SemCrypt Secure XML Processing in Outsourced Databases

Size: px
Start display at page:

Download "SemCrypt Secure XML Processing in Outsourced Databases"

Transcription

1 Institute für Wirtschaftsinformatik Nr / September 2008 SemCrypt Secure XML Processing in Outsourced Databases Katharina Grün Michael Karlinger Michael Schrefl Forschungsbericht Research Report 08.02

2 Vorbemerkung der Herausgeber / Editors preamble Die Forschungsberichte der Institute für Wirtschaftsinformatik dienen der Darstellung vorläufiger Ergebnisse z. B. Projektberichte und Zwischenergebnisse, die i. d. R. für spätere Veröffentlichungen überarbeitet werden. Die Autoren sind für kritische Hinweise dankbar. Alle Rechte vorbehalten. Research reports comprise preliminary results, e.g. project reports and intermediary results which will usually be revised for subsequent publications. Critical comments are appreciated by the authors. All rights reserved. Herausgeber / Editors o. Univ.-Prof. Dipl.-Ing. Dr. Gustav Pomberger, Institut für Wirtschaftsinformatik Software Engineering o. Univ.-Prof. Mag. Dr. Friedrich Roithmayr, Institut für Wirtschaftsinformatik Information Engineering o. Univ.-Prof. Dipl.-Ing. Dr. Michael Schrefl, Institut für Wirtschaftsinformatik Data & Knowledge Engineering o. Univ.-Prof. Dipl.-Ing. Dr. Christian Stary, Institut für Wirtschaftsinformatik Communications Engineering Autoren / Authors Mag. Katharina Grün gruen@dke.uni-linz.ac.at Mag. Michael Karlinger karlinger@dke.uni-linz.ac.at o. Univ.-Prof. Dr. Michael Schrefl schrefl@dke.uni-linz.ac.at Johannes Kepler Universität Linz Institut für Wirtschaftsinformatik - Data & Knowledge Engineering Altenberger Str. 69, A-4040 Linz, Austria

3 SemCrypt - Secure XML Processing in Outsourced Databases Katharina Grün Michael Karlinger Michael Schrefl Department of Business Informatics - Data & Knowledge Engineering Johannes Kepler University Linz, Austria {gruen, karlinger, schrefl}@dke.uni-linz.ac.at Abstract The increasing number and size of XML documents require efficient techniques for storing, querying and updating XML data. Current XML databases disregard privacy and security concerns when processing sensitive documents at external storage providers because they cannot prevent the untrustworthy storage provider from accessing either the content or the structure of the outsourced documents. At the external storage provider, SemCrypt 1 exclusively processes encrypted documents. Documents or document fragments are only decrypted at the client-side for authorized users. To query and update encrypted documents, the approach developed explores the structural semantics of the documents as well as special index structures. The SemCrypt database provides an administration tool that visualizes how data is stored and processed. 1 Introduction The trend to outsource data and the increasing need to process sensitive XML documents call for a secure processing model that ensures the privacy of stored documents without depending on service level agreements. Such a processing model grounds on a client-server architecture, where clients process data and the server acts as storage provider in an untrustworthy domain. All data processed at the storage provider is encrypted to protect it from being misused. Encryption and decryption for query and update processing are exclusively performed in the trusted domain of the client. In the secure processing model, querying and updating documents can basically be performed according to one of the following approaches: (i) encrypt 1 SemCrypt is a collaborative research project funded by FIT-IT, a programme initiative of the Austrian Federal Ministry of Transport, Innovation and Technology, with partners Johannes Kepler University Linz, Electronic Competence Center Vienna, and EC3 Networks GmbH. 1

4 whole documents or large document parts and transfer them between client and server for query and update processing [4], (ii) develop special encryption techniques for processing encrypted data directly at the server [1], (iii) exploit the structural semantics of documents and develop special storage and index structures. While approach (i) requires large amount of data to be transferred between client and server, approach (ii) cannot easily replace its encryption techniques when they are broken or better ones are available. Approach (iii) minimizes the amount of data transferred and works with off-the-shelf encryption techniques. SemCrypt [5] follows approach (iii) to efficiently query and update encrypted XML documents. This paper presents the main concepts that have been developed for SemCrypt. 1.1 Setup configurations To be adaptable to different application scenarios, SemCrypt s design allows for different configurations (cf. Figure 1.1), all of which rely on a potentially untrustworthy storage provider to store encrypted data. The storage provider is also responsible for backup, recovery and basic transaction control. Arbitrary DB Server Storage Provider Client SC Core / User App Arbitrary DB Server Storage Provider Client SC Core / User App Security Component store encrypted storage common access query processing encryption store encrypted storage common access query processing encryption authorization a) Single user configuration. b) Multi user configuration. Figure 1: Setup configurations of SemCrypt (SC). (a) Single user scenario: Each one of several single users has full access to exactly one encrypted store, where one storage provider may host several stores. A typical application scenario for this setting is a secure, remote document store where users manage their documents, e.g. insurance contracts, using a special purpose application. This application utilizes the SemCrypt Core for performing query and update processing as well as encryption/decryption within the trusted domain of the client. (b) Multi user scenario: Several users access the same documents from different, potentially insecure clients. Access authorization is delegated to a Security Component which en- and decrypts document fragments for authorized users. Alternatively, this security check could also be performed by specific 2

5 secure devices, such as powerful smart cards. A typical application scenario is to outsource the storage of records in e-government applications. 1.2 Challenges Designing a secure XML database system (DBS) poses several challenges. To ensure data privacy and prevent security risks as identified by Fong [2], the system must guarantee both storage and communication security. The physical storage structure must neither reveal the document content nor the document structure to the storage provider. To be widely applicable, the DBS should not depend on specific encryption techniques. Repeated encryption of the same plain text fragments or markups needs to result in different cipher texts in order to avoid statistic-based attacks. Regarding the client-server communication, repeated transmission of the same data has to be avoided, again in order to avoid statistic-based attacks. The DBS needs to support querying and updating of both the content and structure of documents, i.e. navigating within documents and constraining values and types. Finally, regarding the system s overall performance, the data volume to be transferred from the server for answering queries has to be minimized. 1.3 Achievements SemCrypt tackles these challenges as follows. The physical storage structure guarantees data privacy and security through encryption. To identify encrypted fragments, query and update processing techniques exploit the structural semantics of XML, i.e. schema information, which is captured by the document structure. Processing documents is based on a schema-aware labeling scheme [3] which not only allows to identify each node of a document by a unique node label, but also enables to execute many operations directly onto node labels without accessing encrypted data. To efficiently process queries that constrain node values, SemCrypt provides an index framework that supports indexing the content of arbitrary document fragments. Query processing is based on a query algebra enabling query optimization and index selection. Prior works on XML processing present isolated solutions for these problems, which cannot easily be combined due to conflicting assumptions. SemCrypt not only extends these techniques, but also integrates them into a multi-layered architecture. The layered structure of this architecture enables to use SemCrypt also as a conventional XML database by transferring the SemCrypt Core to the Storage Provider. 2 Architecture The architecture of the SemCrypt Core, depicted in Figure 2, integrates the various components and their data models and bridges the gap between the physical storage of encrypted data and its representation to end users. SemCrypt processes four kinds of primary data, namely schemas, documents, indices and 3

6 queries. Following database reference architectures, the processing of primary data occurs within different layers. The external layer represents data in a way familiar to end users, who e.g. formulate queries in terms of XPath. The Sem- Crypt Service takes user requests in their external representation, parses and dispatches them. Various database tasks, such as query optimization, cannot be efficiently performed on external primary data. The logical layer thus abstracts from external representations, while the internal layer incorporates special techniques to improve system performance. Within the logical and the internal layer, there is one specific component for each kind of primary data. At the physical layer, the Storage Engine provides access to the physical storage structures. These components and their data models are subsequently explained in more detail. All components create metadata, like names of available documents or schema information, and provide this metadata to other components. To manage metadata, SemCrypt follows the approach of using a separate database, encapsulated by the Metadata Manager. external SemCrypt Service logical internal Schema Manager Schema Engine Document Manager Document Engine Query Engine Execution Engine Index Manager Index Engine Metadata Manager physical Storage Engine network Storage Provider Figure 2: SemCrypt Architecture. 3 Concepts This section elaborates on the specific techniques developed for SemCrypt. To gain a better understanding of these techniques, we use a simplified example of managing insurance contracts within a secure, remote document store. Throughout the paper, the concepts are demonstrated by screen dumps taken from the prototype administration tool of SemCrypt (SCAdmin). 4

7 3.1 Physical storage To prevent security risks, SemCrypt uses the physical storage structure depicted in Figure 3. Data fragments are encrypted with a user defined standard encryption algorithm (E) and encryption key (K). The use of nonrecurring random numbers (nonce) prevents statistical analysis by encrypting same fragments differently in each communication with the Storage Provider. To identify encrypted fragments, each fragment has assigned a unique id, which encodes structural information about the fragment and is encrypted using a cryptographic hash function (H). In order to prevent frequency analysis, the Storage Engine caches frequently requested fragments. Figure 3: Storage view. Example 1 Figure 3 depicts sample terms of an insurance contract as encrypted fragment (top) and its unencrypted counterpart (bottom) when viewed in the SCAdmin tool. When the client requires a fragment to answer a query, it assembles its unique id, e.g based on metadata or partial query results and requests the fragment from the Storage Provider. 3.2 Schema processing Schema information, which in general can be extracted from XML schemas, DTDs or directly from XML documents, is primarily required for identifying encrypted document fragments and maintained by the Schema Manager. The Schema Engine builds a corresponding schema tree and encodes its paths and subtypes into schema labels, which are part of node labels and are exploited when processing queries and updates. Example 2 Figure 4 depicts the schema view of the SCAdmin tool when an XML Schema modeling insurance contracts is imported. The logical and internal representations of this XML Schema are depicted in the middle and bottom parts of Figure 4, respectively. Internally, for example, the path insurances/insurance is denoted by schema label 2. The two subtypes of insurances, life and car insurances, have assigned individual schema labels (3 and 4). 5

8 Figure 4: Schema view. 3.3 Document processing The Document Manager logically represents documents as trees of nodes, which the Document Engine internally identifies through node labels. The schemaaware, dynamic prefix labeling scheme of SemCrypt [3] not only allows to determine structural relationships between nodes, but also encodes schema labels, identifying paths and types. The Document Engine is further responsible for storing and updating content and structure of documents. It fragments documents to minimize the amount of data retrieved from the Storage Provider for query processing and it maintains a condensed representation of the document structure capturing the relationships between the fragments. Example 3 Figure 5 depicts the representations of a document in the SCAdmin tool when an insurance contract is uploaded. Node label

9 Figure 5: Document view. internally identifies the insurance contract of John Doe and consists of (i) the internal document id 1, (ii) the schema label 2 4 encoding the path 2 (insurances/insurance) and the subtype 4 (CarInsurance), and (iii) the instance label 1 denoting that this is the first insurance contract with respect to document order. 3.4 Index processing SemCrypt uses a special index framework to directly support queries on encrypted documents by adjusting secondary index structures to the query workload. The specific characteristic of this framework is that it allows indexing the content and structure of arbitrary document fragments. It provides indices for exact match, range queries and text retrieval as well as for hierarchical queries on the document structure and type hierarchies. While the Index Manager abstracts index definition and index selection from the index structures per se, the Index Engine maintains and traverses the indices and stores them via the Storage Engine using the same encrypted storage structure as used for documents. Example 4 Figure 6 shows how to define a hash index in the SemCrypt Query Language (SCQL). The index (i1) associates with each insurant name the node 7

10 Figure 6: Index view. labels of their contracts. The logical representation of an index corresponds to a logical query with variables. Internally, an index has the form of a tree pattern whose nodes contain schema labels and variables. Tree patterns are used for index selection and maintenance. 3.5 Query processing The Query Engine performs query optimization based on a logical query algebra, which represents each query as a graph of logical operators. The particularities of this algebra are (i) independence of specific query execution techniques and (ii) support for types, type hierarchies and XPath-like function calls. To select appropriate indices for executing queries, the Query Engine exploits schema information to match index definitions with logical query plans. The Execution Engine evaluates query plans compiled into an internal query algebra, which incorporates performance boosting techniques such as node labels, schema information and index structures. Example 5 Figure 7 depicts the query view of the SCAdmin tool when a query on the insurance terms of insurant Jane Doe is submitted. Based on the XPath query, a corresponding logical query plan is derived and optimized. The resulting internal query plan specifies to process the query as follows: (1) access the sample index with search condition Jane Doe to retrieve the label of the respective insurance contract in document 1, i.e. label ; (2) navigate from the retrieved contract to its terms by modifying its node label based on schema information, i.e. exchanging its schema label 2 to 8, and retrieve the encrypted fragment identified by the corresponding label The value of this fragment corresponds to the queried insurance terms. The XML fragment returned by this query is depicted at the very bottom of Figure 7. 8

11 Figure 7: Query view. 4 Summary Recapitulating, SemCrypt uses the following techniques to efficiently process outsourced XML documents without revealing their content or structure to the untrustworthy storage provider: (i) encrypt all data with a cryptographic hash function and an encryption algorithm, (ii) exploit schema information to identify encrypted fragments and perform query operations on labels instead of accessing encrypted data, (iii) define specific index structures based on the expected query workload, enabling to exactly retrieve the encrypted fragments needed to answer the queries. References [1] R. Brinkman, L. Feng, J. Doumen, P. Hartel, and W. Jonker. Efficient Tree Search in Encrypted Data. In Proc. 2nd Int. Workshop on Security In Information Systems, pages , [2] K. Fong. Potential Security Holes in Hacigümüs Scheme of Executing SQL over Encrypted Data. kfong/research/database.pdf. [3] K. Grün, M. Karlinger, and M. Schrefl. Schema-aware Labelling of XML Documents for Efficient Query and Update Processing in SemCrypt. Computer Systems Science and Engineering, 21(1):65,

12 [4] H. Hacigümüs, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over Encrypted Data in the Database-Service-Provider Model. In Proc ACM SIGMOD Int. Conf. on Management of Data, pages , [5] M. Schrefl, J. Dorn, and K. Grün. SemCrypt - Ensuring Privacy of Electronic Documents through Semantic-based Encrypted Query Processing. PDM 2005 International Workshop on Privacy Data Management, 8,

13 Bisher erschienene Institutsberichte (seit 1996) Nr / Februar 1996 P. Brandl, H. S. Huber: Diagnose der Informationsverarbeitung: Der DASIE- Benchmark Nr / Oktober 1996 M. Schrefl, G. Kappel, P. Lang: Modeling Collaborative Behavior Using Cooperation Contracts Nr / Dezember 1996 I. Wiesinger, B. Hemetsberger: Evaluierung von Managementunterstützungssystemen Nr / Januar 1997 P. Lang, W. Obermair, M. Schrefl: Modeling Business Rules with Situation/Activation Diagrams Nr / Februar 1997 P. Bichler, G. Preuner, M. Schrefl: Workflow Transparency Nr / Jänner 1998 A. Mittelmann: Organisationales Lernen und Geschäftsprozessmanagement Nr / Mai 1999 M. Gappmaier, J. Siller: Partizipative Interaktionsanalyse Videogestützte Methoden für ganzheitliches Geschäftsprozessmanagement Nr / Mai 1999 M. Gappmaier, H. Merl, V. Pilsl: Das Organisationsgesundheitsbild Nr / Mai 1999 M. Gappmaier, M. Ruzicka: Partizives Gestalten von Geschäftsprozessen mit der Bildkartengestaltungsmethode (BKM) Nr / September 1999 I. Häntschel, H. Schmidt: Methoden zur Ermittlung des Informationsbedarfs des Managements Nr / September 1999 I. Häntschel, W. Erhart: Ein Vorgehensmodell zur strategiegeleiteten Einführung von Managementunterstützungssystemen (VEM) Nr / März 2000 G. Preuner, S. Conrad, M. Schrefl: View Integration of Behavior in Object-oriented Databases Nr / März 2000 G. Preuner, S. Conrad: View Integration of Life-cycles in Object-oriented Design Nr / April 2000 M. Schrefl, M. Stumptner: Behavior Consistent Refinement of Object Life Cycles

14 Bisher erschienene Institutsberichte (seit 1996, Fortsetzung) Nr / April 2000 A. Felfernig, G. Friedrich, D. Jannach, M. Stumptner: An Integrated Development Environment for the Design and Maintenance of Large Configuration Knowledge Bases Nr / April 2001 T. Thalhammer, M. Schrefl, M. Mohania: Active Data Warehouses: Complementing OLAP with Active Rules Nr / April 2001 C. Thonabauer, L. J. Heinrich: Ein Messsystem zur Erfassung von Potenzial und Nutzung von E-Commerce / E-Business Nr / Mai 2002 M. Bernauer, M. Schrefl: Bringing Life into Self-Maintaining Web Pages Nr / September 2002 G. Preuner, M. Schrefl: Behavior-consistent Composition of Business Processes from Internal and External Services Nr / Mai 2003 T. Auinger: Wissensmanagement-Audit Nr / Juni 2003 S. Lechner, M. Schrefl: By-example schema transformers for supporting the process of conceptual web application modelling Nr / Jänner 2004 T. Auinger, M. Kobler: Laborstudie eine Evaluierung des Wissensmanagement- Audits Nr / April 2005 R. Riedl, M. Kobler, F. Roithmayr: An Action Model for Business Strategy Creation in IT-related SMEs Nr / August 2005 R. Riedl: Auswahl eines Application Service Providers: Analytic Hierarchy Process oder Nutzwertanalyse? Nr / August 2007 A. Bögl: pmodeler: Ein System zu semantischen Prozessmodellanalyse Nr / November 2007 M. Karlinger, M. Vincent, M. Schrefl: On the Definition and Axiomatization of Inclusion Dependencies for XML Nr / August 2008 K. Grün, M. Schrefl: Extensible Indexing in XML Databases

Extensible Indexing in XML Databases

Extensible Indexing in XML Databases Institute für Wirtschaftsinformatik Nr. 08.01 / August 2008 Extensible Indexing in XML Databases Katharina Grün Michael Schrefl Forschungsbericht Research Report 08.01 Vorbemerkung der Herausgeber / Editors

More information

Navigation Consistency in Web Site Families

Navigation Consistency in Web Site Families Institute für Wirtschaftsinformatik Nr. 09.04 / Oktober 2009 Navigation Consistency in Web Site Families Christian Eichinger Michael Schrefl Forschungsbericht Research Report 09.04 Vorbemerkung der Herausgeber

More information

Comparison Criteria for Ontological Multi-Level Modeling

Comparison Criteria for Ontological Multi-Level Modeling Institute für Wirtschaftsinformatik Nr. 08.03 / November 2008 Comparison Criteria for Ontological Multi-Level Modeling Presented at Dagstuhl-Seminar on The Evolution of Conceptual Modeling Bernd Neumayr

More information

Multi-models: New potentials for the combined use of planning and controlling information

Multi-models: New potentials for the combined use of planning and controlling information M.Sc. Sven-Eric Schapke, Institut für Bauinformatik, Technische Universität Dresden Dr.-Ing. Christoph Pflug, Max Bögl Multi-models: New potentials for the combined use of planning and controlling information

More information

XML-based EIS A Meta Schema for Mapping XML Schema to Relational DBS

XML-based EIS A Meta Schema for Mapping XML Schema to Relational DBS XML-based EIS A Meta Schema for Mapping XML Schema to Relational DBS Elisabeth Kapsammer Information Systems Group (IFS), Department of Bioinformatics Johannes Kepler University Linz, Austria ek@ifs.uni-linz.ac.at

More information

STATUS UPDATE ON THE INTEGRATION OF SEE-GRID INTO G- SDAM AND FURTHER IMPLEMENTATION SPECIFIC TOPICS

STATUS UPDATE ON THE INTEGRATION OF SEE-GRID INTO G- SDAM AND FURTHER IMPLEMENTATION SPECIFIC TOPICS AUSTRIAN GRID STATUS UPDATE ON THE INTEGRATION OF SEE-GRID INTO G- SDAM AND FURTHER IMPLEMENTATION SPECIFIC TOPICS Document Identifier: Status: Workpackage: Partner(s): Lead Partner: WP Leaders: AG-DM-4aA-1c-1-2006_v1.doc

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

FedDW Global Schema Architect

FedDW Global Schema Architect UML based Design Tool for the Integration of Data Mart Schemas Dr. Stefan Berger Department of Business Informatics Data & Knowledge Engineering Johannes Kepler University Linz ACM 15 th DOLAP 12 November

More information

Synthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures

Synthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures Synthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures Dietmar Schreiner 1,2 and Karl M. Göschka 1 1 Vienna University of Technology Institute of Information

More information

A Generic Framework for Realizing Semantic Model Differencing Operators

A Generic Framework for Realizing Semantic Model Differencing Operators A Generic Framework for Realizing Semantic Model Differencing Operators Philip Langer, Tanja Mayerhofer, and Gerti Kappel Business Informatics Group, Vienna University of Technology, Vienna, Austria {langer,mayerhofer,gerti}@big.tuwien.ac.at

More information

Automated Visualization Support for Linked Research Data

Automated Visualization Support for Linked Research Data Automated Visualization Support for Linked Research Data Belgin Mutlu 1, Patrick Hoefler 1, Vedran Sabol 1, Gerwald Tschinkel 1, and Michael Granitzer 2 1 Know-Center, Graz, Austria 2 University of Passau,

More information

Cyber Security. Activities of an national insurance association based on the example of VVO

Cyber Security. Activities of an national insurance association based on the example of VVO Cyber Security Activities of an national insurance association based on the example of VVO Michael Brandstetter EU and International Affairs Austrian Insurance Association (VVO) IIF Insurance in the Digital

More information

CONCEPTUAL DESIGN EHANCEMENT OF A DESIGN ASSISTANT SYSTEM FOR LIGHTWEIGHT STRUCTURES

CONCEPTUAL DESIGN EHANCEMENT OF A DESIGN ASSISTANT SYSTEM FOR LIGHTWEIGHT STRUCTURES INTERNATIONAL DESIGN CONFERENCE - DESIGN 2004 Dubrovnik, May 18-21, 2004. CONCEPTUAL DESIGN EHANCEMENT OF A DESIGN ASSISTANT SYSTEM FOR LIGHTWEIGHT STRUCTURES C. Hauck and H. Meerkamm Keywords: early stages

More information

Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation

Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation PRESENTATION TITLE GOES HERE January 28, 206 SNIA Presenters Alex McDonald Chair - SNIA Cloud Storage NetApp Martin Rosner

More information

How to Automatically Unterstand and Integrate System-models and how SpecIF can help.

How to Automatically Unterstand and Integrate System-models and how SpecIF can help. Working How to Automatically Unterstand and Integrate System-models and how SpecIF can help. Oskar von Dungern, Dr.-Ing., adesso AG 2 Topics Today 1. The idea behind model integration and SpecIF Purpose

More information

Innovations in V6.5 Consolidation

Innovations in V6.5 Consolidation Innovations in V6.5 Consolidation 2013-07-15 2013 APIS IT GmbH IQ Software Update Tutorial Excerpt: Consolidation 1 Copyright / authors: Version: July 01, 2013 Authors: Training team of APIS Informationstechnologien

More information

Course 40045A: Microsoft SQL Server for Oracle DBAs

Course 40045A: Microsoft SQL Server for Oracle DBAs Skip to main content Course 40045A: Microsoft SQL Server for Oracle DBAs - Course details Course Outline Module 1: Database and Instance This module provides an understanding of the two major components

More information

National Identity Exchange Federation. Terminology Reference. Version 1.0

National Identity Exchange Federation. Terminology Reference. Version 1.0 National Identity Exchange Federation Terminology Reference Version 1.0 August 18, 2014 Table of Contents 1. INTRODUCTION AND PURPOSE... 2 2. REFERENCES... 2 3. BASIC NIEF TERMS AND DEFINITIONS... 5 4.

More information

Outlook-Based Concept for the Population and Updating of a Meta-Information System in Environmental Administration

Outlook-Based Concept for the Population and Updating of a Meta-Information System in Environmental Administration Outlook-Based Concept for the Population and Updating of a Meta-Information System in Environmental Administration P. Fischer-Stabel a, R. Krieger a and E.Rietzke b a Umwelt-Campus, University of Applied

More information

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions Johannes Loinig 1, Christian Steger 1, Reinhold Weiss 1, and Ernst Haselsteiner

More information

An ECA Engine for Deploying Heterogeneous Component Languages in the Semantic Web

An ECA Engine for Deploying Heterogeneous Component Languages in the Semantic Web An ECA Engine for Deploying Heterogeneous Component s in the Semantic Web Erik Behrends, Oliver Fritzen, Wolfgang May, and Daniel Schubert Institut für Informatik, Universität Göttingen, {behrends fritzen

More information

Titelmasterformat durch Klicken bearbeiten Formatvorlage des Untertitelmasters durch Klicken bearbeiten

Titelmasterformat durch Klicken bearbeiten Formatvorlage des Untertitelmasters durch Klicken bearbeiten COmmunication Network VEhicle Road Global Extension Proposal for a Car2X Systems Network CONVERGE Project presentation Titelmasterformat durch Klicken bearbeiten Formatvorlage des Untertitelmasters durch

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

Analytics: Server Architect (Siebel 7.7)

Analytics: Server Architect (Siebel 7.7) Analytics: Server Architect (Siebel 7.7) Student Guide June 2005 Part # 10PO2-ASAS-07710 D44608GC10 Edition 1.0 D44917 Copyright 2005, 2006, Oracle. All rights reserved. Disclaimer This document contains

More information

A Framework for Processing Complex Document-centric XML with Overlapping Structures Ionut E. Iacob and Alex Dekhtyar

A Framework for Processing Complex Document-centric XML with Overlapping Structures Ionut E. Iacob and Alex Dekhtyar A Framework for Processing Complex Document-centric XML with Overlapping Structures Ionut E. Iacob and Alex Dekhtyar ABSTRACT Management of multihierarchical XML encodings has attracted attention of a

More information

Lecture Embedded System Security Introduction to Trusted Computing

Lecture Embedded System Security Introduction to Trusted Computing 1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2015 Roadmap: Trusted Computing Motivation Notion of trust

More information

Oracle Database 18c and Autonomous Database

Oracle Database 18c and Autonomous Database Oracle Database 18c and Autonomous Database Maria Colgan Oracle Database Product Management March 2018 @SQLMaria Safe Harbor Statement The following is intended to outline our general product direction.

More information

Trustworthy user authentication, authorization, data integrity AND consent management

Trustworthy user authentication, authorization, data integrity AND consent management RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY

More information

Overview of the Multi-Payer Claims Database (MPCD)

Overview of the Multi-Payer Claims Database (MPCD) Overview of the Multi-Payer Claims Database (MPCD) Genesis of the MPCD The MPCD project is one of a number of initiatives related to comparative effectiveness research (CER) funded by the American Recovery

More information

Attribute-based encryption with encryption and decryption outsourcing

Attribute-based encryption with encryption and decryption outsourcing Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing

More information

Towards a Theory of Genericity Based on Government and Binding

Towards a Theory of Genericity Based on Government and Binding Towards a Theory of Based on Government and Binding ER 2006 Tucson Alexander Bienemann, Klaus-Dieter Schewe, Bernhard Thalheim Ariva.de Kiel & Massey University & Kiel University Our main contributions

More information

Managing Data Resources

Managing Data Resources Chapter 7 Managing Data Resources 7.1 2006 by Prentice Hall OBJECTIVES Describe basic file organization concepts and the problems of managing data resources in a traditional file environment Describe how

More information

Static Dynamic Integration of External Services into Generic Business Processes

Static Dynamic Integration of External Services into Generic Business Processes Static Dynamic Integration of External Services into Generic Business Processes Günter Preuner 1, Christian Eichinger 1, Michael Schrefl 2 1 Institut für Wirtschaftsinformatik Data & Knowledge Engineering,

More information

GATE: Big Data for Smart Society Dessislava Petrova-Antonova Sofia University St. Kliment Ohridski Faculty of Mathematics and Informatics

GATE: Big Data for Smart Society Dessislava Petrova-Antonova Sofia University St. Kliment Ohridski Faculty of Mathematics and Informatics GATE: Big Data for Smart Society Dessislava Petrova-Antonova Sofia University St. Kliment Ohridski Faculty of Mathematics and Informatics Johann Wolfgang von Goethe Big Data provides the pipes, and AI

More information

Web Portal : Complete ontology and portal

Web Portal : Complete ontology and portal Web Portal : Complete ontology and portal Mustafa Jarrar, Ben Majer, Robert Meersman, Peter Spyns VUB STARLab, Pleinlaan 2 1050 Brussel {Ben.Majer,Mjarrar,Robert.Meersman,Peter.Spyns}@vub.ac.be, www.starlab.vub.ac.be

More information

Trends in Database Research

Trends in Database Research Trends in Database Research Mukesh Mohania 1, Yahiko Kambayashi 2, A. Min Tjoa 3, Roland Wagner 4, and Ladjel Bellatreche 5 1 Dept of Computer Science, Western Michigan University, Kalamazoo, MI 49008,

More information

Categorization and Recognition of Ontology Refactoring Pattern

Categorization and Recognition of Ontology Refactoring Pattern Categorization and Recognition of Ontology Refactoring Pattern Gerd Gröner Steffen Staab Nr. 9/2010 Arbeitsberichte aus dem Fachbereich Informatik Die Arbeitsberichte aus dem Fachbereich Informatik dienen

More information

Lecture Embedded System Security Introduction to Trusted Computing

Lecture Embedded System Security Introduction to Trusted Computing 1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2012 Roadmap: Trusted Computing Motivation Notion of trust

More information

Data Partnerships to Improve Health Frequently Asked Questions. Glossary...9

Data Partnerships to Improve Health Frequently Asked Questions. Glossary...9 FAQ s Data Partnerships to Improve Health Frequently Asked Questions BENEFITS OF PARTICIPATING... 1 USING THE NETWORK.... 2 SECURING THE DATA AND NETWORK.... 3 PROTECTING PRIVACY.... 4 CREATING METADATA...

More information

A NOVEL APPROACH FOR DATA HIDING IN PLAIN FILE

A NOVEL APPROACH FOR DATA HIDING IN PLAIN FILE A NOVEL APPROACH FOR DATA HIDING IN PLAIN FILE Phillipe Shasha National University College, Singapore ABSTRACT: * Imagine that you have been entrusted with private data, such as corporate product information,

More information

An approach to the model-based fragmentation and relational storage of XML-documents

An approach to the model-based fragmentation and relational storage of XML-documents An approach to the model-based fragmentation and relational storage of XML-documents Christian Süß Fakultät für Mathematik und Informatik, Universität Passau, D-94030 Passau, Germany Abstract A flexible

More information

Common Language Resources and Technology Infrastructure REVISED WEBSITE

Common Language Resources and Technology Infrastructure REVISED WEBSITE REVISED WEBSITE Responsible: Dan Cristea Contributing Partners: UAIC, FFGZ, DFKI, UIB/Unifob The ultimate objective of CLARIN is to create a European federation of existing digital repositories that include

More information

Improving Adaptive Hypermedia by Adding Semantics

Improving Adaptive Hypermedia by Adding Semantics Improving Adaptive Hypermedia by Adding Semantics Anton ANDREJKO Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovak republic andrejko@fiit.stuba.sk

More information

Visual Intranet Interfaces and Architecture of Unified Information Space in the Concept of Virtual University at ZSU

Visual Intranet Interfaces and Architecture of Unified Information Space in the Concept of Virtual University at ZSU Visual Intranet Interfaces and Architecture of Unified Information Space in the Concept of Virtual University at ZSU Vadim A. Ermolayev Zaporozhye State University, 66, Zhukovskogo st., 330600, Zaporozhye,

More information

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN 2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen

More information

Mensch-Maschine-Interaktion 1

Mensch-Maschine-Interaktion 1 1 Mensch-Maschine-Interaktion 1 Chapter 10 (July 21st, 2011, 9am-12pm): User-Centered Development Process Overview Introduction Basic HCI Principles (1) Basic HCI Principles (2) User Research & Requirements

More information

OLAP Introduction and Overview

OLAP Introduction and Overview 1 CHAPTER 1 OLAP Introduction and Overview What Is OLAP? 1 Data Storage and Access 1 Benefits of OLAP 2 What Is a Cube? 2 Understanding the Cube Structure 3 What Is SAS OLAP Server? 3 About Cube Metadata

More information

... Chair of Mobile Business & Multilateral Security. Lecture 11 Business Informatics 2 (PWIN)

... Chair of Mobile Business & Multilateral Security. Lecture 11 Business Informatics 2 (PWIN) Lecture 11 Business Informatics 2 (PWIN) Database Management I Databases & Dataoriented Modelling WS 2015/16 Prof. Dr. Kai Rannenberg www.m-chair.de Chair of Mobile Business & Multilateral Security Jenser

More information

Security Considerations in M2M Communications

Security Considerations in M2M Communications Security Considerations in M2M Communications Applied Research Issues & Projects in the Austrian Institute of Technology (AIT) Dr. Markus Tauber Project Manager, ICT Security, Future Networks and Services,

More information

Fit für die MATLAB EXPO

Fit für die MATLAB EXPO Fit für die MATLAB EXPO Eine kurze Einführung in MATLAB Michael Glaßer 2015 The MathWorks, Inc. 1 Hinweise für Betrachter der PDF Version Die Folien sind eher eine unterstützende Zusammenfassung Der Vortrag

More information

I. Khalil Ibrahim, V. Dignum, W. Winiwarter, E. Weippl, Logic Based Approach to Semantic Query Transformation for Knowledge Management Applications,

I. Khalil Ibrahim, V. Dignum, W. Winiwarter, E. Weippl, Logic Based Approach to Semantic Query Transformation for Knowledge Management Applications, I. Khalil Ibrahim, V. Dignum, W. Winiwarter, E. Weippl, Logic Based Approach to Semantic Query Transformation for Knowledge Management Applications, Proc. of the International Conference on Knowledge Management

More information

Information Technology Engineers Examination. Database Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for

Information Technology Engineers Examination. Database Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for Information Technology Engineers Examination Database Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 3.1

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Fundamentals of. Database Systems. Shamkant B. Navathe. College of Computing Georgia Institute of Technology PEARSON.

Fundamentals of. Database Systems. Shamkant B. Navathe. College of Computing Georgia Institute of Technology PEARSON. Fundamentals of Database Systems 5th Edition Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington Shamkant B. Navathe College of Computing Georgia Institute

More information

51. IWK Internationales Wissenschaftliches Kolloquium International Scientific Colloquium

51. IWK Internationales Wissenschaftliches Kolloquium International Scientific Colloquium 51. IWK Internationales Wissenschaftliches Kolloquium International Scientific Colloquium PROCEEDINGS 11-15 September 2006 FACULTY OF ELECTRICAL ENGINEERING AND INFORMATION SCIENCE INFORMATION TECHNOLOGY

More information

Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard

Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.6 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's

More information

Using XML Learning Objects Current and Future Benefits for Web Based Training Scenarios

Using XML Learning Objects Current and Future Benefits for Web Based Training Scenarios Using XML Learning Objects Current and Future Benefits for Web Based Training Scenarios Maik Stührenberg Applied and Computational Linguistics Group Justus-Liebig-Universität Gießen maik.stuehrenberg@uni-giessen.de

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of

More information

OASIS Standards Development Supporting Identity Management, Privacy and Trust in Cloud Computing Services

OASIS Standards Development Supporting Identity Management, Privacy and Trust in Cloud Computing Services OASIS Standards Development Supporting Identity Management, Privacy and Trust in Cloud Computing Services John Sabo Director, Global Government Relations Chair, OASIS IDtrust Member Section Steering Committee

More information

Government of Ontario IT Standard (GO ITS)

Government of Ontario IT Standard (GO ITS) Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.5 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's

More information

Models in Conflict Towards a Semantically Enhanced Version Control System for Models

Models in Conflict Towards a Semantically Enhanced Version Control System for Models Models in Conflict Towards a Semantically Enhanced ersion Control System for Models Kerstin Altmanninger Department of Telecooperation, Johannes Kepler University Linz, Austria kerstin.altmanninger@jku.at

More information

Beyond ERP Systems: An Outline of Self-Referential Enterprise Systems ICB-RESEARCH REPORT

Beyond ERP Systems: An Outline of Self-Referential Enterprise Systems ICB-RESEARCH REPORT ICB Institut für Informatik und Wirtschaftsinformatik Ulrich Frank Stefan Strecker Beyond ERP Systems: An Outline of Self-Referential Enterprise Systems ICB-RESEARCH REPORT Requirements, Conceptual Foundation

More information

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017 Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Eine für Alle - Oracle DB für Big Data, In-memory und Exadata Dr.-Ing. Holger Friedrich

Eine für Alle - Oracle DB für Big Data, In-memory und Exadata Dr.-Ing. Holger Friedrich Eine für Alle - Oracle DB für Big Data, In-memory und Exadata Dr.-Ing. Holger Friedrich Agenda Introduction Old Times Exadata Big Data Oracle In-Memory Headquarters Conclusions 2 sumit AG Consulting and

More information

Design Patterns for Description-Driven Systems

Design Patterns for Description-Driven Systems Design Patterns for Description-Driven Systems N. Baker 3, A. Bazan 1, G. Chevenier 2, Z. Kovacs 3, T Le Flour 1, J-M Le Goff 4, R. McClatchey 3 & S Murray 1 1 LAPP, IN2P3, Annecy-le-Vieux, France 2 HEP

More information

Chapter 17 Web Services Additional Topics

Chapter 17 Web Services Additional Topics Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 17 Web Services Additional Topics Prof. Dr.-Ing. Stefan Deßloch

More information

Smart Data and its impact for Germany

Smart Data and its impact for Germany Smart Data and its impact for Germany Dr. Alexander Tettenborn i-know, 19.10.2016, Graz www.bmwi.de The German Digital Economy * 221 bn. turnover (ICT sector) 100 bn. turnover (internet economy) 5.6 %

More information

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification: Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,

More information

Course Book Academic Year

Course Book Academic Year Nawroz University College of Computer and IT Department of Computer Science Stage: Third Course Book Academic Year 2015-2016 Subject Advanced Database No. of Hours No. of Units 6 Distribution of Marks

More information

DATA INTEGRATION AND ANALYSIS IN PRECISION DAIRY FARMING: A SEMANTIC DATA WAREHOUSING APPROACH

DATA INTEGRATION AND ANALYSIS IN PRECISION DAIRY FARMING: A SEMANTIC DATA WAREHOUSING APPROACH F o r s c h u n g f ü r d e n l ä n d l i c h e n R a u m J o s e p h i n u m R e s e a r c h DATA INTEGRATION AND ANALYSIS IN PRECISION DAIRY FARMING: A SEMANTIC DATA WAREHOUSING APPROACH Martin Wischenbart

More information

Protection of the National Cultural Heritage in Austria

Protection of the National Cultural Heritage in Austria Protection of the National Cultural Heritage in Austria Mag. Protection notice / Copyright notice The Domesday Book Domesday Book A survey of England completed 1086 and still readable National Archives

More information

Das Fraunhofer. Fraunhofer MOEZ 1 Fraunhofer MOEZ

Das Fraunhofer. Fraunhofer MOEZ 1 Fraunhofer MOEZ Das Fraunhofer 1 Enhancing Ukraine`s Competitiveness in RI on the way to the Association to Horizon 2020-2nd Stakeholders Forum of BILAT-UKR*AINA Technology Transfer: Framework Conditions And Good Practices

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Sangam: A Framework for Modeling Heterogeneous Database Transformations

Sangam: A Framework for Modeling Heterogeneous Database Transformations Sangam: A Framework for Modeling Heterogeneous Database Transformations Kajal T. Claypool University of Massachusetts-Lowell Lowell, MA Email: kajal@cs.uml.edu Elke A. Rundensteiner Worcester Polytechnic

More information

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules

More information

Information Technology Document Schema Definition Languages (DSDL) Part 1: Overview

Information Technology Document Schema Definition Languages (DSDL) Part 1: Overview ISO/IEC JTC 1/SC 34 Date: 2008-09-17 ISO/IEC FCD 19757-1 ISO/IEC JTC 1/SC 34/WG 1 Secretariat: Japanese Industrial Standards Committee Information Technology Document Schema Definition Languages (DSDL)

More information

Advanced Solutions of Microsoft SharePoint Server 2013 Course Contact Hours

Advanced Solutions of Microsoft SharePoint Server 2013 Course Contact Hours Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332 36 Contact Hours Course Overview This course examines how to plan, configure, and manage a Microsoft SharePoint Server 2013 environment.

More information

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,

More information

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives

More information

Advanced Solutions of Microsoft SharePoint 2013

Advanced Solutions of Microsoft SharePoint 2013 Course 20332A :Advanced Solutions of Microsoft SharePoint 2013 Page 1 of 9 Advanced Solutions of Microsoft SharePoint 2013 Course 20332A: 4 days; Instructor-Led About the Course This four-day course examines

More information

Identify and cluster touchpoints in several ways Identify risks and initiatives associated to touchpoints

Identify and cluster touchpoints in several ways Identify risks and initiatives associated to touchpoints ARIS ARIS 9.8 SR4 OVERVIEW ARIS Architect / ARIS Designer Use CXM specific queries and spreadsheets to retrieve information and receive a graphical overview of the journey or its related objects. CXM queries

More information

JAVA PERFORMANCE. PR SW2 S18 Dr. Prähofer DI Leopoldseder

JAVA PERFORMANCE. PR SW2 S18 Dr. Prähofer DI Leopoldseder JAVA PERFORMANCE PR SW2 S18 Dr. Prähofer DI Leopoldseder OUTLINE 1. What is performance? 1. Benchmarking 2. What is Java performance? 1. Interpreter vs JIT 3. Tools to measure performance 4. Memory Performance

More information

Bridging Versioning and Adaptive Hypermedia in the Dynamic Web

Bridging Versioning and Adaptive Hypermedia in the Dynamic Web Bridging Versioning and Adaptive Hypermedia in the Dynamic Web Evgeny Knutov, Mykola Pechenizkiy, Paul De Bra Eindhoven University of Technology, Department of Computer Science PO Box 513, NL 5600 MB Eindhoven,

More information

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA ABSTRACT K.Govinda #1, V.Gurunathaprasad #2, H.Sathishkumar #3 Cloud computing is the way of providing computing

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been

More information

Security Specification for Cloud Data Services. Enterprise Cloud Customer Council Technical Working Group

Security Specification for Cloud Data Services. Enterprise Cloud Customer Council Technical Working Group Security Specification for Cloud Data Services Enterprise Cloud Customer Council Technical Working Group October 2017 Preamble Overview The Enterprise Cloud Customer Council (E3C) is a group of enterprise

More information

Project CAPKOM: Fostering Web Literacy of People with Cognitive Disabilities

Project CAPKOM: Fostering Web Literacy of People with Cognitive Disabilities 114 Project CAPKOM: Fostering Web Literacy of People with Cognitive Disabilities Andrea Petz and Nicoleta Radu andrea.petz@jku.at, nicoleta.radu@jku.at Johannes Kepler University Linz, Institute Integriert

More information

Web Services Security. Dr. Ingo Melzer, Prof. Mario Jeckle

Web Services Security. Dr. Ingo Melzer, Prof. Mario Jeckle Web Services Security Dr. Ingo Melzer, Prof. Mario Jeckle What is a Web Service? Infrastructure Web Service I. Melzer -- Web Services Security 2 What is a Web Service? Directory Description UDDI/WSIL WSDL

More information

DB Basic Concepts. Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS IIT, Abbottabad Pakistan

DB Basic Concepts. Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS IIT, Abbottabad Pakistan DB Basic Concepts DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Management Information Systems (MIS) Database Management System (DBMS)

More information

Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication And Security

Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication And Security Indian Journal of Science and Technology, Vol 7(S6), 1 5, October 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication

More information

ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017

ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017 ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM 12 July 2017 Time Isolated Aggregated Massively Connected Cloud / Data Centres Rich Devices / Gateways Constrained Devices The architecture will need to achieve

More information

Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati

Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati Analytical Representation on Secure Mining in Horizontally Distributed Database Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering

More information

Business to Consumer Markets on the Semantic Web

Business to Consumer Markets on the Semantic Web Workshop on Metadata for Security (W-MS) International Federated Conferences (OTM '03) Business to Consumer Markets on the Semantic Web Prof. Dr.-Ing. Robert Tolksdorf, Dipl.-Kfm. Christian Bizer Freie

More information

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering

More information

Content Management for the Defense Intelligence Enterprise

Content Management for the Defense Intelligence Enterprise Gilbane Beacon Guidance on Content Strategies, Practices and Technologies Content Management for the Defense Intelligence Enterprise How XML and the Digital Production Process Transform Information Sharing

More information

What s New? SAP HANA SPS 07 Administration & Monitoring (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013

What s New? SAP HANA SPS 07 Administration & Monitoring (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 What s New? SAP HANA SPS 07 Administration & Monitoring (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Content This presentation provides an overview of the changes regarding

More information

Secure coding practices

Secure coding practices Secure coding practices www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process Outsourcing Secure coding practices Writing good code is an art but equally important

More information

Advanced Solutions of Microsoft SharePoint Server 2013

Advanced Solutions of Microsoft SharePoint Server 2013 Course Duration: 4 Days + 1 day Self Study Course Pre-requisites: Before attending this course, students must have: Completed Course 20331: Core Solutions of Microsoft SharePoint Server 2013, successful

More information