Learn More
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distributed administrators in various different capacities. A quorum may be necessary, or a veto may be possible for such a decision. In this paper we present two major contributions: We(More)
There are three major drawbacks of a centralized security administration in distributed systems: It creates a bottleneck for request handling, it tends to enforce homogeneous security structures in heterogeneous user groups and organizations, and it is a weak point in terms of security attacks, reliability, and fault tolerance. In this paper we introduce a(More)
While smart metering is a key technology for reaching a sustainable consumption of resources, smart buildings are on their way to provide ubiquitous home automation. These technologies combine to frame a smart metering ecosystem with corresponding services and business models introducing new security challenges including privacy protection. This paper(More)
In large organizations the administration of access privileges (such as the assignment of access rights to a user in a particular role) is handled cooperatively through distributed administrators in various different capacities. A quorum may be necessary, or a veto may be possible for such a decision. In this paper, we present two major contributions: We(More)
—The success of future NGN services depends on the ability to adapt and personalize service delivery according to the user's context as well as service and device capabilities. Person-alization includes not only respecting explicit user preferences, but also offering optimized multi-device communication. Flexible handling of multiple devices as well as(More)
Personalization of service delivery is an important means for the telecommunication industry of keeping their customers in spite of their market becoming more open to other players. Personalization involves using user-specific, dynamic information about communication activities, device capabilities, user context, and service availability for making(More)