Options
Tauber, Markus
Loading...
Official Name
Tauber, Markus
Akademische Titel
Ehemaliger FH Mitarbeiter
Web Site
Scopus Author ID
37058207900
Status
exstaff
Research Outputs
Now showing 1 - 10 of 29
- PublicationTrustworthy Evidence Gathering Mechanism for Multilayer Cloud Compliance.(2014)
;Florian, M. ;Paudel, S.Cloud Computing allows the designing of systems which dynamically acquire compute resources. This makes it very suitable for Critical Infrastructures where unpredictable load due to human usage patterns are very likely. Especially in this domain legal compliance is a growing concern in general. Abstraction over multiple architectural cloud layers allows for individual layers being operated by different providers. This makes it hard to determine whether legal compliance is given. In this paper we motivate the research towards an Event Gathering Mechanism which is envisioned to allow the modelling of legal aspects in a multi layered cloud environment.92Scopus© Citations 6 - PublicationSelf-Adaptation Applied to Peer-Set Maintenance in Chord via a Generic Autonomic Management Framework(2010)
; ;Kirby, G. N. C.Dearle, A.94 - PublicationTowards Comparing Programming Paradigms(2017-12)
; ; Wöhrer, AlexanderRapid technological progress in computer sciences finds solutions and at the same time creates ever more complex requirements. Due to an evolving complexity today’s programming languages provide powerful frameworks which offer standard solutions for recurring tasks to assist the programmer and to avoid the re-invention of the wheel with so- called “out-of-the-box-features”. In this paper, we propose a way of comparing different programming paradigms on a theoretical, technical and practical level. Furthermore, the paper presents the results of an initial comparison of two representative programming approaches, both in the closed SAP environment.139 9Scopus© Citations 1 - PublicationA Multi-Layer and Multi-Tenant Cloud Assurance Evaluation Methodology(2015)
;Hudic, A.; ;Loruenser, T. ;Krotsiani, M. ;Spanoudakis, G. ;Mauthe, A.Weippl, E.Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.153Scopus© Citations 8 - PublicationTowards continuous Cloud Service Assurance for Critical Infrastructure IT(2014-08-27)
;Hudic, A. ;Mauthe, A. ;Caceres, S. ;Hecht, T.The momentum behind Cloud Computing has revolutionized how ICT services are provided, adopted and delivered. Features such as high scalability, fast provisioning, on demand resource availability makes it an attractive proposition for deploying complex and demanding systems. Clouds are also very suitable for deploying systems with unpredictable load patterns including Critical infrastructure services. Though, the major obstacle in hosting Critical infrastructures is often a lack of assurance. The transparency and flexibility offered by the Cloud, abstracts per definition over e.g. data placement, hardware, service migration. This makes it very hard to assure security properties. We present an investigation of assurance approaches, an analysis of their suitability for Critical Infrastructure Services being deployed in the Cloud and presents our approach.119Scopus© Citations 8 - PublicationLow RSSI in WLANs: Impact on Application-Level Performance(2013)
; Bhatti, S. N.107Scopus© Citations 12 - PublicationEstablishing a Chain of Trust in a Sporadically Connected Cyber-Physical System(IEEE, 2021-05)
; ; ; ;Stummer, Anna; ; ;Pirker, Dominic ;Schmittner, ChristophDelsing, JerkerDrone based applications have progressed significantly in recent years across many industries, including agriculture. This paper proposes a sporadically connected cyber-physical system for assisting winemakers and minimizing the travel time to remote and poorly connected infrastructures. A set of representative diseases and conditions, which will be monitored by land-bound sensors in combination with multispectral images, is identified. To collect accurate data, a trustworthy and secured communication of the drone with the sensors and the base station should be established. We propose to use an Internet of Things framework for establishing a chain of trust by securely onboarding drones, sensors and base station, and providing self-adaptation support for the use case. Furthermore, we perform a security analysis of the use case for identifying potential threats and security controls that should be in place for mitigating them.126 - PublicationApplication Level Energy and Performance Measurements in a Wireless LAN(2011)
; ;Bhatti, S. N.Yu, Y.We present an experimental evaluation of energy usage and performance in a wireless LAN cell based on a test bed using the 5 GHz ISM band for 802.11a and 802.11n. We have taken an application-level approach, by varying the packet size and transmission rate at the protocol level and evaluating energy usage across a range of application transmission rates using both large and small packet sizes. We have observed that both the application's transmission rate and the packet size have an impact on energy efficiency for transmission in our test bed. We also included in our experiments evaluation of the energy efficiency of emulations of YouTube and Skype flows, and a comparison with Ethernet transmissions.140Scopus© Citations 22 - PublicationSmart industrial indoor farming - Technical and societal challenges(Trauner, 2019)
;Schmittner, Christoph ;Christl, Korbinian ;Macher, Georg ;Knapitsch, Johannes ;Parapatits, Martin; ; Population growth and food development are two of the major challenges for society. While smart farming can help, available arable land is restricted. Smart industrial indoor farming has the potential to increase agricultural production while also reducing resources usage. To guarantee a reliable food supply, we need to ensure a dependable system, which protects not only the plants, but also the Intellectual property (IP). We give an overview about the challenges on agriculture, available indoor farming systems and standards for smart farming. We evaluate the standards for applicability towards indoor farming and present a use case for a smart industrial indoor farming system. To assure a dependable system, we present a methodology to analyze the system and achieve a trade-off between different dependability attributes.121
- «
- 1 (current)
- 2
- 3
- »