Research Outputs

2021 2021 2020 2020 2019 2019 2018 2018 2017 2017 2016 2016 2015 2015 2014 2014 2013 2013 2012 2012 0.0 0.0 1.0 1.0 2.0 2.0 3.0 3.0 4.0 4.0 5.0 5.0
Now showing 1 - 10 of 29
No Thumbnail Available
Publication

Towards Taxonomy based Software Security Standard and Tool Selection for Critical Infrastructure IT in the Cloud

2014, Paudel, S., Tauber, Markus, Brandic, I.

No Thumbnail Available
Publication

A Multi-Layer and Multi-Tenant Cloud Assurance Evaluation Methodology

2015, Hudic, A., Tauber, Markus, Loruenser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A., Weippl, E.

Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.

No Thumbnail Available
Publication

The Effect of the 802.11 Power Save Mechanism (PSM) on Energy Efficiency and Performance During System Activity

2012, Tauber, Markus, Bhatti, S. N.

802.11 WLAN is a popular choice for wireless access on a range of ICT devices. A growing concern is the increased energy usage of ICT, for reasons of cost and environmental protection. The Power Save Mode (PSM) in 802.11 deactivates the wireless network interface during periods of inactivity. However, applications increasingly use push models, and so devices may be active much of the time. We have investigated the effectiveness of PSM, and considered its impact on performance when a device is active. Rather than concentrate on the NIC, we have taken a system-wide approach, to gauge the impact of the PSM from an application perspective. We experimentally evaluated performance at the packet level and system-wide power usage under various offered loads, controlled by packet size and data rate, on our 802.11n test bed. We have measured the system-wide power consumption corresponding to the individual traffic profiles and have derived application-specific effective energy-usage. We have found that in our scenarios, no significant benefit can be gained from using PSM.

Loading...
Thumbnail Image
Publication

Towards Comparing Programming Paradigms

2017-12, Ivkić, Igor, Tauber, Markus, Wöhrer, Alexander

Rapid technological progress in computer sciences finds solutions and at the same time creates ever more complex requirements. Due to an evolving complexity today’s programming languages provide powerful frameworks which offer standard solutions for recurring tasks to assist the programmer and to avoid the re-invention of the wheel with so- called “out-of-the-box-features”. In this paper, we propose a way of comparing different programming paradigms on a theoretical, technical and practical level. Furthermore, the paper presents the results of an initial comparison of two representative programming approaches, both in the closed SAP environment.

No Thumbnail Available
Publication

Autonomic Management of Client Concurrency in a Distributed Storage Service

2011, Tauber, Markus, Kirby, G. N. C., Dearle, A.

No Thumbnail Available
Publication

Towards a Security-Aware Benchmarking Framework for Function-as-a-Service

2018, Pellegrini, Roland, Ivkić, Igor, Tauber, Markus

In a world, where complexity increases on a daily basis the Function-as-a-Service (FaaS) cloud model seams to take countermeasures. In comparison to other cloud models, the fast evolving FaaS increasingly abstracts the underlying infrastructure and refocuses on the application logic. This trend brings huge benefits in application and performance, but comes with difficulties for benchmarking cloud applications. In this position paper, we present an initial investigation of benchmarking FaaS in close to reality production systems. Furthermore, we outline the architectural design including the necessary benchmarking metrics. We also discuss the possibility of using the proposed framework for identifying security vulnerabilities.

No Thumbnail Available
Publication

Towards flexible and secure end-to-end communication in industry 4.0

2017, Maksuti, Silia, Bicaku, Ani, Tauber, Markus, Palkovits-Rauter, Silke, Haas, Sarah, Delsing, Jerker

The digital transformation of industrial production is driven by the advance of cyber-physical production systems (CPPS) within which raw materials, machines and operations are interconnected to form a sophisticated network. Making such systems self-adaptable is a priority concern for the future implementation of Industry 4.0 application scenarios. In this position paper, we design a meta-model and use it as a tool to describe an end-to-end communication use case from an ongoing research project. Based on this use case we develop a business process performance and security trade-off model, which shows that maximazing both parameters at the same time is not possible, thus an efficient balance between them has to be achieved. Motivated by the result, we propose self adaptation as a solution towards a flexible and secure end-to-end communication in Industry 4.0. To identify and document the self-adaptation points in a structured methodological and lightweight way we use the bespoken meta-model.

No Thumbnail Available
Publication

The Case for Heterogeneous WLAN Environments for Converged Networks

2013, Tauber, Markus, Bhatti, S. N., Melnikov, N., Schoenwaelder, J.

No Thumbnail Available
Publication

Establishing a Chain of Trust in a Sporadically Connected Cyber-Physical System

2021-05, Maksuti, Silia, Pickem, Michael, Zsilak, Mario, Stummer, Anna, Tauber, Markus, Wieschhoff, Marcus, Pirker, Dominic, Schmittner, Christoph, Delsing, Jerker

Drone based applications have progressed significantly in recent years across many industries, including agriculture. This paper proposes a sporadically connected cyber-physical system for assisting winemakers and minimizing the travel time to remote and poorly connected infrastructures. A set of representative diseases and conditions, which will be monitored by land-bound sensors in combination with multispectral images, is identified. To collect accurate data, a trustworthy and secured communication of the drone with the sensors and the base station should be established. We propose to use an Internet of Things framework for establishing a chain of trust by securely onboarding drones, sensors and base station, and providing self-adaptation support for the use case. Furthermore, we perform a security analysis of the use case for identifying potential threats and security controls that should be in place for mitigating them.

No Thumbnail Available
Publication

Smart industrial indoor farming - Technical and societal challenges

2019, Schmittner, Christoph, Christl, Korbinian, Macher, Georg, Knapitsch, Johannes, Parapatits, Martin, Tauber, Markus, Pichler, Harald, Gnauer, Clemens

Population growth and food development are two of the major challenges for society. While smart farming can help, available arable land is restricted. Smart industrial indoor farming has the potential to increase agricultural production while also reducing resources usage. To guarantee a reliable food supply, we need to ensure a dependable system, which protects not only the plants, but also the Intellectual property (IP). We give an overview about the challenges on agriculture, available indoor farming systems and standards for smart farming. We evaluate the standards for applicability towards indoor farming and present a use case for a smart industrial indoor farming system. To assure a dependable system, we present a methodology to analyze the system and achieve a trade-off between different dependability attributes.