Universitat Kassel

Displaying 1-7 of 7 results

  • White Papers // Jun 2013

    Analysis of Security of Cloud Systems: Comparative Analysis of Security Features Between Amazon Web Services and Windows Azure

    Analysis of current research on Cloud Security demonstrates that main source of security concerns related to cloud link directly to its inherent multi-tenant nature. However, multi-tenancy is the essential enabler to achieve commercial benefit for Cloud providers, through economies of scale, which, by means of exploiting this characteristic together with...

    Provided By Universitat Kassel

  • White Papers // Feb 2013

    Improving Learning in a Database Course using Collaborative Learning Techniques

    In recent years, European universities have been adapting their curricula to the new European higher education area, which implies the use of active learning methodologies. In most database courses, project-based learning is the active methodology that is widely used, but the authors of this paper face context constraints against its...

    Provided By Universitat Kassel

  • White Papers // May 2012

    Towards Secure Mobile P2P Applications Using JXME

    Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating Peer-To-Peer...

    Provided By Universitat Kassel

  • White Papers // Jul 2011

    A Secure and Anonymous Cooperative Sensing Protocol for Cognitive Radio Networks

    Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority...

    Provided By Universitat Kassel

  • White Papers // Nov 2008

    Aggregating and Deploying Network Access Control Policies

    The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies - potentially easy to be evaded by unauthorized parties. The authors present in this paper a proposal to create, manage, and deploy consistent policies in...

    Provided By Universitat Kassel

  • White Papers // Nov 2008

    Management of Exceptions on Access Control Policies

    The use of languages based on positive or negative expressiveness is very common for the deployment of security policies (i.e., deployment of permissions and prohibitions on firewalls through singlehanded positive or negative condition attributes). Although these languages may allow one to specify any policy, the single use of positive or...

    Provided By Universitat Kassel

  • White Papers // Aug 2008

    Anonymous Resolution of DNS Queries

    The use of the DNS as the underlying technology of new resolution name services can lead to privacy violations. The exchange of data between servers and clients flows without protection. Such an information can be captured by service providers and eventually sold with malicious purposes (i.e., spamming, phishing, etc.). A...

    Provided By Universitat Kassel

  • White Papers // May 2012

    Towards Secure Mobile P2P Applications Using JXME

    Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating Peer-To-Peer...

    Provided By Universitat Kassel

  • White Papers // Jun 2013

    Analysis of Security of Cloud Systems: Comparative Analysis of Security Features Between Amazon Web Services and Windows Azure

    Analysis of current research on Cloud Security demonstrates that main source of security concerns related to cloud link directly to its inherent multi-tenant nature. However, multi-tenancy is the essential enabler to achieve commercial benefit for Cloud providers, through economies of scale, which, by means of exploiting this characteristic together with...

    Provided By Universitat Kassel

  • White Papers // Nov 2008

    Aggregating and Deploying Network Access Control Policies

    The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies - potentially easy to be evaded by unauthorized parties. The authors present in this paper a proposal to create, manage, and deploy consistent policies in...

    Provided By Universitat Kassel

  • White Papers // Nov 2008

    Management of Exceptions on Access Control Policies

    The use of languages based on positive or negative expressiveness is very common for the deployment of security policies (i.e., deployment of permissions and prohibitions on firewalls through singlehanded positive or negative condition attributes). Although these languages may allow one to specify any policy, the single use of positive or...

    Provided By Universitat Kassel

  • White Papers // Aug 2008

    Anonymous Resolution of DNS Queries

    The use of the DNS as the underlying technology of new resolution name services can lead to privacy violations. The exchange of data between servers and clients flows without protection. Such an information can be captured by service providers and eventually sold with malicious purposes (i.e., spamming, phishing, etc.). A...

    Provided By Universitat Kassel

  • White Papers // Jul 2011

    A Secure and Anonymous Cooperative Sensing Protocol for Cognitive Radio Networks

    Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority...

    Provided By Universitat Kassel

  • White Papers // Feb 2013

    Improving Learning in a Database Course using Collaborative Learning Techniques

    In recent years, European universities have been adapting their curricula to the new European higher education area, which implies the use of active learning methodologies. In most database courses, project-based learning is the active methodology that is widely used, but the authors of this paper face context constraints against its...

    Provided By Universitat Kassel