Currently Being Moderated

Applied Research: Security & Trust

The Applied Research Security & Trust team investigates solutions for the technical challenges imposed by securing open and adaptive business solutions. Our goals are to ensure security quality of software and services through systematic and rigorous engineering, to provide innovative solutions for the security challenges in business networks, and to act as a trusted security advisor for the company.
We are addressing six key research areas through various research projects:
  1. Security Engineering: addressing the rigorous application of state of the art research and best practice engineering skills in the development of new security solutions or supports secure development in general. 
  2. Security Technology: focusing on enabling technologies for secure business solutions: algorithms, protocols and services. 
  3. Security Economics: investigating economic principles with respect to the application and usage of security solutions in an enterprise context. 
  4. Secure Business Context: addressing the security requirements of business processes and objects as well as end-user operations. 
  5. Security Expert Work 
  6. Trusted Collaboration: addressing requirements and solutions in collaboration scenarios between partners from different trust domains.

Recent Blogs & Articles - 2012 -

Follow the blogs&articles of our researchers:
    Posted by Laurent Gomez
    Posted by Laurent Gomez
    Posted by Gabriel Serme
    Posted by Samuel Kaluvuri
    Posted by Mohammad Ashiqur Rahaman
    Posted by Mohammad Ashiqur Rahaman
    Posted by Theodoor Scholte
    Posted by Theodoor Scholte 
    Posted by Laurent Gomez
    Posted by Jakub Sendor
    Posted by Mohammad Ashiqur Rahaman

    Posted by Anderson Santana De Oliveira

Confidential data on your mobile - made simple 

    Posted by Cedric Hebert

Security Validation Research at SAP

    Posted by Luca  Compagna

Deploying Grails Applications on SAP NetWeaver Cloud with Maven

    Posted by Jakub Sendor

The first steps towards a marketplace with security-certified apps

    Posted by Antonino Sabetta

Hacker vs Timelord : a Solo fantasy gamebook - online ! 

    Posted by Cedric Hebert

Privacy Research: Secure XML Views with Access Control Policies and Semantic Reasoning

    Posted by Stuart Short

Possible requirements for privacy-enabled business process management

    Posted by Stuart Short

Trust enabled technologies in the Cloud

    Posted by Stuart Short
    Posted by Stuart Short
    Posted by Stuart Short

 

 

 

 

 

White Papers

Learn More

Research Projects & InitiativesArticles, Presentations, & VideosRelated Websites, Wikis, & Blogs

Comments

Delete Document

Are you sure you want to delete this document?

Actions