Stephan Groß

Learn More
Cloud computing services eliminate the need for local storage thereby lowering operational and maintenance costs. However, security and privacy concerns regarding the out-sourced data prevail. Especially in enterprise environments, sensitive internal and customer data accumulate, which are usually subject to strong legal regulations. Therefore, all the(More)
Following Mark Weiser's vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at all. The gathering and disclosure of contextual information on the one hand enables the improvement of system behaviour towards a more autonomous and adaptive behaviour but on the other hand(More)
Virtualization and broadband Internet connections enabled existing technologies to form up under the nebulous term cloud. Cloud computing promises near infinite scalability and cost reduction by pay per use agreements. However for data outsourced to existing cloud solutions - which can be considered synonymous with unknown locations and potentially hostile(More)
Tourists want to tell other people about their journeys and adventures. This is often done via social networks and digital photos. But what if one could tell other people about a great tour by sharing the tour itself with others than just photos or short messages?. In this paper, we present an intuitive authoring tool for gamebased city tours and a(More)
The recent development of the Internet, especially the expanding use of social software and dynamic content generation commonly termed as Web 2.0 enables users to find information about almost every possible topic on the Web. On the downside, it becomes more and more difficult to decide which information can be trusted in. In this paper we propose the(More)
Virtualization and broadband Internet connections enabled what is known today under the term cloud. Benefits like scalability and cost reduction by pay per use agreements are accompanied by potential harm to the users data. Since existing cloud solutions can be considered synonymous with unknown locations and potentially hostile environments security(More)