• Publications
  • Influence
An Overview of Data Quality Frameworks
TLDR
Data quality frameworks are surveyed in a comparative way regarding the definition, assessment, and improvement of data quality with a focus on methodologies that are applicable in a wide range of business environments to aid the decision process concerning the suitability of these methods.
Cryptography for Security and Privacy in Cloud Computing
TLDR
This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures.
Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory
TLDR
The main contribution of this paper is the demonstration of how simulation, physical understanding of an infrastructure, and theoretical methods can be combined toward a practical solution to the physical intrusion avoidance problem.
Defending Against Advanced Persistent Threats Using Game-Theory
TLDR
This work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense, and develops game-theoretic APT models that come with different properties than classical game theoretic models.
Application-level security for ROS-based applications
TLDR
This paper proposes a security architecture intended for use on top of ROS on the application level that uses a dedicated authorization server to ensure that only valid nodes are part of the application.
S-BPM Illustrated
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare
TLDR
This work generalizes the concept of redactable signatures towards documents that inherently provide a structure and investigates the security of the construction, and presents extensions to the scheme, adding features not commonly provided by otherredactable signature schemes.
How to protect privacy in floating car data systems
TLDR
This work presents a general method for anonymization of floating car data by deriving pseudonyms for trips and samples with the optional ability of relating samples to trips and trips to each other, whilst hiding the identity of a driver, hence protecting his privacy.
On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack
TLDR
It is proved insecurity of the cryptocomputer by taking the encryption as a black box, and showing how to decipher every signal in the computer by pure virtue of submitting proper instructions for execution.
...
...