Andreas Ruppen

Learn More
The Internet of Things (IoT) has grown in recent years to a huge branch of research: RFID, sensors and actuators as typical IoT devices are increasingly used as resources integrated into new value added applications of the Future Internet and are intelligently combined using standardised software services. While most of the current work on IoT integration(More)
The component "thing" of the Internet of Things does not yet exist in current business process modeling standards. The "thing" is the essential and central concept of the Internet of Things, and without its consideration we will not be able to model the business processes of the future, which will be able to measure or change states of objects in our(More)
The Web of Things research activities consist essentially in developing concepts, tools and systems for creating and operating global networks of devices associated with embedded resources-RFID tags, sensors, actuators and even complex computing facilities-, which are accessed by services. In that context, one of the most accepted standardization technique(More)
Model Driven Architectures are the holy grail of software engineering. Instead of writing code, developers draw models from the client's specification, which are then compiled into executable code (skeletons). We have taken this principle and applied it to the WoT. With the help of a meta-model tailored for the WoT we are able to build models to(More)
The vision of a multitude of heterogeneous, connected devices interacting with parts of its physical environment, known as the Internet of Things (IoT), has gained momentum over the last years. For traditional business information systems the integration of the IoT leads to the emergence of new value-added business processes that make use of its(More)
With the generalization of network-enabled devices such as smart phones, slate computers and tablets, new challenges await the eHealth research community. Indeed, these devices should not only integrate seamlessly into the daily workflow, but their usage must appear as ordinary as possible to the different caregivers. Using RESTful architectures, it is(More)
E-Commerce applications such as online shopping or e-banking are steadily gaining popularity in everyday life. Yet, many users are not aware of how to avoid the associated security problems: they don't choose secure passwords , check server certificates, or reliably react to browser warnings when a certificate can't be verified. Thus, protecting users from(More)
  • 1