Stephan Groß

Learn More
Cloud Computing, i. e. providing on-demand access to virtu-alised computing resources over the Internet, is one of the current mega-trends in IT. Today, there are already several providers offering cloud computing infrastructure (IaaS), platform (PaaS) and software (SaaS) services. Although the cloud computing paradigm promises both economical as well as(More)
Following Mark Weiser's vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at all. The gathering and disclosure of contextual information on the one hand enables the improvement of system behaviour towards a more autonomous and adaptive behaviour but on the other hand(More)
The recent development of the Internet, especially the expanding use of social software and dynamic content generation commonly termed as Web 2.0 enables users to find information about almost every possible topic on the Web. On the downside, it becomes more and more difficult to decide which information can be trusted in. In this paper we propose the(More)
Cloud computing services eliminate the need for local storage thereby lowering operational and maintenance costs. However, security and privacy concerns regarding the out-sourced data prevail. Especially in enterprise environments, sensitive internal and customer data accumulate, which are usually subject to strong legal regulations. Therefore, all the(More)
Tourists want to tell other people about their journeys and adventures. This is often done via social networks and digital photos. But what if one could tell other people about a great tour by sharing the tour itself with others than just photos or short messages?. In this paper, we present an intuitive authoring tool for gamebased city tours and a(More)
The development of the WPA and IEEE 802.11i standards have vastly improved the security of common wireless LAN setups. However, many installations still use the broken WEP protocol or even run with no security settings enabled. Furthermore, several threats are only partially addressed by the new security standards, e.g. rogue access points or denial of(More)
Virtualization and broadband Internet connections enabled what is known today under the term cloud. Benefits like scalability and cost reduction by pay per use agreements are accompanied by potential harm to the users data. Since existing cloud solutions can be considered synonymous with unknown locations and potentially hostile environments security(More)
Virtualization and broadband Internet connections enabled existing technologies to form up under the nebulous term cloud. Cloud computing promises near infinite scalability and cost reduction by pay per use agreements. However for data outsourced to existing cloud solutions - which can be considered synonymous with unknown locations and potentially hostile(More)