Entity

Time filter

Source Type


Gruschka N.,NEC Laboratories Europe | Iacono L.L.,European University of Applied Sciences
Proceedings of the 8th International Network Conference, INC 2010 | Year: 2010

When entering a password (or other secrets) the typed input is most commonly masked, i.e. the characters are hidden behind bullets or asterisks. This, however, complicates the input and highly decreases the user's confident causing several issues such as login failure attempts. On the other hand, password masking is an important security requirement for a lot of applications and contexts to prevent a third person to read the password. Thus, simply dropping password masking is not feasible in general. A common solution provides the user with the choice of toggling password masking on and off, but due to distinct defaults (in dependency of the application and context) this is rather complex and confusing. Enhanced password visualization technologies beyond the simple masking of passwords can provide more sophisticated solutions from both a usability and security perspective. In this paper, available password visualization technologies are presented and discussed. Furthermore a novel password visualization approach is introduced, the TransparentMask, which provides unique properties in comparison to the existing schemes. Amongst these are the ability to detect mistakes while typing and being able to localize and correct the typo within a certain range. Finally, a security analysis of the TransparentMask shows that the protection level given by a certain password length is slightly decreased in comparison to the fully masked approach. Source


Jensen M.,Ruhr University Bochum | Schwenk J.,Ruhr University Bochum | Bohli J.-M.,NEC Laboratories Europe | Gruschka N.,NEC Laboratories Europe | Iacono L.L.,European University of Applied Sciences
Proceedings - 2011 IEEE 4th International Conference on Cloud Computing, CLOUD 2011 | Year: 2011

Clouds impose new security challenges, which are amongst the biggest obstacles when considering the usage of cloud services. This triggered a lot of research activities in this direction, resulting in a quantity of proposals targeting the various security threats. Besides the security issues coming with the cloud paradigm, it can also provide a new set of unique features which open the path towards novel security approaches, techniques and architectures. This paper initiates this discussion by contributing a concept which achieves security merits by making use of multiple distinct clouds at the same time. © 2011 IEEE. Source


Oeser G.,European University of Applied Sciences | Romano P.,University of Udine
International Journal of Production Research | Year: 2015

The Square Root Law (SRL) is a popular formula for assessing inventory levels at varying numbers of warehouses. Its popularity is probably due to its simplicity and the ample opportunities for its application to the managerial dilemma of inventory centralisation vs. decentralisation. However, researchers disagree about which parts of inventory it can be applied to and its underlying assumptions. To address these questions, this study algebraically derives the assumptions necessary for the SRL to apply to regular, safety and total stock. Afterwards, the paper empirically examines to what extent these assumptions hold in practice by analysing four case studies and data from a sample of 280 German manufacturing and trading companies. Most companies do not fulfil the assumptions of the SRL and therefore cannot apply it with accurate results. Trading companies, however, seem to fulfil more assumptions than manufacturing ones, retailers more than wholesalers, industrial goods manufacturers more than consumer goods manufacturers. Although the SRL has traditionally been mainly considered for safety stock, companies, especially trading companies, appear to rather fulfil the assumptions for applying the SRL to cycle stock. Some assumptions seem to be complementary, whereas others appear to be competing, so that it is difficult to fulfil all of them. © 2015 Taylor & Francis Source


Gruschka N.,NEC Laboratories Europe | Iacono L.L.,European University of Applied Sciences
Proceedings - 8th IEEE European Conference on Web Services, ECOWS 2010 | Year: 2010

The W3C recommendation MTOM is the defacto standard for transferring binary data in SOAP protocol elements as attachments. The distinguished feature provided by MTOM is - compared to other SOAP attachment specifications - the efficient transfer of binary data without breaking the XML infoset. This property allows e.g. the application of XML Security mechanisms to the SOAP message including the attachment parts. The efficiency of SOAP processing, especially when SOAP messages include security primitives, is an active area of research. However, the work available on the efficient processing of secured SOAP attachments is sparse. This paper aims to close this gap and contributes a scheme to process secured MTOM attachments on the server-side in a streaming manner. The proposed approach is in conformance with the underlying standards and compatible with the major research and development activities in stream-based SOAP security processing. Evaluations based on a prototype implementation, show that the introduced scheme increases the performance by a factor of at least 2 and reduces the memory requirements for large attachments by a factor of approximately 20. © 2010 IEEE. Source


Gruschka N.,NEC Laboratories Europe | Iacono L.L.,European University of Applied Sciences
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2010

This paper introduces a complementary extension to XML data binding enabling the (selective) protection of structured objects and members. By this contribution, an object can be transformed into a secured object which contains encrypted and/or signed parts according to an assigned security policy. The serialization of secured objects results in XML data which is protected by standard XML security means. Thus, this approach introduces a data-oriented security mechanism which seamlessly integrates into XML data binding and therefore enables cross-platform (de)serialization of secured objects without the need of programming against a specific XML security API. Distinct entities in a distributed processing environment then operate transparently either on plain or secured instances of a class. © 2010 Springer-Verlag. Source

Discover hidden collaborations