Options
Tauber, Markus
Loading...
Official Name
Tauber, Markus
Akademische Titel
Ehemaliger FH Mitarbeiter
Web Site
Scopus Author ID
37058207900
Status
exstaff
Research Outputs
Now showing 1 - 10 of 58
- PublicationSecurity Standard Compliance Verification in System of Systems(2022)
; ; ; ; Jerker Delsing27 - PublicationAnalysing Design Approaches for the Power Consumption in Cyber-Physical Systems(IEEE, 2021-06-30)
; ; ; ;Mauthe, AndreasGouglidis, AntoniosThe importance of Cyber Physical Systems (CPS) and Internet of Things (IoT) applications is constantly increasing, especially in the context of Industry 4.0. Architectural decisions are crucial not just for performance, security and resilience reasons but also regarding costs and resource usage. In this paper we analyse two of the fundamental approaches to design control loops (i.e. time-driven and event-driven), show how they can be realised and evaluate their power requirements. Through this the design criteria can be extended also considering the optimization of energy related aspects.156 1 - PublicationConnected cars — Threats, vulnerabilities and their impact(IEEE, 2018-05)
; ; ;Schmittner, Christoph; ; Delsing, JerkerThe growing demand for interoperability between system components within a connected car has led to new security challenges in automotive development. The existing components, based on established technology, are often being combined to form such a connected car. For such established technologies, individual, often sector specific threat and vulnerability catalogs exist. The aim of this paper is to identify blocks of established technologies in a connected car and to consolidate the corresponding threat and vulnerability catalogs relevant for the individual constituent components. These findings are used to estimate the impact on specific system components and subsystems to identify the most crucial components and threats.212 1Scopus© Citations 15 - PublicationApplication System Design - High Security(CRC Press, 2017)
;Aldrian, Andreas ;Priller, Peter ;Schmittner, Christoph ;Plosz, Sandor; ;Wagner, Christian ;Hein, Daniel ;Ebner, Thomas ;Maritsch, Martin ;Ruprechter, ThomasLesjak, Christian165 1 - PublicationAutonomic Management of Client Concurrency in a Distributed Storage Service(2011)
; ;Kirby, G. N. C.Dearle, A.142 1 - PublicationTowards Energy-Awareness in Managing Wireless LAN Applications(2012)
; ;Bhatti, S. N.Yu, Y.We have investigated the scope for enabling WLAN applications to manage the trade-off between performance and energy usage. We have conducted measurements of energy usage and performance in our 802.11n WLAN testbed, which operates in the 5 GHz ISM band. We have defined an effective energy usage envelope with respect to application-level packet transmission, and we demonstrate how performance as well as the effective energy usage envelope is effected by various configurations of IEEE 802.11n, including transmission power levels and channel width. Our findings show that the packet size and packet rate of the application flow have the greatest impact on application-level energy usage, compared to transmission power and channel width. As well as testing across a range of packet sizes and packet rates, we emulate a Skype flow, a YouTube flow and file transfers (HTTP over Internet and local server) to place our results in context. Based on our measurements we discuss approaches and potential improvements of management in effective energy usage for the tested applications.113 1Scopus© Citations 14 - PublicationA recommendation for suitable technologies for an indoor farming framework(Springer, 2020)
; ; ;Schmittner, Christoph; ;Christl, Korbinian ;Knapitsch, JohannesParapatits, MartinFacing food insecurity and overuse of resources due to effects of climate change, humanity needs to find new ways to secure food production and produce close to consumers. Vertical farming, where plants are grown in vertical arrays inside buildings with help of Information and Communication Technology (ICT) components, could contribute to solving this issue. Such systems integrate heterogeneous devices on different computing layers and acquire a lot of data to monitor and optimize the production process. We created an indoor testing unit in which growing conditions can be monitored and controlled to optimize growth of microgreens. This setup includes an Indoor Farming Support as a Service (IFSaaS) prototype that provides safe and secure monitoring and controlling, as well as self-adaption of an indoor farming system. In this article we provide information about the combination of most suitable technologies.600 37687Scopus© Citations 6 - PublicationTowards a Security Baseline for IaaS-Cloud Back-Ends in Industry 4.0(IEEE (UK), 2017-12)
; ; ; ; ; ; ;Wöhrer, AlexanderThe popularity of cloud based Infrastructure-as-a- Service (IaaS) solutions is becoming increasingly popular. However, since IaaS providers and customers interact in a flexible and scalable environment, security remains a serious concern. To handle such security issues, defining a set of security parameters in the service level agreements (SLA) between both, IaaS provider and customer, is of utmost importance. In this paper, the European Network and Information Security Agency (ENISA) guidelines are evaluated to extract a set of security parameters for IaaS. Furthermore, the level of applicability and implementation of this set is used to assess popular industrial and open-source IaaS cloud platforms, respectively VMware and OpenStack. Both platforms provide private clouds, used as backend infrastructures in Industry 4.0 application scenarios. The results serve as initial work to identify a security baseline and research needs for creating secure cloud environments for Industry 4.0.171Scopus© Citations 5 - PublicationTowards continuous Cloud Service Assurance for Critical Infrastructure IT(2014-08-27)
;Hudic, A. ;Mauthe, A. ;Caceres, S. ;Hecht, T.The momentum behind Cloud Computing has revolutionized how ICT services are provided, adopted and delivered. Features such as high scalability, fast provisioning, on demand resource availability makes it an attractive proposition for deploying complex and demanding systems. Clouds are also very suitable for deploying systems with unpredictable load patterns including Critical infrastructure services. Though, the major obstacle in hosting Critical infrastructures is often a lack of assurance. The transparency and flexibility offered by the Cloud, abstracts per definition over e.g. data placement, hardware, service migration. This makes it very hard to assure security properties. We present an investigation of assurance approaches, an analysis of their suitability for Critical Infrastructure Services being deployed in the Cloud and presents our approach.119 1Scopus© Citations 8