaluation of the Intercloud Demonstrator Contributors: Cassidian / EADS
More informationASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange
ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Threat and Risk Analysis for Mobile Communication Networks and Mobile Terminals
More informationASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange
ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Recommender System for Security Risk Reduction Situational Awareness for
More informationAPPLIED AND INTEGRATED SECURITY
APPLIED AND INTEGRATED SECURITY New approach for Compliance, Security and Data privacy assessment in the Cloud Age NGCert Next Generation Certification EuroCloud Forum 2015 Fraunhofer AGENDA Fraunhofer
More information4G Mobile Networks At Risk
07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis
More informationHow To Manage Security In The Cloud
Security interoperability challenges for Collaborative Clouds 4th International DMTF Academic Alliance Workshop on Systems and Virtualization : Standards and the Cloud (SVM 2010) - 29/10/2010 [Michael.Kretzschmar,
More informationsmart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany
smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany TÜV SÜD AG Embedded Systems TÜV SÜD Akademie GmbH About the Conference To
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
More informationMulti-Agent Systems. Expert Forum Agents within the context of Industry 4.0. Industry 4.0 Machine Learning. Energy and Smart Grids.
Multi-Agent Systems Event Expert Forum Agents within the context of Industry 4.0 Industry 4.0 Machine Learning Material Handling Energy and Smart Grids Energy Management Production Control Operations Scheduling
More informationIndustry 4.0 Challenges and Opportunities
Industry 4.0 Challenges and Opportunities Institute of Industrial Management and Innovation Research Graz University of Technology 14 th International Conference on Knowledge Technologies and Data-driven
More informationNational Plan for Information Infrastructure Protection
National Plan for Information Infrastructure Protection www.bmi.bund.de Contents 1 Introduction 2 1.1 Germany s information infrastructures 2 1.2 Threats and risks to our information infrastructures 3
More informationfor High Performance Computing
Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov
More informationSelf-employed business consultant and coach, interested in new consulting, training or coaching work with companies or NGOs in Europe or the US.
Martin Roell Business Consultant, Trainer and Coach martin@roell.net Summary Self-employed business consultant and coach, interested in new consulting, training or coaching work with companies or NGOs
More informationResearch scientist at the Chair of Psychology (Prof. Dr. Hugo M. Kehr)
CURRICULUM VITAE DIPL.-PSYCH. MAIKA RAWOLLE January 21, 1982 Born in Rathenow, Germany CURRENT POSITION Since 01/2007 Technische Universität München, Germany Research scientist at the Chair of Psychology
More informationParadigmenw echsel in der IT-Sicherheit Sicherheit vor Malw are-angriffen und Datenspionage
Paradigmenw echsel in der IT-Sicherheit Sicherheit vor Malw are-angriffen und Datenspionage Ammar Alkassar, CEO 8. Oktober 2013 It-sa Forum Rot Sirrix AG Founded in 2001 as a technology spin-off from the
More informationSecure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems
Secure Services and Quality Testing SST Security Engineering Privacy by Design Trusted Solutions for Service Ecosystems Mario Hoffmann Head of Department Fraunhofer AISEC in a nutshell Fraunhofer Profile
More informationThe Annual Conference 2009 was supported by:
Acknowledgement of sponsors and contributors The Annual Conference 2009 was supported by: Cooperation partner Sponsorer and patron Bundesministerium für Umwelt, Naturschutz und Reaktorsicherheit Patron
More informationApplicant s Research Profile. Univ.-Prof. Dr.-Ing. habil. Dipl.-Wirt. Ing.
Applicant s Research Profile Personal Information Last Name, First Name: Cherif, Chokri Academic Title: Univ.-Prof. Dr.-Ing. habil. Dipl.-Wirt. Ing. Birthday: 24.05.1966 Nationality: Marital Status: Institution:
More informationPhotonics Industry report 2013
Key Data Photonics Industry report 2013 Imprint In Charge of Content/ Publisher Workgroup Market Research Photonics Mike Bähren SPECTARIS e.v., Berlin Harald Hartmann SPECTARIS e.v., Berlin Gerhard Hein
More informationIT-/IP-Law Intellectual Property Commercial and Corporate Law Labour Law
IT-/IP-Law Intellectual Property Commercial and Corporate Law Labour Law Darmstadt Berlin We put the I in expertise, with IP, IT and IQ in any legal context. We specialize in IT and IP law in the context
More informationCyber Security From product to system solution
Markus Brändle, Network Management Forum Heidelberg, 8./9./10. October 2013 Cyber Security From product to system solution ABB Network Management Forum October 14, 2013 Slide 1 Cyber Security A definition
More informationSecurity and Compliance in Clouds: Challenges and Solutions
Security and Compliance in Clouds: Challenges and Solutions Prof. Dr. Jan Jürjens Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de This Talk What are the challenges?
More informationSecurity concept for gateway integrity protection within German smart grids
ASE 2014, ECSaR-Workshop Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken 1, Carl-Heinz Genzel 2, Olav Hoffmann 3, Prof. Dr. Richard Sethmann 4 1
More informationIncident Response from a Global Enterprise Perspective Public Siemens AG 2015. All rights reserved
eco, From Detection to Response, Thomas Schreck, 19.02.2015 Incident Response from a Global Enterprise Perspective Siemens Page 2 February 2015 Corporate Technology Corporate Technology - RTC Software
More informationCompliance in Clouds A cloud computing security perspective
Compliance in Clouds A cloud computing security perspective Kristian Beckers, Martin Hirsch, Jan Jürjens GI Workshop: Governance, Risk & Compliance on the 19th of March 2010 What is Cloud Computing? Today:
More informationHow to Teach Teachers to Teach with New Media: Initial and Further Teacher Education in a web-based Collaborative Distant Learning Environment
Veröffentlicht in: Gudrun Bachmann, Odette Haefeli, Michael Kindt (Hrsg.): Campus 2002: Die virtuelle Hochschule in der Konsolidierungsphase. Waxmann: Münster u.a. 2002 How to Teach Teachers to Teach with
More informationKick-off Meeting im Förderschwerpunkt des BMBF: Forschung für die nachhaltige Entwicklung der Megastädte von morgen 23. - 25.11.
Kick-off Meeting im Förderschwerpunkt des BMBF: Forschung für die nachhaltige Entwicklung der Megastädte von morgen 23. - 25.11.2005 Trunk Infrastructure and Urban Growth - Managing Rapid Urbanization
More informationIndustrie 4.0 and Digital Transformation in NRW: Challenges, Opportunities and Potential for Cooperation Seoul, 20.04.2016
Industrie 4.0 and Digital Transformation in NRW: Challenges, Opportunities and Potential for Cooperation Seoul, 20.04.2016 Industrie 4.0 and Digital Transformation in NRW 1 Challenges Enabling Technologies
More informationSecondary Use of the EHR via Pseudonymisation
Secondary Use of the EHR via Klaus POMMERENING Institut für Medizinische Biometrie, Epidemiologie und Informatik Johannes-Gutenberg-Universität D-55101 Mainz, Germany Michael RENG Klinik und Poliklinik
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationSecure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
More informationLehrstuhl für Rechnertechnik und Rechnerorganisation (LRR-TUM) Annual Report 1998/1999
Research Report Series Lehrstuhl für Rechnertechnik und Rechnerorganisation (LRR-TUM) Technische Universität München http://wwwbode.informatik.tu-muenchen.de/ Editor: Prof. Dr. A. Bode Vol. 18 Lehrstuhl
More informationCyber-Sicherheit aus Sicht der Wirtschaft Kompetenzen ausbauen, Kräfte bündeln, Kooperationen stärken
Cyber-Sicherheit aus Sicht der Wirtschaft Kompetenzen ausbauen, Kräfte bündeln, Kooperationen stärken Dr. Kai Grassie, G&D Outline Situation within G&D symptomatic for ICT industry? Increasingly connected
More informationGroups Inside FHNW: Why it s not just another AAI SP
Groups Inside FHNW: Why it s not just another AAI SP Michael Hausherr, Business Applications FHNW 1 Agenda Introduction (Groups) Inside FHNW Issue 1: authentication for different user groups Issue 2: simple
More informationTeleTrusT Bundesverband IT-Sicherheit e.v.
TeleTrusT Bundesverband IT-Sicherheit e.v. TeleTrusT-Workshop "Industrial Security" 2015 München, 11.06.2015 Einführung Industrial Security anhand des IEC 62443; Bedrohungslage für Betreiber von ICS (Industrial
More informationMedical Cyber-Physical Systems On the Research Challenges for the Safe Interconnection of Medical Devices
Medical Cyber-Physical Systems On the Research Challenges for the Safe Interconnection of Medical Devices Franziska Kühn 1,2 Martin Leucker 1 Daniel Thoma 1 {kuehn, leucker, thoma}@isp.uni-luebeck.de 1
More informationWorkshop Program 1st German-U.S. Workshop on Predictive Analytics, Cyber-Physical Systems, and Industrie 4.0 in Big Data Environments
Workshop Program 1st German-U.S. Workshop on Predictive Analytics, Cyber-Physical Systems, and Industrie 4.0 in Big Data Environments Technische Universität München, Garching near Munich, 17 18 November
More informationCyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
More informationDr. Anna Maria Schneider
Dr. Anna Maria Schneider Postdoctoral Researcher Faculty of Economics and Business Administration Humboldt Universität zu Berlin Rosenstraße 19 10178 Berlin, Germany anna maria.schneider[at]wiwi.hu berlin.de
More informationUR:BAN Networked Transportation System. Good Practice Case of Industry-led R&D Project with Good Prospects of Post-project Exploitation
UR:BAN Networked Transportation System Good Practice Case of Industry-led R&D Project with Good Prospects of Post-project Exploitation Programme Mobility and Transportation Technologies "Mobility and Transport
More informationETSI TS 102 042: Electronic Signatures and Infrastructures (ESI): Policy
Abbreviations AIS BGBl BNetzA BSI CC CEM CSP DAR DATech DIN EAL ETR ETSI ISO IT ITSEC ITSEF ITSEM JIL PP SF SigG SigV SOF Anwendungshinweise und Interpretationen zum Schema [Guidance and Interpretations
More informationSafety Management in Nuclear Technology
Safety Management in Nuclear Technology Symposium October 16 17, 2014, Munich, Germany TÜV SÜD Akademie GmbH TÜV SÜD Industrie Service GmbH The Symposium is intended for specialists and managers at Nuclear
More informationSecurity und Compliance in Clouds
Security und Compliance in Clouds Prof. Dr. Jan Jürjens, Kristian Beckers Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de The NIST Cloud Definition Framework
More informationCreating an Open Innovation Ecosystem at Deutsche Telekom
Creating an Open Innovation Ecosystem at Deutsche Telekom Presentation at the EIRMA & OECD: Symposium on Global Innovation Networks. René Rohrbeck, EICT GmbH, Germany The open innovation ecosystem of Deutsche
More informationAutomated assessment of C++ exercises with unit tests
Automated assessment of C++ exercises with unit tests Workshop Automatische Bewertung von Programmieraufgaben Tom-Michael Hesse, Axel Wagner, Barbara Paech Institute of Computer Science Chair of Software
More informationGLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
More informationStrategic Planning at the Deutsche Bundesbank
Strategic Planning at the Deutsche Bundesbank Key aspects in Central Bank Governance 1. set of central bank tasks key aspects 5. stakeholders 2. rules for decision making bodies 4. transparency, credibility,
More informationNokia Networks. security you can rely on
Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by
More informationto confirm that its document management- and archiving solution fulfils all applicable audit criteria for document management solutions
The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company LOGEX SYSTEM GmbH & Co. KG Joseph-Baader Straße 8 85053 Ingolstadt, Germany to confirm that its document
More informationThe internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
More informationDeutsche Gesellschaft für Essstörungen German Association of Eating Disorders
Deutsche Gesellschaft für Essstörungen German Association of Eating Disorders President Prof. Dr. Martina de Zwaan University Erlangen Nürnberg Vice President Prof. Dr. Stephan Herpertz Ruhr Universität
More informationHow To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
More informationThe Society of German Chemists (Gesellschaft Deutscher Chemiker, short: GDCh)
History The history of Germany s Chemistry Information Centre (Fachinformationszentrum Chemie GmbH, short: FIZ CHEMIE Berlin), can be traced back long before its foundation in 1981 and is closely linked
More informationAthens Institute for Education and Research (ATINER) 8 th Annual International Conference on Languages & Linguistics Athens, 6 July 2015
Standardized Individual Output Development: Linguistic Approaches for Requirements Engineering Problems through Cultural Differences. Case Studies from Requirements Engineering Education in the Context
More informationOntology based Recruitment Process
Ontology based Recruitment Process Malgorzata Mochol Radoslaw Oldakowski Institut für Informatik AG Netzbasierte Informationssysteme Freie Universität Berlin Takustr. 9, 14195 Berlin, Germany mochol@inf.fu-berlin.de
More informationEIT ICT Labs MASTER SCHOOL DSS Programme Specialisations
EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations DSS EIT ICT Labs Master Programme Distributed System and Services (Cloud Computing) The programme in Distributed Systems and Services focuses on
More informationtrends in mobile malware and importance of network based user protection
trends in mobile malware and importance of network based user protection Sicherheitsnetzwerk München: Praxisforum Anwender und Anbieter im Dialog Mobile Sicherheit im Unternehmen Joachim Lüken, Nokia Networks,
More informationERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS
ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS Cyber Physical Systems Sicherheit für eine Welt im Wandel Harald Pötter RF & Smart Sensor Systems Cyber Physical Systems Sicherheit für eine Welt im Wandel Agenda
More informationOracle Whitepaper April 2015. Security and the Oracle Database Cloud Service
Oracle Whitepaper April 2015 Security and the Oracle Database Cloud Service Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database Cloud
More informationHow To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph
. Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/kredon@sec.t-labs.tu-berlin.de TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
More informationChallenges to an Integrated Cost Management during Early Phases of Product Development
Challenges to an Integrated Cost Management during Early Phases of Product Development Dr.-Ing. Markus Mörtl Lehrstuhl für Produktentwicklung / Institute of Product Development Technische Universität München
More informationUniversität Karlsruhe (TH)
Universität Karlsruhe (TH) Forschungsuniversität gegründet 1825 Working group meeting Software engineering for parallel systems Leipzig, Germany May 11, 2008 Dr. Victor Pankratius http://www.multicore-systems.org/separs
More informationSpoof Detection and the Common Criteria
Spoof Detection and the Common Criteria Ralph Breithaupt (BSI) Nils Tekampe (TÜViT) Content Today s situation The BSI projects LifeFinger I & II Spoofing The definition Spoof Detection in Common Criteria
More informationCeBIT 2016. NEW: Marketing & Sales Solutions. 14 18 March 2016 cebit.com
CeBIT 2016 NEW: Marketing & Sales Solutions 14 18 March 2016 cebit.com 2 CeBIT Global Event for Digital Business Digitization offers companies numerous new options for interacting with the customer. Big
More informationIntegration of Sustainable Approaches in the Building Design Process
Integration of Sustainable Approaches in the Building Design Process U. Forgber, N. Kohler, V. Koch, University of Karlsruhe Englerstrasse 7 76128 Karlsruhe, Germany F. Schmidt, R. Haller, University of
More informationNetwork Virtualization and Energy Efficiency
Network Virtualization and Energy Efficiency University of Passau Gergö Lovász, Andreas Fischer, and Hermann de Meer Outline 1. Power Consumption of ICT 2. Economic Principle and Energy Efficiency Benchmarks
More informationD1.3 Industry Advisory Board
Project acronym: Project full name: EDSA European Data Science Academy Grant agreement no: 643937 D1.3 Industry Advisory Board Deliverable Editor: Other contributors: Deliverable Reviewers: Mandy Costello
More informationSmart Factory Innovation Forum
Smart Factory Innovation Forum White Paper Managing security, safety and privacy in Smart Factories Based on a Panel Discussion during the Smart Factory Innovation Forum 2014 Held on September 25th, 2014
More informationROS-INDUSTRIAL. Technologies, Trends, Applications
FRAUNHOFER INSTITUTe FoR Manufacturing engineering and Automation IPA Conference June 9, 2015 ROS-INDUSTRIAL Technologies, Trends, Applications Preface The Event at a Glance Established already in robotics
More informationBeraterprofil. Prof. Dr. Frank H. Witt. Managementberater
Beraterprofil Prof. Dr. Frank H. Witt Managementberater Geschäftsgebiet International Project Management Business Development and Growth Strategy and Change Bilstein & Kollegen Partnerbüro Hong Kong c/o
More information1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2
Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität
More informationSmart Energy made in Germany
Smart Energy made in Germany How ICT makes the change happen Ludwig Karg, B.A.U.M., Head of E-Energy Ancillary Research www.bmwi.de Decisions made! 2 Key Challenges in Energy geothermal triangle of hope
More informationTowards Open Urban Platforms for Smart Cities and Communities. Memorandum of Understanding
Towards Open Urban Platforms for Smart Cities and Communities Memorandum of Understanding 1. Outline of this Memorandum 1.1. The market for current Urban Platform(s) is fragmented and uncertain on the
More informationA guide for enterprise-specific design of EA models
A guide for enterprise-specific design of EA models Master s Thesis Markus Bauer Kickoff Presentation sebis Advanced Seminar 2013-07-08 Set-Up Organizational issues Title Supervisor Advisors A guide for
More informationSECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH
SECURITY REDEFINED Managing risk and securing the business in the age of the third platform Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH 1 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF
More informationDeutsche Nachwuchswissenschaftler in den USA
Deutsche Nachwuchswissenschaftler in den USA Perspektiven der Hochschul- und Wissenschaftspolitik German Scientists in the United States: Results of the C R I S Online Survey Christoph F. Buechtemann und
More informationAdvantages of VoIP in the german research network
Advantages of VoIP in the german research network Falko Dressler Regional Computing Center (RRZE) / Department of Computer Science IV (Operating Systems) University of Erlangen-Nuremberg Martensstrasse
More informationFuture cybersecurity threats and research needs.
www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges
More informationAUTOMATION - AUTOMOTIVE - RENEWABLE ENERGIES
AUTOMATION - AUTOMOTIVE - RENEWABLE ENERGIES DUAL.solutions Action-based and media-supported Professional Training in different technical sectors Wolfgang Lay, General Manager, Dr.-Ing. Paul Christiani
More informationWindows HPC Server 2008 Deployment
Windows HPC Server 2008 Michael Wirtz wirtz@rz.rwth-aachen.de Rechen- und Kommunikationszentrum RWTH Aachen Windows-HPC 2008 19. Sept 08, RWTH Aachen Windows HPC Server 2008 - Agenda o eines 2 Knoten Clusters
More informationAdhesive bonding technology. Adhesive bonding in transportation construction. Intelligent solutions for transportation construction
Adhesive bonding technology Adhesive bonding in transportation construction Intelligent solutions for transportation construction Content New opportunities in 1 transportation construction Reliable bonding
More informationInternationalisation and Health Care Export S. von Bandemer University of Applied Sciences, Gelsenkirchen Institute Work and Technology, Science Park
Internationalisation and Health Care Export S. von Bandemer University of Applied Sciences, Gelsenkirchen Institute Work and Technology, Science Park Content Why Internationalisation? Why Health Care Export?
More informationBusiness Continuity Policy
Business Continuity Policy Software, consultancy and services for global trade and supply chain management Business Continuity Policy Companies using AEB solutions for managing and monitoring their logistics
More informationWorkshop Security of Mass Transportation
Workshop Security of Mass Transportation Deutsche Bahn AG Jens Puls 1 Chief Security Officer; President COLPOFER Berlin, 18 March 2009 Why can t the public transport system provide the same level of security
More informationWhat is Industrie 4.0
What is Industrie 4.0 Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2
More informationPrivacy and Security Assessment. Technical Security and Data Privacy in a Single Process.
Privacy and Security Assessment. Technical Security and Data Privacy in a Single Process. Deutsche Telekom AG Friedrich-Ebert-Allee 140 D-53113 Bonn www.telekom.com Contents. 2 Technical Security and Data
More informationMike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
More informationGERMAN UNIVERSITIES LIAISON OFFICES NEW YORK
GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK German University Alliance (FU Berlin / LMU München) ConRuhr (Dortmund/ Duisburg-Essen / Bochum) Universität Heidelberg RWTH Aachen UAS 7 Hessen Universities
More informatione-journal of Practical Business Research
e-journal of Practical Business Research Six Views on the Business Rule Management System Workshop summary paper: Business Rule based Service Management (Business-Rule-basierte Servicesteuerung) at Informatik
More informationA Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health Card Marcel Winandy (Ruhr-University Bochum) 3rd International ICST Conference on Electronic Healthcare for the 21st Century
More informationIntellectual Capital Management and Open Innovation
XXII Brazilian National Science Parks and Business Incubators Seminar XX ANPROTEC Workshop Intellectual Capital Management and Open Innovation Foz do Iguaçu, 19 th September 2012 Dr.-Ing. Markus Will Head
More informationBanker Malware Protection Test Report
Banker Malware Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: April 10 th,, last update: April 10 th, Executive Summary In March, AV-Test
More informationSmart Energy. CO 2 emission reduction through Telekom s M2M technology. Enno Borchers (M2M Competence Center, M2M Sales Development) April 2011
Smart Energy. CO 2 emission reduction through Telekom s M2M technology. Enno Borchers (M2M Competence Center, M2M Sales Development) April 2011 Deutsche Telekom AG. Group profile and figures. Company Products
More informationApplied and Integrated Security. C. Eckert
Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass
More informationTrack and Monitor Oracle Cloud Services
Oracle E-Book April 2015 Track and Monitor Oracle Cloud It Can t Be Easier Cloud Portal Track and Monitor Oracle Cloud It Can t Be Easier Copyright 2014 Oracle Corporation. All Rights Reserved. Monitoring
More informationCOSMOS events, activities and trainings in Austria, BM:UKK
This is a summary of events, activities and trainings in Austria. By: Jutta Jerlich, Elisabeth Zistler, Christian Reimers, Thomas Lebzelter The following summary is listed according to the date of the
More informationEducation standards in Intellectual Property Rights in German Speaking Countries
Sources of Competitive Advantages in the 21 st Century Conference of the World Economy Research Institute Warsaw School of Economics 4./5.6.2009 Education standards in Intellectual Property Rights in German
More informationInformation event «ehealth Suisse» and IHE Suisse
Information event «ehealth Suisse» and IHE Suisse Agenda 1. Benefit for the practitioner Franz Marty, Medizinisches Zentrum gleis d AG, Chur, Switzerland 2. Evolution and Functions Tony Schaller, medshare
More information