Research Outputs

2021 2021 2020 2020 2019 2019 2018 2018 2017 2017 2016 2016 2015 2015 2014 2014 2013 2013 2012 2012 0.0 0.0 1.0 1.0 2.0 2.0 3.0 3.0 4.0 4.0 5.0 5.0
Now showing 1 - 10 of 29
  • Publication
    On the Cost of Cyber Security in Smart Business
    (IEEE (UK) - 12th International Conference for Internet Technology and Secured Transactions (ICITST-2017), 2017-12) ;
    Wolfauer, Stephan 
    ;
    Oberhofer, Thomas 
    ;
    In a world, as complex and constantly changing as ours cloud computing is a driving force for shaping the IT landscape and changing the way we do business. Current trends show a world of people, things and services all digitally interconnected via the Internet of Things (IoT). This applies in particular to an industrial environment where smart devices and intelligent services pave the way for smart factories and smart businesses. This paper investigates in a use case driven study the potential of making use of smart devices to enable direct, automated and voice-controlled smart businesses. Furthermore, the paper presents an initial investigation on methodologies for measuring costs of cyber security controls for cloud services.
      148Scopus© Citations 4
  • Publication
    Establishing a Chain of Trust in a Sporadically Connected Cyber-Physical System
    (IEEE, 2021-05) ; ; ;
    Stummer, Anna 
    ;
    ; ;
    Pirker, Dominic 
    ;
    Schmittner, Christoph 
    ;
    Delsing, Jerker 
    Drone based applications have progressed significantly in recent years across many industries, including agriculture. This paper proposes a sporadically connected cyber-physical system for assisting winemakers and minimizing the travel time to remote and poorly connected infrastructures. A set of representative diseases and conditions, which will be monitored by land-bound sensors in combination with multispectral images, is identified. To collect accurate data, a trustworthy and secured communication of the drone with the sensors and the base station should be established. We propose to use an Internet of Things framework for establishing a chain of trust by securely onboarding drones, sensors and base station, and providing self-adaptation support for the use case. Furthermore, we perform a security analysis of the use case for identifying potential threats and security controls that should be in place for mitigating them.
      126  1
  • Publication
    Towards Comparing Programming Paradigms
    (2017-12) ; ;
    Wöhrer, Alexander 
    Rapid technological progress in computer sciences finds solutions and at the same time creates ever more complex requirements. Due to an evolving complexity today’s programming languages provide powerful frameworks which offer standard solutions for recurring tasks to assist the programmer and to avoid the re-invention of the wheel with so- called “out-of-the-box-features”. In this paper, we propose a way of comparing different programming paradigms on a theoretical, technical and practical level. Furthermore, the paper presents the results of an initial comparison of two representative programming approaches, both in the closed SAP environment.
      141  360Scopus© Citations 1
  • Publication
    Towards a Security Baseline for IaaS-Cloud Back-Ends in Industry 4.0
    The popularity of cloud based Infrastructure-as-a- Service (IaaS) solutions is becoming increasingly popular. However, since IaaS providers and customers interact in a flexible and scalable environment, security remains a serious concern. To handle such security issues, defining a set of security parameters in the service level agreements (SLA) between both, IaaS provider and customer, is of utmost importance. In this paper, the European Network and Information Security Agency (ENISA) guidelines are evaluated to extract a set of security parameters for IaaS. Furthermore, the level of applicability and implementation of this set is used to assess popular industrial and open-source IaaS cloud platforms, respectively VMware and OpenStack. Both platforms provide private clouds, used as backend infrastructures in Industry 4.0 application scenarios. The results serve as initial work to identify a security baseline and research needs for creating secure cloud environments for Industry 4.0.
      171Scopus© Citations 5
  • Publication
    The Case for Heterogeneous WLAN Environments for Converged Networks
    (2013) ;
    Bhatti, S. N. 
    ;
    Melnikov, N. 
    ;
    Schoenwaelder, J. 
      105  1
  • Publication
    A Multi-Layer and Multi-Tenant Cloud Assurance Evaluation Methodology
    (2015)
    Hudic, A. 
    ;
    ;
    Loruenser, T. 
    ;
    Krotsiani, M. 
    ;
    Spanoudakis, G. 
    ;
    Mauthe, A. 
    ;
    Weippl, E. 
    Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.
      153  2Scopus© Citations 8
  • Publication
    Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework
    (IEEE, 2019-02) ; ;
    Settanni, Giuseppe 
    ;
    ;
    Delsing, Jerker 
    Manufacturing enterprises are constantly exploring new ways to improve their own production processes to address the increasing demand of customized production. However, such enterprises show a low degree of flexibility, which mainly results from the need to configure new production equipment at design and run time. In this paper we propose self-adaptation as an approach to improve data transmission flexibility in Industry 4.0 environments. We implement an autonomic manager using a generic autonomic management framework, which applies the most appropriate data transmission configuration based on security and business process related requirements, such as performance. The experimental evaluation is carried out in a MQTT infrastructure and the results show that using self-adaptation can significantly improve the trade-off between security and performance. We then propose to integrate anomaly detection methods as a solution to support self-adaptation by monitoring and learning the normal behavior of an industrial system and show how this can be used by the generic autonomic management framework.
      471  1Scopus© Citations 4
  • Publication
    Trustworthy Evidence Gathering Mechanism for Multilayer Cloud Compliance.
    (2014)
    Florian, M. 
    ;
    Paudel, S. 
    ;
    Cloud Computing allows the designing of systems which dynamically acquire compute resources. This makes it very suitable for Critical Infrastructures where unpredictable load due to human usage patterns are very likely. Especially in this domain legal compliance is a growing concern in general. Abstraction over multiple architectural cloud layers allows for individual layers being operated by different providers. This makes it hard to determine whether legal compliance is given. In this paper we motivate the research towards an Event Gathering Mechanism which is envisioned to allow the modelling of legal aspects in a multi layered cloud environment.
      92  1Scopus© Citations 6
  • Publication
      108  1Scopus© Citations 12