Options
Tauber, Markus
Loading...
Official Name
Tauber, Markus
Akademische Titel
Ehemaliger FH Mitarbeiter
Web Site
Scopus Author ID
37058207900
Status
exstaff
Research Outputs
Now showing 1 - 10 of 48
- PublicationTrustworthy Evidence Gathering Mechanism for Multilayer Cloud Compliance.(2014)
;Florian, M. ;Paudel, S.Cloud Computing allows the designing of systems which dynamically acquire compute resources. This makes it very suitable for Critical Infrastructures where unpredictable load due to human usage patterns are very likely. Especially in this domain legal compliance is a growing concern in general. Abstraction over multiple architectural cloud layers allows for individual layers being operated by different providers. This makes it hard to determine whether legal compliance is given. In this paper we motivate the research towards an Event Gathering Mechanism which is envisioned to allow the modelling of legal aspects in a multi layered cloud environment.92Scopus© Citations 6 - PublicationSelf-Adaptation Applied to Peer-Set Maintenance in Chord via a Generic Autonomic Management Framework(2010)
; ;Kirby, G. N. C.Dearle, A.94 - PublicationFunction-as-a-Service Benchmarking FrameworkCloud Service Providers deliver their products in form of ”as-a-Service”, which are typically categorized by the level of abstraction. This approach hides the implementation details and shows only functionality to the user. However, the problem is that it is hard to measure the performance of Cloud services, because they behave like black boxes. Especially with Function-as-a-Service it is even more difficult because it completely hides server and infrastructure management from users by design. Cloud Service Prodivers usually restrict the maximum size of code, memory and runtime of Cloud Functions. Nevertheless, users need clarification if more ressources are needed to deliver services in high quality. In this regard, we present the architectural design of a new Function-as-a-Service benchmarking tool, which allows users to evaluate the performance of Cloud Functions. Furthermore, the capabilities of the framework are tested on an isolated platform with a specific workload. The results show that users are able to get insights into Function-as-a-Service environments. This, in turn, allows users to identify factors which may slow down or speed up the performance of Cloud Functions.
509Scopus© Citations 1 - PublicationA Multi-Layer and Multi-Tenant Cloud Assurance Evaluation Methodology(2015)
;Hudic, A.; ;Loruenser, T. ;Krotsiani, M. ;Spanoudakis, G. ;Mauthe, A.Weippl, E.Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.153Scopus© Citations 8 - PublicationTowards continuous Cloud Service Assurance for Critical Infrastructure IT(2014-08-27)
;Hudic, A. ;Mauthe, A. ;Caceres, S. ;Hecht, T.The momentum behind Cloud Computing has revolutionized how ICT services are provided, adopted and delivered. Features such as high scalability, fast provisioning, on demand resource availability makes it an attractive proposition for deploying complex and demanding systems. Clouds are also very suitable for deploying systems with unpredictable load patterns including Critical infrastructure services. Though, the major obstacle in hosting Critical infrastructures is often a lack of assurance. The transparency and flexibility offered by the Cloud, abstracts per definition over e.g. data placement, hardware, service migration. This makes it very hard to assure security properties. We present an investigation of assurance approaches, an analysis of their suitability for Critical Infrastructure Services being deployed in the Cloud and presents our approach.119Scopus© Citations 8 - PublicationAssuring Resilience, Security and Privacy for Flexible Networked Systems and Organisations(Schloss Dagstuhl Leibniz-Zentrum für Informatik, 2015)
;Hutchison, David ;Nahrstedt, Klara ;Schöller, Marcus ;Spiecker gen. Döhmann, Indra142 - PublicationInteracting with the Arrowhead Local Cloud: On-boarding Procedure(IEEE, 2018-05)
; ; ;Hegedűs, Csaba; ;Delsing, JerkerEliasson, JensIndustrial automation systems are advancing rapidly and a wide range of standards, communication protocols and platforms supporting the integration of devices are introduced. It is therefore necessary to design and build appropriate tools and frameworks that allow the integration of devices with multiple systems and services. In this work we present the Arrow-head Framework, used to enable collaborative IoT automation and introduce two support core systems, SystemRegistry and DeviceRegistry, which are needed to create a chain of trust from a hardware device to a software system and its associated services. Furthermore, we propose an on-boarding procedure of a new device interacting with the Arrowhead local cloud. This ensures that only valid and authorized devices can host software systems within an Arrowhead local cloud.179Scopus© Citations 27