Refine
Year of publication
Document Type
- Conference Proceeding (608)
- Article (355)
- Other Publications (136)
- Part of a Book (135)
- Book (69)
- Doctoral Thesis (52)
- Working Paper (40)
- Report (12)
- Patent (4)
- Preprint (2)
Language
- English (745)
- German (667)
- Multiple languages (7)
Has Fulltext
- no (1419) (remove)
Keywords
- (Strict) sign-regularity (1)
- 360-degree coverage (1)
- 3D Extended Object Tracking (EOT) (2)
- 3D Skelett Wickeltechnik (1)
- 3D ship detection (1)
- 3D urban planning (1)
- AAL (3)
- ADAM (1)
- AHI (1)
- ASEAN (1)
Institute
- Fakultät Architektur und Gestaltung (14)
- Fakultät Bauingenieurwesen (27)
- Fakultät Elektrotechnik und Informationstechnik (11)
- Fakultät Informatik (62)
- Fakultät Maschinenbau (27)
- Fakultät Wirtschafts-, Kultur- und Rechtswissenschaften (66)
- Institut für Angewandte Forschung - IAF (71)
- Institut für Naturwissenschaften und Mathematik - INM (1)
- Institut für Optische Systeme - IOS (26)
- Institut für Strategische Innovation und Technologiemanagement - IST (58)
- Institut für Systemdynamik - ISD (90)
- Institut für Werkstoffsystemtechnik Konstanz - WIK (6)
- Institut für Werkstoffsystemtechnik Thurgau - WITg (31)
- Institut für angewandte Thermo- und Fluiddynamik - IATF (3)
- Institut für professionelles Schreiben - IPS (7)
- Konstanz Institut für Corporate Governance - KICG (44)
- Konstanzer Institut für Prozesssteuerung - KIPS (11)
We propose and apply a requirements engineering approach that focuses on security and privacy properties and takes into account various stakeholder interests. The proposed methodology facilitates the integration of security and privacy by design into the requirements engineering process. Thus, specific, detailed security and privacy requirements can be implemented from the very beginning of a software project. The method is applied to an exemplary application scenario in the logistics industry. The approach includes the application of threat and risk rating methodologies, a technique to derive technical requirements from legal texts, as well as a matching process to avoid duplication and accumulate all essential requirements.
Cyberspace: a world at war. Our privacy, freedom of speech, and with them the very foundations of democracy are under attack. In the virtual world frontiers are not set by nations or states, they are set by those, who control the flows of information. And control is, what everybody wants.
The Five Eyes are watching, storing, and evaluating every transmission. Internet corporations compete for our data and decide if, when, and how we gain access to that data and to their pretended free services. Search engines control what information we are allowed - or want - to consume. Network access providers and carriers are fighting for control of larger networks and for better ways to shape the traffic. Interest groups and copyright holders struggle to limit access to specific content. Network operators try to keep their networks and their data safe from outside - or inside - adversaries.
And users? Many of them just don’t care. Trust in concepts and techniques is implicit. Those who do care try to take back control of the Internet through privacy-preserving techniques.
This leads to an arms race between those who try to classify the traffic, and those who try to obfuscate it. But good or bad lies in the eye of the beholder, and one will find himself fighting on both sides.
Network Traffic Classification is an important tool for network security. It allows identification of malicious traffic and possible intruders, and can also optimize network usage. Network Traffic Obfuscation is required to protect transmissions of important data from unauthorized observers, to keep the information private. However, with security and privacy both crumbling under the grip of legal and illegal black hat crackers, we dare say that contemporary traffic classification and obfuscation techniques are fundamentally flawed. The underlying concepts cannot keep up with technological evolution. Their implementation is insufficient, inefficient and requires too much resources.
We provide (1) a unified view on the apparently opposed fields of traffic classification and obfuscation, their deficiencies and limitations, and how they can be improved. We show that (2) using multiple classification techniques, optimized for specific tasks improves overall resource requirements and subsequently increases classification speed. (3) Classification based on application domain behavior leads to more accurate information than trying to identify communication protocols. (4) Current approaches to identify signatures in packet content are slow and require much space or memory. Enhanced methods reduce these requirements and allow faster matching. (5) Simple and easy to implement obfuscation techniques allow circumvention of even sophisticated contemporary classification systems. (6) Trust and privacy can be increased by reducing communication to a required minimum and limit it to known and trustworthy communication partners.
Our techniques improve both security and privacy and can be applied efficiently on a large scale. It is but a small step in taking back the Web.
The IT unit is not the only provider of information technology (IT) used in business processes. Aiming for increased performance, many business workgroups autonomously implement IT resources not covered by their organizational IT service management. This is called shadow IT. Risks and inefficiencies associated with this phenomenon challenge organizations. Organizations need to decide how to deal with identified shadow IT and if the business or the IT unit should be responsible for corresponding tasks and components. This study proposes design principles for a method to control identified shadow IT following action design research in four organizational settings. The procedure results in an allocation of IT task responsibilities between the business workgroups and the IT unit following risk considerations and transaction cost economics, leading to an IT service governance. This contributes to governance research regarding adaptive and efficient arrangements with reduced risks for business-located IT activities.
In several organizations, business workgroups autonomously implement information technology (IT) outside the purview of the IT department. Shadow IT, evolving as a type of workaround from nontransparent and unapproved end-user computing (EUC), is a term used to refer to this phenomenon, which challenges norms relative to IT controllability. This report describes shadow IT based on case studies of three companies and investigates its management. In 62% of cases, companies decided to reengineer detected instances or reallocate related subtasks to their IT department. Considerations of risks and transaction cost economics with regard to specificity, uncertainty, and scope explain these actions and the resulting coordination of IT responsibilities between the business workgroups and IT departments. This turns shadow IT into controlled business-managed IT activities and enhances EUC management. The results contribute to the governance of IT task responsibilities and provide a way to formalize the role of workarounds in business workgroups.
Konventionelle, von Dieselmotoren angetriebene Radlader beeinträchtigen die Lebensqualität der Menschen in ihrer unmittelbaren Umgebung mit Lärm- und Schadstoffemissionen. Das vom BMBF geförderte Forschungsvorhaben "Emissionsarmer Elektroradlader" verfolgt das Ziel, die lokalen Emissionen von Radladern deutlich herabzusetzen und die Effizienz des Fahrzeugs zu steigern. Im Rahmen des Vorhabens wurde ein konventioneller Radlader auf elektrische Antriebe umgerüstet. Als Energiespeicher dient eine LiFeYPO4-Batterie, die für eine Betriebsdauer von vier Stunden ausgelegt ist. In ersten praktischen Untersuchungen wurde die Energiebilanz des Emissionsarmen Elektro-Radladers mit der des konventionellen Serienfahrzeugs verglichen. Dazu wurde ein modifizierter Y-Arbeitszyklus entworfen, der sich an den üblichen Arbeitsaufgaben des Radladers orientiert und sich durch eine hohe Reproduzierbarkeit auszeichnet. Für die vollständige Bewertung wird die komplette Kette der Energieumwandlung betrachtet, beginnend mit der Energie im Kraftstoff bzw. der dem Stromnetz entnommenen Energie, bis zur mechanischen Arbeit, die das Gerät verrichtet. Daraus lassen sich Rückschlüsse auf die unterschiedlichen CO2-Emissionen beider Fahrzeuge ableiten.
Pop-up Workshopreihe
(2020)