Research Outputs

2022 2022 2021 2021 2020 2020 2019 2019 2018 2018 2017 2017 2016 2016 2015 2015 2014 2014 2013 2013 0.0 0.0 1.0 1.0 2.0 2.0 3.0 3.0 4.0 4.0 5.0 5.0 6.0 6.0
Now showing 1 - 10 of 20
No Thumbnail Available
Publication

Security Standard Compliance Verification in System of Systems

2022, Ani Bicaku, Mario Zsilak, Theiler, Peter, Markus Tauber, Jerker Delsing

Loading...
Thumbnail Image
Publication

Smart Municipality

2019-10, Wolfgeher, Jennifer, Zsilak, Mario, Tauber, Markus

No Thumbnail Available
Publication

A Security Cost Modelling Framework for Cyber-Physical Systems

2022-05, Ivkić, Igor, Sailer, Patrizia, Gouglidis, Antonios, Mauthe, Andreas, Tauber, Markus

Cyber-Physical Systems (CPS) are formed through interconnected components capable of computation, communication, sensing and changing the physical world. The development of these systems poses a significant challenge since they have to be designed in a way to ensure cyber-security without impacting their performance. This article presents the Security Cost Modelling Framework (SCMF) and shows supported by an experimental study how it can be used to measure, normalise and aggregate the overall performance of a CPS. Unlike previous studies, our approach uses different metrics to measure the overall performance of a CPS and provides a methodology for normalising the measurement results of different units to a common Cost Unit. Moreover, we show how the Security Costs can be extracted from the overall performance measurements which allows to quantify the overhead imposed by performing security-related tasks. Furthermore, we describe the architecture of our experimental testbed and demonstrate the applicability of SCMF in an experimental study. Our results show that measuring the overall performance and extracting the security costs using SCMF can serve as basis to redesign interactions to achieve the same overall goal at less costs.

No Thumbnail Available
Publication

Impact of Critical Infrastructure Requirements on Service Migration Guidelines to the Cloud

2015, Wagner, Christian, Hudic, Aleksandar, Maksuti, Silia, Tauber, Markus, Pallas, Frank

A high level of information security in critical infrastructure IT systems and services has to be preserved when migrating their IT services to the cloud. Often various legislative and security constraints have to be met in line with best practice guidelines and international standards to perform the migration. To support the critical infrastructure providers in migrating their services to the cloud we are developing a process based migration guideline for critical infrastructure providers focusing on information security. First of all we investigate, via questionnaires, how the importance of individual security topics covered in such guidelines differentiates between industry stakeholders and critical infrastructure providers. This supports the selection of relevant security topics and the considered guidelines and standards, which we survey in search for common relevant security topics. Subsequently we present the analysis of the above-mentioned security requirements and how they affect a here developed taxonomy for a process-based security guideline. Furthermore we present potential service migration use cases and how our methodology would affect the migration of secure critical infrastructure services.

No Thumbnail Available
Publication

A Framework for Measuring the Costs of Security at Runtime

2019, Ivkić, Igor, Pichler, Harald, Zsilak, Mario, Mauthe, Andreas, Tauber, Markus

In Industry 4.0, Cyber-Physical Systems (CPS) are formed by components, which are interconnected with each other over the Internet of Things (IoT). The resulting capabilities of sensing and affecting the physical world offer a vast range of opportunities, yet, at the same time pose new security challenges. To address these challenges there are various IoT Frameworks, which offer solutions for managing and controlling IoT-components and their interactions. In this regard, providing security for an interaction usually requires performing additional security-related tasks (e.g. authorisation, encryption, etc.) to prevent possible security risks. Research currently focuses more on designing and developing these frameworks and does not satisfactorily provide methodologies for evaluating the resulting costs of providing security. In this paper we propose an initial approach for measuring the resulting costs of providing security for interacting IoT-components by using a Security Cost Modell ing Framework. Furthermore, we describe the necessary building blocks of the framework and provide an experimental design showing how it could be used to measure security costs at runtime.

Loading...
Thumbnail Image
Publication

Enabling Security and Safety Evaluation in Industry 4.0 Use Cases with Digital Twins

2018-10, Tauber, Markus, Schmittner, Christoph

No Thumbnail Available
Publication

Function-as-a-Service Benchmarking Framework

2019, Pellegrini, Roland, Ivkić, Igor, Tauber, Markus

Cloud Service Providers deliver their products in form of ”as-a-Service”, which are typically categorized by the level of abstraction. This approach hides the implementation details and shows only functionality to the user. However, the problem is that it is hard to measure the performance of Cloud services, because they behave like black boxes. Especially with Function-as-a-Service it is even more difficult because it completely hides server and infrastructure management from users by design. Cloud Service Prodivers usually restrict the maximum size of code, memory and runtime of Cloud Functions. Nevertheless, users need clarification if more ressources are needed to deliver services in high quality. In this regard, we present the architectural design of a new Function-as-a-Service benchmarking tool, which allows users to evaluate the performance of Cloud Functions. Furthermore, the capabilities of the framework are tested on an isolated platform with a specific workload. The results show that users are able to get insights into Function-as-a-Service environments. This, in turn, allows users to identify factors which may slow down or speed up the performance of Cloud Functions.

Loading...
Thumbnail Image
Publication

Security Threats and Risk Analysis of an IoT Web Service for a Smart Vineyard

2018-04, Borrelli, Massimo, Coric, Vanes, Gnauer, Clemens, Wolfgeher, Jennifer, Tauber, Markus

Loading...
Thumbnail Image
Publication

A recommendation for suitable technologies for an indoor farming framework

2020, Gnauer, Clemens, Pichler, Harald, Schmittner, Christoph, Tauber, Markus, Christl, Korbinian, Knapitsch, Johannes, Parapatits, Martin

Facing food insecurity and overuse of resources due to effects of climate change, humanity needs to find new ways to secure food production and produce close to consumers. Vertical farming, where plants are grown in vertical arrays inside buildings with help of Information and Communication Technology (ICT) components, could contribute to solving this issue. Such systems integrate heterogeneous devices on different computing layers and acquire a lot of data to monitor and optimize the production process. We created an indoor testing unit in which growing conditions can be monitored and controlled to optimize growth of microgreens. This setup includes an Indoor Farming Support as a Service (IFSaaS) prototype that provides safe and secure monitoring and controlling, as well as self-adaption of an indoor farming system. In this article we provide information about the combination of most suitable technologies.

No Thumbnail Available
Publication

Security and legal Challenges in Cloud Computing and critical Infrastructure IT

2013, Tauber, Markus, Wagner, C., Pallas, F.