This file was created by the TYPO3 extension publications --- Timezone: CEST Creation date: 2025-09-19 Creation time: 09:03:53 --- Number of references 118 misc Enhancing Noise Estimation for Statistical Disclosure Attacks Using the Artificial Bee Colony Algorithm_百利宫_百利宫娱乐平台¥官网 2025 Englisch 978-3-031-79007-2 0302-9743 10.1007/978-3-031-79007-2 Secure IT Systems 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 Proceedings Springer Cham 447-466 Alperen Aksoy Do?an Kesdo?an inproceedings epub76735 Towards a Lightweight and Privacy-Friendly Architecture for Online Advertising_百利宫_百利宫娱乐平台¥官网 This paper presents a privacy-enhancing protocol for digital advertising that uses temporary pseudonyms to safeguard users' behavioral profiles from pervasive online tracking. By integrating well-established anonymity techniques such as Tor and blind signature, the protocol generates robust, verifiable online identities that enhance security against ad fraud while ensuring personal data remains unlinkable to individuals. For behavioral targeting, the ad ecosystem is limited to ephemeral profile data. A key advantage of this privacy-friendly approach is its seamless integration with the existing advertising pipeline, fulfilling industry needs for retargeting and ad attribution, while maintaining low computational complexity on the user side. 2025 ICT Systems Security and Privacy Protection, 40th IFIP International Conference, SEC 2025, Proceedings, Part II 746 Springer
Cham
IFIP Advances in Information and Communication Technology (IFIPAICT) Lili Nemec Zlatolas and Kai Rannenberg and Tatjana Welzer and Joaquin Garcia-Alfaro 18—33 Online targeting, Identity management, Anonymity, Privacy https://epub.uni-regensburg.de/76735/ Maximilian Wittig Do?an Kesdo?an
conference Detecting Corruptive Noise Rounds for Statistical Disclosure Attacks_百利宫_百利宫娱乐平台¥官网 2024 2024 9th International Conference on Computer Science and Engineering (UBMK) Alperen Aksoy Do?an Kesdo?an inbook Distributed Dynamic Self-control Anonymity Management Model_百利宫_百利宫娱乐平台¥官网 2024 978-3-031-76370-0 0302-9743 https://doi.org/10.1007/978-3-031-76371-7 Security and Trust Management Springer Cham 21-35 Alperen Aksoy Do?an Kesdo?an conference Enhanced Closed-Loop Control Anonymity Protection Model with Inactive Period Feedback_百利宫_百利宫娱乐平台¥官网 2024 2024 17th International Conference on Information Security and Cryptology (ISCTürkiye) Alperen Aksoy Do?an Kesdo?an unpublished epub58521 Extended Abstract: Privacy Threats in Online Advertising_百利宫_百利宫娱乐平台¥官网 2024 The 3rd Workshop on Privacy Threat Modeling (WPTM) https://epub.uni-regensburg.de/58521/ Maximilian Wittig Do?an Kesdo?an inproceedings 10.1007/978-3-031-47748-5_6 Smart Noise Detection for?Statistical Disclosure Attacks_百利宫_百利宫娱乐平台¥官网 While anonymization systems like mix networks can provide privacy to their users by, e.g., hiding their communication relationships, several traffic analysis attacks can deanonymize them. In this work, we examine Statistical Disclosure Attacks and introduce a new implementation called the Smart Noise Statistical Disclosure Attack. This attack can improve results by examining how often other users send together with the attacker's target to better filter out the noise caused by them. We evaluate this attack by comparing it to previous variants in various simulations and thus show how it can improve upon them. Further, we demonstrate how other implementations can be improved by combing them with our approach to noise calculation. Finally, we critically review used evaluation metrics to determine their significance. 2024 978-3-031-47748-5 Secure IT Systems Springer Nature Switzerland
Cham
Fritsch, Lothar and Hassan, Ismail and Paintsil, Ebenezer 87—103 Marc Ro?berger Do?an Kesdo?an
incollection epub51452 Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments_百利宫_百利宫娱乐平台¥官网 Nowadays Vehicle-to-Vehicle communication (V2V) plays an increasingly important role, not only in terms of safety, but also in other areas of Intelligent Transport Systems (ITS). However, privacy is often underestimated in this context. In this paper we describe an extended version of our Harmonized Group Mix (HGM). HGM has the objective of enabling the privacy-friendly data exchange between vehicles in an ITS without neglecting other requirements such as integrity. In contrast to other approaches a complex organizational structure is not required and HGM is thus easily applicable. Rather, the idea of a Mix system is transferred to ITS communication, but the ITS-specific real-time requirements can still be met. The simultaneous use of group signatures can ensure a high degree of k-anonymity and prevent the tracking of participants. A distributed knowledge approach provides trust but at the same times allows revealing fraudsters. In addition to a detailed security analysis, this paper evaluates the approach using the simulation framework Veins and focuses on the exact vehicle movements and the groups formation respectively changes over time and their influence on each other. 2022 Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Valletta, Malta, February 25?27, 2020, Revised Selected Papers 1545 Springer
Cham
Communications in Computer and Information Science (CCIS) Steven Furnell and Paolo Mori and Edgar Weippl and Olivier Camp V2V communication, Mix, Privacy, k-Anonymity, ITS https://epub.uni-regensburg.de/51452/ Mirja Nitschke Christian Roth Christian Hoyer Dogan Kesdogan
inproceedings 9647811 DaRoute: Inferring trajectories from zero-permission smartphone sensors_百利宫_百利宫娱乐平台¥官网 2021 10.1109/PST52912.2021.9647811 2021 18th International Conference on Privacy, Security and Trust (PST) 1-10 Data privacy;Privacy;Runtime;Operating systems;Urban areas;Sensors;Trajectory;privacy leakage;location inference;route inference;smartphone sensors;mobile security;side-channel attack Christian Roth Ngoc Thanh Dinh Marc Ro?berger Dogan Kesdogan misc misc How to apply Database Anonymity Notions to Mix Networks_百利宫_百利宫娱乐平台¥官网 2021 978-3-88579-708-1 10.18420/informatik2021-069 Gesellschaft für Informatik, Bonn INFORMATIK 2021 807—818 Marc Ro?berger Alperen Aksoy Dogan Kesdogan incollection epub49239 iTLM-Q: A Constraint-Based Q-Learning Approach for Intelligent Traffic Light Management_百利宫_百利宫娱乐平台¥官网 Vehicle-to-everything (V2X) interconnects participants in vehicular environments to exchange information. This enables a broad range of new opportunities. For instance, crowdsourced information from vehicles can be used as input for self-learning systems. In this paper, we propose iTLM-Q based on our previous work iTLM to optimize traffic light management in a privacy-friendly manner. We aim to reduce the overall waiting time and contribute to a smoother traffic flow and travel experience. iTLM-Q uses Q-learning and is constraint-based in such a way that no manual traffic light cycles need to be defined in advance, hence, being able to always find an optimal solution. Our simulation-based on real-world data shows that it can quickly adapt to changing traffic situations and vastly decrease waiting time at traffic lights eventually reducing CO2 emissions. A privacy analysis shows that our approach provides a significant level of k-anonymity even in low traffic scenarios. 2021 Data Management Technologies and Applications 1446 Springer
Cham
Communications in Computer and Information Science Slimane Hammoudi and Christoph Quix and Jorge Bernardino 56—79 Traffic light, V2X, Privacy, Reinforcement learning, Q-learning https://epub.uni-regensburg.de/49239/ Christian Roth Lukas St?ger Mirja Nitschke Matthias H?rmann Dogan Kesdogan
inproceedings epub49240 ROADR: Towards Road Network Assessment using Everyone-as-a-Sensor_百利宫_百利宫娱乐平台¥官网 Complete and up-to-date map data plays a critical role in many contemporary and future applications such as autonomous driving level 3+. In terms of crowdsourcing, a data basis can be created that meets these stringent requirements without dedicating additional resources. With ROADR, we present a holistic platform to gather knowledge about a road network and its properties to further enhance either semantic or syntactic information. The privacy-by-design platform uses a smartphone application to collect crowdsourced data and performs local machine learning. Only less sensitive data is forwarded to a centralized platform that aggregates and processes information from the crowd to provide value-added information found in a vehicle's trajectory. Also, the paper provides a thorough analysis of the respective Floating Phone Data indicating two exemplary events, namely traffic light and traffic circles. Our evaluation shows that the recognition is done in real-time but in a resource-efficient way. 2021 International Conference on Distributed Sensing and Intelligent Systems (ICDSIS) https://epub.uni-regensburg.de/49240/ Christian Roth Thanh-Dinh Ngoc Markus Hornsteiner Verena Schr?ppel Marc Ro?berger Dogan Kesdogan inproceedings 9732577 STRIDE: Secure Traffic Reporting Infrastructure based on Distributed Entities_百利宫_百利宫娱乐平台¥官网 2021 10.1109/FMEC54266.2021.9732577 2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC) 1-6 Privacy;Multi-access edge computing;Navigation;Soft sensors;Microscopy;Transportation;Real-time systems;Intelligent Transportation System;Privacy By Design;Traffic Reporting Infrastructure;Vehicle-To-Anything Christian Roth Marc Ro?berger Christoph Schreyer Dogan Kesdogan inproceedings epub43694 kUBI: A Framework for Privacy and Transparency in Sensor-Based Business Models for Consumers: A Pay-How-You-Drive Example_百利宫_百利宫娱乐平台¥官网 Ubiquitous computing has fundamentally redefined many existing business models. The collected sensor data has great potential, which is being recognized by more and more industries, including car insurance companies with Usage-Based Insurance (UBI). However, most of these business models are very privacy-invasive and must be constructed with care. For a data processor, the integrity of the data is particularly important. With kUBI, we present a framework that takes into account the interests of the providers as well as the privacy of the users, using the example of Android. It is fully integrated into the Android system architecture. It uses hybrid data processing in both stakeholder domains. Protected enclaves, whose function can be transparently traced by a user at any time, protect company secrets in the hostile environment, i.e. a user?s smartphone. The framework is theoretically outlined and its integration into Android is shown. An evaluation shows that the user in the exemplary use case UBI can be protected by kUBI. 2020 9 Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy (DETIPS 2020) Privacy Enhancing Technology,Transparency Enhancing Technology,Sensor Data,Smartphone,Privacy Framework https://epub.uni-regensburg.de/43694/ Christian Roth Mario Saur Dogan Kesdogan inproceedings epub44292 CrowdAbout: Using Vehicles as Sensors to Improve Map Data for ITS_百利宫_百利宫娱乐平台¥官网 Crowdsourcing can be seen as an opportunity to provide important information for Intelligent Transportation Systems to improve the service quality of various applications in this domain. Autonomous or assisted vehicles need the most accurate map data possible to adjust the respective assistants to it. In this work, we present CrowdAbout, a system that uses the crowd as mobile sensors to collect data from smartphone sensors during trips. The system recognizes special traffic events like roundabouts with the help of machine learning. These findings are used to automatically correct OpenStreetMap data and adapt them to a changing road network. An evaluation of different machine learning algorithms using self-collected real-world data of over 200 roundabouts shows that the recognition of roundabouts including exit and radius is possible with high accuracy. 2020 International Workshop on Data Science Engineering and its Applications (DSEA) International Workshop on Data Science Engineering and its Applications (DSEA) Machine Learning, Smartphone, Road Network, Pattern Recognition, OpenStreetMap, ITS https://epub.uni-regensburg.de/44292/ Christian Roth Thanh-Dinh Ngoc Dogan Kesdogan incollection epub40574 Harmonized Group Mix for ITS_百利宫_百利宫娱乐平台¥官网 Vehicle-to-Vehicle (V2V) communication is crucial for almost all future applications in the context of smart traffic, such as autonomous driving. However, while current standards like WAVE provide a technical platform for communication and management, they lack aspects of privacy for their participants. In this paper, we introduce a Harmonized Group Mix (HGM), an architecture suited to exchange information in ITS, compatible with current standards. HGM does not rely on expensive Road-Side-Units (RSUs) or complex organizational relationships to introduce a trust anchor but is built on the concept of peer-to-peer networks. Hence, our proposal does not require any changes to current environments and is eventually easy to deploy in the real world. Our proposed method provides k-anonymity using group signatures and splits trust between multiple parties. At the same time, the integrity of the system is preserved. We evaluate our approach using the simulation framework Veins. Our experiments show that HGM is feasible from a performance and privacy perspective in the given context. 2020 Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP SciTePress
Valetta, Malta
152—163 V2V Communication, Mix, Privacy, k-Anonymity, ITS https://epub.uni-regensburg.de/40574/ Mirja Nitschke Christian Roth Christian Hoyer Dogan Kesdogan
article epub43466 iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management_百利宫_百利宫娱乐平台¥官网 Vehicle-to-everything (V2X) interconnects participants in vehicular environments to exchange information. This enables a broad range of new opportunities. We propose a self learning traffic light system which uses crowdsoured information from vehicles in a privacy friendly manner to optimize the overall traffic flow. Our simulation, based on real world data, shows that the information gain vastly decreases waiting time at traffic lights eventually reducing CO2 emissions. A privacy analysis shows that our approach provides a significant level of k-anonymity even in low traffic scenarios. 2020 Proceedings of the 9th International Conference on Data Science, Technology and Applications (DATA 2020) 1 SciTePress 252—259 Traffic Light, V2X, Privacy, Attribute-Based-Credentials, Privacy-ABC System, Reinforcement Learning, Privacy-by-design https://epub.uni-regensburg.de/43466/ Christian Roth Mirja Nitschke Matthias H?rmann Dogan Kesdogan incollection epub40728 My Smartwatch is Mine - Machine Learning Based Theft Detection of Smartwatches_百利宫_百利宫娱乐平台¥官网 Smartwatches are small but powerful devices which make daily life easier and are without a doubt desirable objects for thieves. In this paper, we present a first machine learning based theft detection approach running in a user's domain, relying solely on data of his smartwatch and thus not violating privacy. Hence, we collect data from multiple persons to first prove that there is an exploitable structure within data provided by a smartwatch's inertial sensors and perform user identification on the basis of that data. Then we will present and thoroughly evaluate our robust, efficient and fast (within seconds) theft detection algorithm which has both a low false rejection rate and an even lower false acceptance rate. 2019 11 Secure IT Systems. NordSec 2019 11875 Springer, Cham Lecture Notes in Computer Science Alan Askarov and René Rydhof Hansen and Willard Rafnsson 171—187 User recognition;Smartwatch;Clustering;Privacy. https://epub.uni-regensburg.de/40728/ Christian Roth Mirja Nitschke Christian Hutzler Maximilian Koller Rolf Küffner Marc Ro?berger Dogan Kesdogan article epub38056 A Privacy Enhanced Crowdsourcing Architecture for Road Information Mining Using Smartphones_百利宫_百利宫娱乐平台¥官网 The digitization of our road and traffic systems enables evermore advanced location based services to support us in our everyday tasks with prominent examples being navigation applications like Google Maps or speed camera directories like TomTom Speed Cameras. The information collection that lies at the base of these applications however is often either done behind closed doors, or relies on the goodwill and time investment of voluntary community members providing such information as best they can. In this paper we present a new crowdsourcing architecture for voluntary road and traffic system data collection, that on the one hand values and protects the privacy of the participating community members and on the other hand significantly eases their manual workload by detecting and inferring applicable information through the sensors of their mobile phones using a self-created Android application. Our approach shows reliable results for the road system properties we defined. We propose an enhancement for the route navigation process by including the acquired road information. 2018 11 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA) IEEE 17—24 Privacy, Crowdsourcing, Navigation, Data Mining, Smartphone https://epub.uni-regensburg.de/38056/ Conference 20-22 Nov. 2018 Paris, France, France Christian Roth Dogan Kesdogan incollection epub38306 MixMesh Zones ? Changing Pseudonyms Using Device-to-Device Communication in Mix Zones_百利宫_百利宫娱乐平台¥官网 Mobile device tracking has become ever so pervasive in our world of location-based services and prying eyes. While users can somewhat restrict the flow of information towards the services they consciously use, this is not as easily possible for the mobile network they are connected to. Here, they can be tracked with relative ease by whoever controls the access points they connect to, or even by anyone that is able to monitor the air interface. Trends towards smaller cells and dynamic access point ownership within the scope of 5G only exacerbate this issue. In this paper, we present a new mix zone approach, called MixMesh, based on device-to-device communication, intended to hinder mobile network tracking through enabling secure and privacy-friendly pseudonym changes, aligned with the requirements resulting from the aforementioned trends. Our evaluation shows that our MixMesh approach is able to deliver better anonymity at an unchanged level of service quality compared to existing mix zone techniques, all the while being configurable to a desired level of anonymity in order to adapt to different scenarios. 2018 11 Secure IT Systems. NordSec 2018 11252 Springer, Cham
Cham (Switzerland)
Lecture Notes in Computer Science Nils Gruschka 38—53 3 Anonymisation, Pseudonyms, Mix zone, Mesh network, Device-to-device, Privacy https://epub.uni-regensburg.de/38306/ Mirja Nitschke Philipp Holler Lukas Hartmann Dogan Kesdogan
inproceedings epub36335 Can the ISP be trusted?_百利宫_百利宫娱乐平台¥官网 2017 11 Forum Privatheit: Die Fortentwicklung des Datenschutzes https://epub.uni-regensburg.de/36335/ Lukas Hartmann Matthias Marx Eva Schedel Christian Roth Dogan Kesdogan incollection epub36324 PARTS ? Privacy-Aware Routing with Transportation Subgraphs_百利宫_百利宫娱乐平台¥官网 To ensure privacy for route planning applications and other location based services (LBS), the service provider must be prevented from tracking a user?s path during navigation on the application level. However, the navigation functionality must be preserved. We introduce the algorithm PARTS to split route requests into route parts which will be submitted to an LBS in an unlinkable way. Equipped with the usage of dummy requests and time shifting, our approach can achieve better privacy. We will show that our algorithm protects privacy in the presence of a realistic adversary model while maintaining the service quality. 2017 11 Secure IT Systems (NordSec 2017) 10674 Springer
Cham (Switzerland)
Lecture Notes in Computer Science Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevi\v cius 86—101 Routing; Location privacy; Anonymity https://epub.uni-regensburg.de/36324/ Christian Roth Lukas Hartmann Dogan Kesdogan
misc epub36336 Dynamische Teilrouten zur anonymen Navigation_百利宫_百利宫娱乐平台¥官网 Um Privacy bei Location Based Services (LBS) zu gew?hrleisten, muss auf Anwendungsebene verhindert werden, dass der Service Provider bei Navigationsabfragen die Pfade des Nutzers nachverfolgen kann. Gleichzeitig muss die Funktionsf?higkeit des Service erhalten bleiben. Durch Stückelung der Route und anonyme Abfrage der Teilrouten l?sst sich ein Privacy Enhanced Routing unter Einschr?nkung der Genauigkeit realisieren. 2016 9 Anonymit?t, Navigation, Graphen, l-Diversity https://epub.uni-regensburg.de/36336/ Christian Roth Lukas Hartmann Katharina Issel Dogan Kesdogan techreport epub36346 Integrating Privacy-Enhancing Technologies into the Internet Infrastructure_百利宫_百利宫娱乐平台¥官网 The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet?s infrastructure and establish them in the consumer mass market. The technologies in focus include a basis protection at internet service provider level, an improved overlay network-based protection and a concept for privacy protection in the emerging 5G mobile network. A crucial success factor will be the viable adjustment and development of standards, business models and pricing strategies for those new technologies. Projektbericht 2016 https://epub.uni-regensburg.de/36346/ David Harborth Dominik Herrmann Stefan K?psell Sebastian Pape Christian Roth Hannes Federrath Dogan Kesdogan Kai Rannenberg article epub60881 Service composition with consideration of interdependent security objectives_百利宫_百利宫娱乐平台¥官网 Current approaches for service composition consider security as either a single Quality of Service (QoS) attribute or as several mutually independent quality properties. This view is, however, not adequate, as security objectives are no singletons but are subject to interdependence. Another drawback of these approaches is that partial fulfillment of security objectives, either due to technical or organizational constraints cannot be captured. Formal methods on the other hand are usually limited to a fixed set of security objectives. To bridge this gap, we present an approach to assess the quality of service compositions with regards to interdependent security objectives. Our approach utilizes the notion of structural decomposition which estimates the impact of single quality attributes on a security goal. This allows for the definition of domain models for an arbitrary set of security objectives. As the fulfillment of each security objective is individually measured by a utility value, interdependencies between security objectives can be expressed by a single measure. Furthermore, it allows to express partial fulfillment of security objectives. As each security objective is modeled as a utility function on its own, the model resembles a Multi-Objective Optimization (MOO) problem. We present first evaluation results of transforming domain models into MOO problems and tackling them with state-of-the-art genetic algorithms. Furthermore, we give an overview of a support tool for our approach. (C) 2014 Elsevier B.V. All rights reserved. 2015 Science of Computer Programming 97 ELSEVIER SCIENCE BV
AMSTERDAM
183—201 GENETIC ALGORITHM; OPTIMIZATION; CHALLENGES; FRAMEWORK; SELECTION; Service-oriented computing; QoS-aware service composition; Multi-Objective Optimization; Interdependent protection goals; IT security https://epub.uni-regensburg.de/60881/ Fatih Karatas Lars Fischer Dogan Kesdogan
incollection epub28425 A Flexible Approach For Considering Interdependent Security Objectives in Service Composition_百利宫_百利宫娱乐平台¥官网 Current Quality of Service (QoS) models for service compositions are considering security either as a single QoS attribute (measured in abstract units of security) or as a number of independent attributes such as uptime probability. In the face of numerous interdependent protection goals, either general or domain-dependent, this approach is insufficient to capture most real-world scenarios adequately. To cope with this limitation, we introduce in this paper our approach of modeling protection goals as interdependent utility functions over QoS attributes. Furthermore, we present a prototypical tool which supports domain experts in defining QoS- and domain models of any complexity as well as decision makers in finding near-optimal service compositions based on these models. 2013 Proceedings of the ACM Symposium on Applied Computing, (2013 05 27) ACM Digital Library 1919—1926 https://epub.uni-regensburg.de/28425/ Fatih Karatas Dogan Kesdogan incollection epub28424 Considering Interdependent Protection Goals in Domain-Specific Contexts: The di.me Case Study_百利宫_百利宫娱乐平台¥官网 2013 Proc. of: 10th International Conference on Information Technology : New Generations (ITNG 2013) IEEE https://epub.uni-regensburg.de/28424/ Fatih Karatas Marcel Heupel Mohamed Bourimi Dogan Kesdogan Sophie Wrobel incollection epub28253 Experiences by using AFFINE for building collaborative applications for online communities_百利宫_百利宫娱乐平台¥官网 2013 Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International) Springer
Berlin
https://epub.uni-regensburg.de/28253/ Mohamed Bourimi Dogan Kesdogan
incollection epub28427 Multilaterally secure communication anonymity in decentralized social networking_百利宫_百利宫娱乐平台¥官网 2013 Proc. of: 10th International Conference on Information Technology : New Generations (ITNG 2013) IEEE https://epub.uni-regensburg.de/28427/ Philipp Schwarte Mohamed Bourimi Marcel Heupel Dogan Kesdogan Rafa Gimenez Sophie Wrobel Simon Thiel article epub28087 PETs at CSCL Service: Underutilised Potentials for Privacy-Enhancing Distance Education_百利宫_百利宫娱乐平台¥官网 2013 Journal of Universal Computer Science Springer https://epub.uni-regensburg.de/28087/ Special Issue: Interaction Design in Educational Environments Mohamed Bourimi Dogan Kesdogan Marcel Heupel Dhiah Abou-Tair Niki Lambropoulos incollection epub28271 Privacy-preserving concepts for supporting recommendations in decentralized OSNs_百利宫_百利宫娱乐平台¥官网 Recommender systems depend on the amount of available and processable information for a given purpose. Trends towards decentralized online social networks (OSNs), promising more user control by means of privacy preserving mechanisms, lead to new challenges for (social) recommender systems. Information, recommender algorithms rely on, is no longer available, (i.e. central user registries, friends of friends), thus shared data is reduced and centralized processing becomes difficult. In this paper we address such drawbacks based on identified needs in the decentralized OSN di.me and present concepts overcoming those for selected functionalities. Besides this, we tackle the support of privacy advisory, warning the user of risks when sharing data. 2013 MSM '13 Proceedings of the 4th International Workshop on Modeling Social Media ACM
New York
privacy and security, linking data, online social networks, decentralized social networks, di.me https://epub.uni-regensburg.de/28271/ Marcel Heupel Mohamed Bourimi Simon Scerri Dogan Kesdogan
incollection epub28255 Towards Visual Configuration Support For Interdependent Security Goals_百利宫_百利宫娱乐平台¥官网 2013 Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International) Springer
Berlin
https://epub.uni-regensburg.de/28255/ Fatih Karatas Mohamed Bourimi Dogan Kesdogan
incollection epub28254 Trust and Privacy in The di.me Userware_百利宫_百利宫娱乐平台¥官网 2013 Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International) Springer
Berlin
https://epub.uni-regensburg.de/28254/ Marcel Heupel Mohamed Bourimi Dogan Kesdogan
article epub28272 Uso de interface distribuída para avaliar a tomada de decis?o na nuvem_百利宫_百利宫娱乐平台¥官网 2013 RTI Magzine (Sao Paulo, Brazil) Aranda Editora 82—89 1/2013 https://epub.uni-regensburg.de/28272/ Fatih Karatas Thomas Barth Dogan Kesdogan Habib M. Fardoun Pedro G. Villanueva incollection epub28428 A generic location-based mobile application framework supporting privacy-preserving end-user tailorability_百利宫_百利宫娱乐平台¥官网 Current Quality of Service (QoS) models for service compositions are considering security either as a single QoS attribute (measured in abstract units of security) or as a number of independent attributes such as uptime probability. In the face of numerous interdependent protection goals, either general or domain-dependent, this approach is insufficient to capture most real-world scenarios adequately. To cope with this limitation, we introduce in this paper our approach of modeling protection goals as interdependent utility functions over QoS attributes. Furthermore, we present a prototypical tool which supports domain experts in defining QoS- and domain models of any complexity as well as decision makers in finding near-optimal service compositions based on these models. 2012 Proceedings of: IGCT 2012. International Conference on Future Generation Communication Technologies IEEE 202—207 https://epub.uni-regensburg.de/28428/ Dhiah Abou-Tair Mohamed Bourimi Ricardo Tesoriero Dogan Kesdogan Marcel Heupel incollection epub28465 Context-Aware, Trust-Based Access Control for the di.me Userware_百利宫_百利宫娱乐平台¥官网 Trust calculation to inform privacy recommendations based on context information involvement (e.g. location information, nearby people) is an increasing need in pervasive environments. In this paper we present a multidimensional trust metric designed for access control decisions in scenarios of the EU funded digital.me project. Thereby each involved context information could represent a separate trust dimension. In the focus is the correctness of the suggested trust metric towards meaningful privacy recommendations and improvement of access control decisions for our scenarios. The suggested metric could help to avoid manipulations and attacks based on fundamental requirements for situational trust. Our proposed trust calculation considers a presence history of persons at locations, to increase the accuracy of our base trust value. We present our approach after explaining the fundamental requirements, the underlying ontology framework and architecture. 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), Istanbul, 7-10 May 2012 IEEE 1—6 https://epub.uni-regensburg.de/28465/ Marcel Heupel Lars Fischer Mohamed Bourimi Dogan Kesdogan Simon Scerri Fabian Hermann Rafael Gimenez incollection epub28453 Enhancing privacy in collaborative scenarios utilising a flexible proxy layer_百利宫_百利宫娱乐平台¥官网 In this paper we present our approach for a flexible proxy layer, allowing the parallel use of anonymous and direct network communication depending on specific scenarios or user preferences. The requirements are derived from scenarios from the european research project di. me, targeting to support end users in keeping control of their personal data and digital footprints. In the targeted scenarios, the use of anonymous network communication is an essential prerequisite for certain use cases (e.g. like pseudonymous communication), because of the special architecture, where each user has its own server holding his private data. Especially, the presented approach solves linkability which could arise when using SSL certificates/x.509 certificates and addresses various potential attacks. A detailed specification is given and important implementation details are addressed. 2012 2012 International Conference on Future Generation Communication Technology (FGCT), London, 12-14 Dec. 2012 IEEE 126—132 https://epub.uni-regensburg.de/28453/ Lars Fischer Marcel Heupel Mohamed Bourimi Dogan Kesdogan Rafael Gimenez incollection epub28437 Enhancing the security and usability of DUI based collaboration with proof based access control_百利宫_百利宫娱乐平台¥官网 Resource access control is at the heart of many collabora- tion platforms. Thus the usability of used techniques is cru- cial for projects with high expectations to response times in the collaboration process. The special case described in this paper is using the anonymous credential system Idemix in a such a project basing in its turn on distributed user interfaces (DUIs) to enhance decision making in disaster situations. We show the potential of using Idemix to enhance the usability of decision making in crisis related social interaction by using DUIs. Idemix and proof-based credential systems in general could ease transparently performing authorization, e.g. with- out any user intervention at the level of the user interface. We present this exemplary with means of a developed prototypic mobile application for supporting collaborative scenarios for the BMBF RescueIT and projects along with the WallShare System. Further, we present the IdeREST implementation of Idemix in order to support non-Java devices such as Windows Phone 7 used for the developed prototype. 2012 Proc. of the 2nd Workshop on Distributed User Interfaces: DUI 2012, in conjunction with 2012 CHI conf. ISE Research Group, University of Castilla-La Mancha, Spain Ricardo Tesoriero 23—26 distributed user interface; access control; anonymous credentials, Idemix, WallShare, IdeREST https://epub.uni-regensburg.de/28437/ URL ist ganzes Buch Marcel Heupel Mohamed Bourimi Dogan Kesdogan Thomas Barth Philipp Schwarte Pedro G. Villanueva inproceedings epub28464 Erh?hung der Sicherheit von Lebensmittelwarenketten durch Modell-getriebene Prozess-Implementierung_百利宫_百利宫娱乐平台¥官网 2012 MKWI 2012, Teilkonferenz "Kommunikations- und Kooperationssysteme, Track "Digitale Netzwerke in unsicheren Umwelten" https://epub.uni-regensburg.de/28464/ J. Gulden T. Barth Fatih Karatas Dogan Kesdogan incollection epub28463 GridPriv: A Smart Metering Architecture Offering k-Anonymity_百利宫_百利宫娱乐平台¥官网 One of the key challenges to the practical realisation of the Smart Grid are the privacy implications of fine-grained Smart Metering data. We review the German BSI's Protection Profile for the Gateway of a Smart Metering System, a state of the art approach to practical Smart Metering privacy in Germany. Our analysis reveals several issues that can reduce the achieved anonymity and pseudonymity. Specifically, we investigate churning attacks which exploit processes inherent to the use of pseudonymised meter data and we quantify the attacks' effect. In addition, we introduce GridPriv an enhanced architecture that includes a non-trusted k-anonymity service and that addresses the challenges identified with the BSI's approach in a scalable, secure, and privacy-preserving way. 2012 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, 25-27 June 2012 IEEE 419—426 https://epub.uni-regensburg.de/28463/ Mark Stegelmann Dogan Kesdogan incollection epub28451 Location Privacy for Vehicle-to-Grid Interaction through Battery Management_百利宫_百利宫娱乐平台¥官网 Vehicle-to-grid research explores the possibility of centrally coordinating the charging behaviour of electric-drive vehicles and of employing such vehicles as a distributed grid resource. As such, they could be used both to improve the power grid's reliability and to store excess renewable energy. The information observable by the central coordination instance, however, can be a threat to the privacy of vehicle owners. In this work, we investigate when the observed information allows for vehicles to be distinguished and traced between stops and when not so that vehicles will mix with each other. Specifically, we analyse the role of battery information and reveal how it can influence vehicle mixing. Furthermore, we consider information minimisation, suppression, and generalisation and discuss their effects both on vehicle mixing and on service functionality. Lastly, we show that parking lots and garages naturally provide the conditions necessary for vehicle mixing and give an evaluation of mixing for this context. 2012 Ninth International Conference on Information Technology: New Generations (ITNG 2012) : Las Vegas, Nevada, USA, 16 - 18 April 2012 IEEE
Piscataway, NJ
373—378 https://epub.uni-regensburg.de/28451/ Mark Stegelmann Dogan Kesdogan
incollection epub28509 Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection_百利宫_百利宫娱乐平台¥官网 In this paper we investigate the impact of missing replay protection as well as missing integrity protection concerning a local attacker in AN.ON. AN.ON is a low latency anonymity network mostly used to anonymize web traffic. We demonstrate that both protection mechanisms are important by presenting two attacks that become feasible as soon as the mechanisms are missing. We mount both attacks on the AN.ON network which neither implements replay protection nor integrity protection yet. 2012 Financial Cryptography and Data Security. 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers 7035 Springer
Berlin
Lecture Notes in Computer Science 62—76 https://epub.uni-regensburg.de/28509/ B. Westermann Dogan Kesdogan
incollection epub28466 Towards secure and at-runtime tailorable customer-driven public cloud deployment_百利宫_百利宫娱乐平台¥官网 Cloud computing as a facility for outsourcing IT related tasks is a growing trend. Customer-driven application deployment in public clouds has to be secure and flexible by means of easing security configuration as well as by avoiding the vendor lock-in problem. In this paper we present an approach intending to meet these needs by (1) easing security configuration(s), (2) automating the consideration of security best practices and adding/enabling anonymity components at-runtime, and (3) by using Open Virtualization Format (OVF) in order to overcome the vendor lock-in problem. The requirements gathering is based on the needs of three projects from different business domains, the EU FP7 digital.me project, the multidisciplinary iFishWatcher/iAngle combined project and the joint german-french research and development project ReSCUe IT. All projects require empowering lay as well as experienced customers to (re-)deploy their own applications and migrate them easily by considering security thereby. Supporting tailorability of the deployed environment by adding anonymity components at-runtime without downtimes is a specific requirement in these projects. We present first results and discuss experiences and future work directions. 2012 International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Lugano, 19-23 March 2012 IEEE 124—130 https://epub.uni-regensburg.de/28466/ Fatih Karatas Mohamed Bourimi Thomas Barth Dogan Kesdogan Rafael Gimenez Widura Schwittek Marc Planaguma incollection epub28430 Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios_百利宫_百利宫娱乐平台¥官网 The increasing tendency of using user-controlled servers for supporting different scenarios from leisure and professional life raises new security challenges. Especially when those servers are used to support collaborative scenarios (e.g., communication and sharing with others), the requirement for anonymity at the network level should be supported in an efficient way. In this paper we present a specific communication scenario that could lead to link ability even though anonymous networks are used. The requirements gathering is based on realistic requirements from the EU FP7 di.me project requiring to empower lay end-users to collaborate with their contacts. Thereby anonymity at the network level also needs to be considered in order to disguise the physical location of the users and also of their server(s). We present an approach satisfying these anonymity requirements by means of a Tor based software component in order to overcome such privacy problems. First results are presented and the portability of the suggested solution for similar settings as well as future work directions are discussed. 2012 Ninth International Conference on Information Technology: New Generations (ITNG 2012) : Las Vegas, Nevada, USA, 16 - 18 April 2012 IEEE
Piscataway, NJ
102—108 https://epub.uni-regensburg.de/28430/ Mohamed Bourimi Marcel Heupel B. Westermann Dogan Kesdogan Rafa Gimenez M. Planaguma F. Karatas F. Schwarte
incollection epub28483 Towards Usable Interfaces for Proof Based Access Rights on Mobile Devices_百利宫_百利宫娱乐平台¥官网 Access rights management is in the middle of many collaboration forms such as group formation or sharing of information in different kinds of scenarios. There are some strong mechanisms to achieve this, like anonymous credential systems. However in general their usage is not very intuitive for lay users. In this paper we show the potential of using proof-based credential systems like Idemix to enhance the usability of privacy-respecting social interaction in different collaborative settings. For instance transparently performing authorization without any user intervention at the level of the user interface becomes possible. In order to improve the usability, we complement this by introducing a mental model for intuitive management of digital identities. The approach should also empower users to define their own access restrictions when sharing data, by building custom proof specifications on the fly. We show this exemplary with a developed prototype application for supporting collaborative scenarios on a mobile device. We also present first evaluation results of an early prototype and address current as well as future work. 2012 Open Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers 1039 Springer
Berlin
Lecture Notes in Computer Science Jan Camenisch and Dogan Kesdogan 15—27 https://epub.uni-regensburg.de/28483/ Marcel Heupel Dogan Kesdogan
article epub28429 Using Distributed User Interfaces in Collaborative, Secure, and Privacy-Preserving Software Environments_百利宫_百利宫娱乐平台¥官网 In complex, ad hoc constituted situations, people with different intentions, experiences, and expertise need or want to cooperate to cope with the domain-specific challenges they face. These situations can occur in both a professional and a leisure-life context. Cooperative systems providing enhanced interaction facilities in the user interface (e.g., direct manipulation techniques) could substantially support cooperation especially for geographically distributed cooperating participants. In many cases, sensitive information has to be shared in a common workspace requiring different handling procedures according to the different types of participants involved in these ad hoc processes. This article proposes the use of a common, multilaterally secure distributed user interface to support collaboration for distributed groups of process participants. The system combines a collaborative multipointer system with an anonymous credential security system to provide users with an easy way to share and access information securely, ensuring the privacy of sensitive information communicated in the course of ad hoc processes. Various scenarios representing contrary use cases from three different projects are introduced to derive typical requirements and to show the generality of the proposed system and its core components. 2012 International Journal of Human-Computer Interaction 28 Taylor & Francis 748—753 https://epub.uni-regensburg.de/28429/ Special Issue: Distributed User Interfaces Dhiah Abou-Tair Mohamed Bourimi Thomas Barth Dogan Kesdogan Fabian Hermann incollection epub28438 Using Distributed User Interfaces to Evaluate Decision Making in Cloud Deployment_百利宫_百利宫娱乐平台¥官网 In case of incidents in information technology (IT) systems of a supply chain participant, crisis teams need to quickly take steps in order to keep IT systems and therefore the supply chain running. Deploying an IT infrastructure partly or completely on cloud infrastructure is a viable solution, e.g. as in the face of technical failures and cyber attacks. Currently there is poor support of tools, which allow lay users for cloud deploying applications in a provider independent fashion and with respect to their individual security requirements. For this task we presented and discussed ESCAVISION. In this paper we propose an approach based on distributed user interfaces in order to evaluate the usability of ESCAVISION and the process of decision making in crisis teams. Furthermore the respective interaction design as well as the WallShare based infrastructure are described. We also discuss the approach and future directions. 2012 Proc. of the 2nd Workshop on Distributed User Interfaces: DUI 2012, in conjunction with 2012 CHI conf. ISE Research Group, University of Castilla-La Mancha, Spain Ricardo Tesoriero 17—22 Distributed user interfaces, cloud deployment, cloud security, decision making, mission-critical situations https://epub.uni-regensburg.de/28438/ URL ist ganzes Buch Fatih Karatas Thomas Barth Dogan Kesdogan Habib M. Fardoun Pedro G. Villanueva incollection epub28484 A Practical Complexity-Theoretic Analysis of Mix Systems._百利宫_百利宫娱乐平台¥官网 The Minimal-Hitting-Set attack[10] (HS-attack) is a well-known passive intersection attack against Mix-based anonymity systems, applicable in cases where communication behaviour is non-uniform and unknown. The attack allows an observer to identify uniquely the fixed set of communication partners of a particular user by observing the messages of all senders and receivers using a Mix. Whilst the attack makes use of a provably minimal number of observations, it also requires solving an NP-complete problem. No prior research, to our knowledge, analyses the average complexity of this attack as opposed to its worst case. We choose to explore the HS-attack, as opposed to statistical attacks, to provide a baseline metric and a practical attack for unambiguously identifying anonymous users. We show that the average complexity of the HS-attack can vary between a worst-case exponential complexity and a linear-time complexity according to the Mix parameters. We provide a closed formula for this relationship, giving a precise measure of the resistance of Mixes against the HS-attack in practice, and allowing adjustment of their parameters to reach a desired level of strength. 2011 Computer Security ? ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings 6879 Springer
Berlin
Lecture Notes in Computer Science 508—527 https://epub.uni-regensburg.de/28484/ Dang Vinh Pham Joss Wright Dogan Kesdogan
incollection epub28471 A Privacy-Respecting Indoor Localization Approach for Identifying Shopper Paths by Using End-Users Mobile Devices_百利宫_百利宫娱乐平台¥官网 An established way to analyze shoppers' behavior at the point of sale consists of identifying their paths through the store as well as their approach behavior towards different shelves. Such proceeding allows e.g. for optimizing product placements or in-store advertising and guidance. Since there is a technological challenge in doing this inside the respective locations, there is a need for better localization methods than those using RFIDs or similar localization technologies (e.g. indoor GPS, CCTV, and different photo sensors) or by basing on human-based observations; at least due to privacy concerns. In this paper we introduce a multi-method approach for identifying shopper paths in the stores based on a combination of built-in sensors' capabilities of the end-users' mobile devices as well as a mobile product scanner application. Our approach allows for more privacy-preserving evaluation since the users could decide to provide accumulated paths data when paying at the point of sale. We also describe our prototypic implementation extending the Red pin system for iPhones, explain the architecture allowing also for anonymously sharing customers' paths in real-time, and address potential improvements for future work. 2011 Eighth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, 11-13 April 2011 IEEE 139—144 https://epub.uni-regensburg.de/28471/ Mohamed Bourimi G. Mau S. Steinmann D. Klein S. Templin Dogan Kesdogan H. Schramm-Klein misc epub28469 Enhancing usability of privacy-respecting authentication and authorization in mobile social settings by using Idemix (in the context of the EU FP7 di.me Project)_百利宫_百利宫娱乐平台¥官网 Authentication and authorization are an essential part of any system allowing for information sharing and social interaction. Especially in such social settings where mobile devices with restricted capabilities and new possibilities (e.g. screen size, ease of localization) are used, there is an increasing need for providing privacy-respecting integrity and access permission mechanisms by considering trade-o?s related to usability aspects. In this paper we show how the usability of authentication and authorization related interaction can be enhanced in mobile social settings. This is carried out in our case by using proof-based anonymous credential systems such as Idemix. The requirements analysis is based on various case studies in building collaborative systems and oriented to the needs of the upcoming EU FP7 funded project di.me. We also present the prototypic implementation and future work directions. 2011 Univ. Siegen Identity management; idemix; authentication and authorization; security vs. usability; social interaction https://epub.uni-regensburg.de/28469/ Scientific research paper Mohamed Bourimi Marcel Heupel Dogan Kesdogan Thomas Fielenbach inproceedings epub28474 Link Globally - Trust Locally_百利宫_百利宫娱乐平台¥官网 As "online social networks" (OSN) are much about publishing personal data, it seems contrary to talk about privacy \ensuremath| at ?rst. Unless it is realized, that only protection from unintended disclosure allows to join in and share data intentionally. We discuss how OSN may be improved to introduce privacy more similar to normal social structures. We discuss the principle of separation, and argue in favour of short trust path. This leads to the conclusion that OSN have to be organised in a distributed manner. 2011 Federated Social Web Summit Europe 2011 https://epub.uni-regensburg.de/28474/ Lars Fischer Dogan Kesdogan Laura Dorfer inproceedings epub28508 Mobile applications for the angling community_百利宫_百利宫娱乐平台¥官网 2011 6th World Recreational Fishing Conference (WRFC) https://epub.uni-regensburg.de/28508/ Bernd Uebersch?r Widura Schwittek Stefan Eicker Mohamed Bourimi Marcel Heupel Dogan Kesdogan incollection epub28468 Supporting Distributed Decision Making Using Secure Distributed User Interfaces_百利宫_百利宫娱乐平台¥官网 2011 Distributed User Interfaces : Designing Interfaces for the Distributed Ecosystem Springer London
London
Human-Computer Interaction Series José A. Gallud 177—184 https://epub.uni-regensburg.de/28468/ DOI = ganzes Buch Thomas Barth Thomas Fielenbach Mohamed Bourimi Dogan Kesdogan Pedro G. Villanueva
inproceedings epub28485 Tracking Shoppers Behavior At The Point Of Sale By Using End-Users Mobile Devices_百利宫_百利宫娱乐平台¥官网 2011 40. EMAC International Conference, New Technologies and E-Marketing Track https://epub.uni-regensburg.de/28485/ S. Steinmann G. Mau Mohamed Bourimi H. Schramm-Klein Dogan Kesdogan incollection epub28534 AFFINE for Enforcing Earlier Consideration of NFRs and Human Factors When Building Socio-Technical Systems Following Agile Methodologies_百利宫_百利宫娱乐平台¥官网 Nowadays, various user-centered and participatory design methodologies with different degree of agility are followed when building sophisticated socio-technical systems. Even when applying these methods, non-functional requirements (NFRs) are often considered too late in the development process and tension that may arise between users? and developers? needs remains mostly neglected. Furthermore, there is a conceptual lack of guidance and support for efficiently fulfilling NFRs in terms of software architecture in general. This paper aims at introducing the AFFINE framework simultaneously addressing these needs with (1) conceptually considering NFRs early in the development process, (2) explicitly balancing end-users? with developers? needs, and (3) a reference architecture providing support for NFRs. Constitutive requirements for AFFINE were gathered based on experiences from various projects on designing and implementing groupware systems. 2010 Human-Centred Software Engineering. Third International Conference, HCSE 2010, Reykjavik, Iceland, October 14-15, 2010. Proceedings 6409 Springer
Berlin
Lecture Notes in Computer Science 182—189 https://epub.uni-regensburg.de/28534/ Mohamed Bourimi Thomas Barth J. M. Haake Bernd Uebersch?r Dogan Kesdogan
incollection epub28537 Building usable and privacy-preserving mobile collaborative applications for real-life communities: A case study based report_百利宫_百利宫娱乐平台¥官网 Distributed collaborative applications for supporting complex use cases in mobile environments have to provide contextual information (e.g. presence and group awareness) via their user interface. Social interaction and data sharing - being essential aspects of distributed collaborative applications - typically result in conflicting goals, primarily awareness vs. privacy. Preserving the end users' privacy especially in mobile collaborative settings is the most often-cited point of critique of mobile and ubiquitous computing. Since usability is a prerequisite for privacy and awareness mechanisms especially for mobile applications, we report in this paper on how to balance usability, privacy, and awareness trade-offs when building mobile collaborative applications. This is complemented by new approaches for preserving privacy tailored to the needs of respective communities in the domain of decentralized group-centric solutions. The requirements were gathered through an analysis of user's needs as well as first evaluations of prototypes. Those were built for different case studies focusing on privacy, trust, and identity management in real-life communities. We report on the outcomes of our work and show this exemplary with the help of a mobile prototype application to support an Angling Community with privacy and collaboration needs related to location-based services. 2010 International Conference on Information Society (i-Society), London, 28-30 June 2010 IEEE https://epub.uni-regensburg.de/28537/ Mohamed Bourimi Bernd Uebersch?r E. Ganglbauer Dogan Kesdogan Thomas Barth J. Dax Marcel Heupel incollection epub28554 Cryptographic Protocol Analysis of AN.ON_百利宫_百利宫娱乐平台¥官网 This work presents a cryptographic analysis of AN.ON?s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the freshness of the session key was not checked by the mix. This flaw leads to a situation where an external attacker is able to perform a replay attack against AN.ON. A second, more severe, error was found in the encryption scheme of AN.ON. An internal attacker controlling the first mix in a cascade of length two is able to de-anonymize users with high probability. The third flaw results from the lack of checks to ensure that a message belongs to the current session. This enables an attacker to impersonate the last mix in a cascade. The flaws we discovered represent errors that, unfortunately, still occur quite often and show the importance of either using standardized crytpographic protocols or performing detailed security analyses. 2010 Financial Cryptography and Data Security. 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers 6052 Springer
Berlin
Lecture Notes in Computer Science 114—128 https://epub.uni-regensburg.de/28554/ Benedikt Westermann R. Wendolsky L. Pimenidis Dogan Kesdogan
incollection epub28538 Eine datenschutzfreundliche, ortsbezogene Groupware für das iPhone_百利宫_百利宫娱乐平台¥官网 2010 Sichere Mobilit?t und Dienstnutzung in künftigen Netzen. 4 . Essener Workshop ? Neue Herausforderungen in der Netzsicherheit ?, 15. /16. April 2010. Abstracts Univ. Duisburg-Essen 22—23 https://epub.uni-regensburg.de/28538/ pdf = alle Tagungsabstracts J. Dax Marcel Heupel Mohamed Bourimi Dogan Kesdogan article epub28535 Enhancing Privacy in Mobile Collaborative Applications By Enabling End-User Tailoring Of The Distributed Architecture_百利宫_百利宫娱乐平台¥官网 2010 International Journal for Infonomics 3 Infonomics Society 563—572 4 https://epub.uni-regensburg.de/28535/ Mohamed Bourimi J. M. Haake Marcel Heupel Bernd Uebersch?r Dogan Kesdogan Thomas Barth incollection epub28536 Evaluating potentials of Internet- and Web-based SocialTV in the light of privacy_百利宫_百利宫娱乐平台¥官网 In the current information technology age, the demand of tools that meet social interaction needs, e.g. SocialTV and Internet-based media advertisement, is gaining in importance. Thus privacy becomes a matter of concern in this respect. Social interactions comprises privacy risks and threats that may enable abuse, e.g., man-in-the-middle attacks based on profile analysis at the server-side. Since in the area of SocialTV current software as well as hardware solutions are mostly server-centric, one cannot fully eliminate accidental or intentional risks and threats even by the reconstruction of users' personal information and their interdependencies. In this paper, we report on results of an evaluation of the potentials of SocialTV by considering end-users' privacy based on lab and field trials. In these trials we enabled eighteen people of various ages and expertise to use centralized as well as decentralized (group-centric) solutions for SocialTV by means of a Web-based software prototype. Further, we describe the followed methodology used by the evaluation in order to allow porting it for future evaluations in other social contexts. 2010 IEEE Second International Conference on Social Computing (SocialCom), Minneapolis, MN, 20-22 Aug. 2010 IEEE https://epub.uni-regensburg.de/28536/ Mohamed Bourimi Dogan Kesdogan Thomas Barth K. H?fke Dhiah Abou-Tair incollection epub28556 Introducing Perfect Forward Secrecy for AN.ON_百利宫_百利宫娱乐平台¥官网 In this paper we discuss AN.ON?s need to provide perfect forward secrecy and show by an estimation of the channel build up time that the straight forward solution is not a practical solution. In the remaining paper we propose an improvement which enables AN.ON to provide perfect forward secrecy with respect to their current attacker model. Finally, we show that the delay, caused by our improvement, does not decrease the performance significantly. 2010 Networked Services and Applications - Engineering, Control and Management. 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings 6164 Springer
Berlin
Lecture Notes in Computer Science 132—142 https://epub.uni-regensburg.de/28556/ Benedikt Westermann Dogan Kesdogan
incollection epub28558 A Combinatorial Approach for an Anonymity Metric_百利宫_百利宫娱乐平台¥官网 A number of papers are suggested with the goal to measure the quality of anonymity of a given anonymity system. Most of them use the anonymity set as the basis for developing, reasoning about and applying measure. In this paper we argue that these approaches are premature. In this work we suggest to use the so called hypothesis set ? a term derived from possibilistic information flow theory. Investigating the hypothesis set, it is possible to make the ?protection structure? explicit and also define well known terms from measurement theory like scale and metric. We demonstrate our approach by evaluating the hypothesis set of the classical Chaumian Mix. 2009 Information Security and Privacy. 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings 5594 Springer
Berlin
Lecture Notes in Computer Science 26—43 https://epub.uni-regensburg.de/28558/ Dang Vinh Pham Dogan Kesdogan
book epub28546 iNetSec 2009-Open Research Problems in Network Security. IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers_百利宫_百利宫娱乐平台¥官网 2009 309 Springer
Berlin
IFIP Advances in Information and Communication Technology Jan Camenisch and Dogan Kesdogan https://epub.uni-regensburg.de/28546/ Jan Camenisch Dogan Kesdogan
incollection epub28544 Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems_百利宫_百利宫娱乐平台¥官网 Nowadays, collaboration and social interaction among people become everyday activities in our evolving information age. In many learning platforms, collaborative platforms in the educational and industrial field or social networks like LinkedIn or Xing, users have to disclose private information and reveal their identities. Working with those systems allows them to create user profiles which could reveal more information about the user, than he wants to give. Furthermore, such environments may construct profiles about users? interaction, which may be used for attacks; thus preserving privacy is an essential component of such environments. In this paper, a decentralized group-centric approach for tailoring collaboration according privacy needs is introduced. The main idea of our approach lays in its construction. In contrast to traditional collaboration environments with central hosting, our approach gives each group the whole responsibility of hosting the collaboration environment by using their own technical means. The feasibility of our approach is demonstrated through a lightweight ubiquitous collaboration platform. The experiences gathered are discussed. 2009 Groupware: Design, Implementation, and Use: 15th International Workshop, CRIWG 2009, Peso da Régua, Douro, Portugal, September 13-17, 2009. Proceedings 5784 Springer
Berlin
Lecture Notes in Computer Science 100—125 https://epub.uni-regensburg.de/28544/ Mohamed Bourimi Falk Kühnel J. M. Haake Dhiah Abou-Tair Dogan Kesdogan
incollection epub28541 Towards Building User-Centric Privacy-Respecting Collaborative Applications_百利宫_百利宫娱乐平台¥官网 The Internet is accepted as the de facto information support system in most areas of our professional and leisure life. Nowadays, a shift from single-user-centered usage to support multi-user needs can be observed either in professional life (e.g. when participating in collaborative business processes) and in leisure life activities (e.g. when participating in non-profit communities). The needed environment is provided through collaborative systems and social software (e.g. wikis, blogs, etc.). These environments provide e.g. shared workspaces, where collaborative processes and activities like document sharing, group formation, coordination and communication activities, etc. can take place. For this, collaborative settings need some degree of user?s information disclosure (e.g. partial or full identity revelation). Depending on the actual context and a users sensitivity to a (partial) loss of privacy in a given context a users trust in a system handling privacy is crucial for its acceptance and overall success. Many end-user expectations are covered by functional requirements (FRs), most end-user preferences (e.g. usability, response time) and concerns (e.g. privacy, security) are non-functional requirements (NFRs). Considering current approaches, nonfunctional requirements in general and being of special relevance in this context privacy requirements are not considered adequately in the development process and will become one key issue in future software development processes. In this short paper, we present four requirements derived from a case study in collaborative system design and implementation (CURE, s. [1] for details). A framework for adequate (i.e. earlier) consideration of NFR (e.g. privacy) is outlined. 2009 Intelligent Interactive Assistance and Mobile Multimedia Computing: International Conference, IMC 2009, Rostock-Warnemünde, Germany, November 9-11, 2009. Proceedings 53 Springer
Berlin
Communications in Computer and Information Science 341—342 https://epub.uni-regensburg.de/28541/ Mohamed Bourimi Thomas Barth Bernd Uebersch?r Dogan Kesdogan
inproceedings epub28595 Analyse der Verkettbarkeit in nutzergesteuertem Identit?tsmanagement_百利宫_百利宫娱乐平台¥官网 2008 Sicherheit 2008: Tagung der Fachgruppe Sicherheit, Schutz und Zuverl?ssigkeit in der Gesellschaft für Informatik https://epub.uni-regensburg.de/28595/ Dogan Kesdogan Dang Vinh Pham L. Pimenidis incollection epub30460 Analyse der Verkettbarkeit in nutzergesteuerten Identitit?tsmanagementsystemen_百利宫_百利宫娱乐平台¥官网 2008 Sicherheit 2008: Sicherheit, Schutz und Zuverl?ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ; 2. - 4. April 2008 im Saarbrücker Schloss 128 Ges. f. Informatik
Bonn
GI-Edition : Proceedings LNI Ammar Alkassar 17 — 30 https://epub.uni-regensburg.de/30460/ Dang Vinh Pham Dogan Kesdogan Lexi Pimenidis
inproceedings epub30466 Information Disclosure in Identity Management_百利宫_百利宫娱乐平台¥官网 2008 13th Nordic Conference in Secure IT Systems https://epub.uni-regensburg.de/30466/ Vinh Pham Dogan Kesdogan Lexi Pimenidis incollection epub28626 Information Disclosure in Identity Management_百利宫_百利宫娱乐平台¥官网 2007 Proceedings of 12th Nordic Workshop on Secure IT-Systems, Reykjavik, Iceland, 11-12 October 2007 https://epub.uni-regensburg.de/28626/ Dogan Kesdogan Vinh Pham L. Pimenidis incollection epub28641 Fundamental limits on the anonymity provided by the MIX technique_百利宫_百利宫娱乐平台¥官网 The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limits on the anonymity provided by the MIX technique are found by considering two different settings. First, we consider an information theoretic setting to determine the extent of information inherent in observations of the traffic passing through the MIX. We show that if the size of sender anonymity sets is less than the total user population, the information contained in traffic observations is sufficient to deduce all communication relationships between senders and receivers using the MIX. More importantly, we show that even if every user sends a message in each communication round, it is possible to compromise the anonymity significantly. We precisely characterize the extent of compromised anonymity in each case. In the second setting, we assume that the attacker has unlimited computational resources and is free to choose any attack algorithm. We derive tight upper and lower bounds on the minimum number of observations required to deduce all recipient peer-partners of a targeted user. The analysis done in these two settings reveals many discrete mathematical structures inherent in anonymity sets, and the intuition gained from these structures can be used when designing or using a MIX based anonymity technique. 2006 Symposium on Security and Privacy, 21-24 May 2006, Berkeley/Oakland, CA, USA IEEE 14—99 https://epub.uni-regensburg.de/28641/ Dogan Kesdogan Dakshi Agrawal Vinh Pham Dieter Rautenbach incollection epub28660 Identit?tsmanagement und das Risiko der Re-Identifikation_百利宫_百利宫娱乐平台¥官网 2006 Sicherheit 2006 : Otto-von-Guericke-Univ, Magdeburg, 20. - 22. Feb. 2006 77 Ges. f. Informatik
Bonn
GI-Edition : Proceedings Jana Dittmann 188—191 https://epub.uni-regensburg.de/28660/ Sebastian Clau? Dogan Kesdogan Tobias K?lsch L. Pimenidis Stefan Schiffner Sandra Steinbrecher
incollection epub28663 Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis_百利宫_百利宫娱乐平台¥官网 In the past, different intersection attacks on Chaum Mixes have been proposed and shown to work well in simulation environments. In this work we describe intersection attacks that have been performed on data from anonymized proxy log files. This approach creates all new problems that arise in real systems, where real-world users do not behave like those in the idealized model. E.g. the attack algorithm has to cope with a fixed number of observations. From the performed first experiments on the ?dirty? real world data we get valuable insight into theory and practice of real anonymizers. 2006 Quality of Protection. Security Measurements and Metrics 23 Springer
Berlin
Advances in Information Security 159—171 https://epub.uni-regensburg.de/28663/ First Workshop on Quality of Protection, Milan, Italy. September 2005 Dogan Kesdogan Tobias K?lsch Lexi Pimenidis
incollection epub28643 Safety, Liveness, and Information Flow: Dependability Revisited_百利宫_百利宫娱乐平台¥官网 2006 ARCS '06, 19th International Conference on Architecture of Computing Systems : March 16, 2006, Frankfurt am Main. Workshop proceedings 81 Ges. f. Informatik
Bonn
GI-Edition : Proceedings 56—65 https://epub.uni-regensburg.de/28643/ Zinaida Benenson Felix C. Freiling Thorsten Holz Dogan Kesdogan Lucia Draque Penso
article epub28637 Technical challenges of network anonymity_百利宫_百利宫娱乐平台¥官网 The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to anyone of just about any experience level. Thus, in many respects, the virtual world has become a viable alternative to our real world, where we can buy anything from a dishwasher to personal services, or publish any information we choose on a personal web site. With all of the convenience and freely available information that this virtual world provides, it has one major problem: in the real world people can nearly always exert some control over their privacy. If they choose, they can study in absolute solitude or meet with others in private rooms, or they can anonymously buy a magazine. However, on the Internet, users have few controls, if any, over the privacy of their actions. Each communication leaves trails here or there and there is always someone who can follow these trails back to the user. Thus, should we just forget about having privacy in the Internet as others have proclaimed? The one path towards enabling true network privacy is to provide anonymity. Anonymity services can allow users to carry out their activities anonymously and unobservably on the Internet. In this work, we investigate the following technical questions: what is network anonymity, what are the various techniques for reliably achieving anonymity, and what are their associated impacts on network performance and user experience. Our emphasis is on deployable systems for the Internet that provide strong anonymity against a strong attacker model. We present the network anonymity techniques (algorithms) suggested in the past and the ones currently in use, and then we discuss possible anonymity techniques of the future. We present the accepted terminology for discussing anonymity, and the definition and different measures of anonymity. However, throughout our discussions we pay particular attention to the analysis of network performance in the presence of anonymity mechanisms. 2006 Computer Communications 29 Elsevier 306—324 3 https://epub.uni-regensburg.de/28637/ Dogan Kesdogan C. Palmer incollection epub28664 The Lower Bound of Attacks on Anonymity Systems — A Unicity Distance Approach_百利宫_百利宫娱乐平台¥官网 During the last years a couple of attacks on generic anonymity protocols emerged, like e.g. the hitting-set attack. These attacks make use of informations gained by passively monitoring anonymizing networks to disclose the communication profile of the users. 2006 Quality of Protection. Security Measurements and Metrics 23 Springer
Berlin
Advances in Information Security 145—158 https://epub.uni-regensburg.de/28664/ First Workshop on Quality of Protection, Milan, Italy. September 2005 Dogan Kesdogan Lexi Pimenidis
incollection epub28639 TrustedPals: Secure Multiparty Computation Implemented with Smart Cards_百利宫_百利宫娱乐平台¥官网 We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, an efficient smart card based implementation of SMC for any number of participating entities in such a model. Security modules can be trusted by other processes and can establish secure channels between each other. However, their availability is restricted by their host, that is, a corrupted party can stop the computation of its own security module as well as drop any message sent by or to its security module. We show that in this model SMC can be implemented by reducing it to a fault-tolerance problem at the level of security modules. Since the critical part of the computation can be executed locally on the smart card, we can compute any function securely with a protocol complexity which is polynomial only in the number of processes (that is, the complexity does not depend on the function which is computed), in contrast to previous approaches. 2006 Computer Security ? ESORICS 2006. 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings 4189 Springer
Berlin
Lecture Notes in Computer Science 34—48 https://epub.uni-regensburg.de/28639/ Milan Fort Felix Freiling Lucia Draque Penso Zinaida Benenson Dogan Kesdogan
incollection epub28674 An Algorithmic Framework for Robust Access Control in Wireless Sensor Networks_百利宫_百利宫娱乐平台¥官网 If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We first determine security issues in the context of access control in sensor networks especially focusing on the problem of node capture, i.e., the possibility that an attacker can completely take over some of the sensor nodes. We then introduce the notion of t-robust sensor networks which can withstand capture of up to t nodes and consider three basic security concepts for such networks: (1) t-robust storage, a mechanism to securely store data within a set of sensors such that capture of any t sensors does not reveal that data to the adversary; (2) n-authentication which ensures that authentication is achieved with every uncompromised sensor in the broadcast range of a client (n denotes the number of nodes in that broadcast range); and (3) n-authorization, an authorization primitive with similar properties like n-authentication. We present a generic t-robust protocol for implementing access control using these primitives. 2005 Proceeedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN 2005) IEEE 158—165 https://epub.uni-regensburg.de/28674/ Zinaida Benenson Felix G?rtner Dogan Kesdogan incollection epub28665 Mit IDM und Mittler zu mehr Privatsph?re in LBS_百利宫_百利宫娱乐平台¥官网 n dieser Arbeit stellen wir eine Architektur und ein Protokoll für ortsbezogene Dienste vor, die die Privatsph?re der Benutzer schützen und den Verwaltungsaufwand zur Einrichtung eines Dienstes erheblich reduzieren. Dazu f?hren wir einen Ortsdatenvermittler ein, der Aufgaben der Ortsdatenverarbeitung übernimmt und so den Dienstanbieter von der Ortsdatenquelle trennt. Ein Gro?teil der Autorisierung und der Datenverwaltung wird dabei durch ein System zur automatischen Identit?tsverwaltung geleistet. In dieser Arbeit betrachten wir passive Dienste, welche Datenschutzrechtlich problematischer sind, da die Benutzerposition bei ihnen über einen l?ngeren Zeitraum verfolgt wird. 2005 Ortsbezogene Anwendungen und Dienste : 2. GI/ITG KuVS Fachgespr?ch, Stuttgart 2005.06.16-17 324 FernUniversit?t, Fachbereich Informatik
Hagen
Informatik-Berichte J?rg Roth 58—62 https://epub.uni-regensburg.de/28665/ Lothar Fritsch Tobias K?lsch Markulf Kohlweiss Dogan Kesdogan
incollection epub28661 Privacy Enhanced Identity Management: Design Considerations and Open Problems_百利宫_百利宫娱乐平台¥官网 User centric identity management will be necessary to protect user's privacy in an electronic society. However, designing such systems is a complex task, as the expectations of the different parties involved in electronic transactions have to be met. In this work we give an overview on the actual situation in user centric identity management and point out problems encountered there. Especially we present the current state of research and mechanisms useful to protect the user's privacy. Additionally we show security problems that have to be borne in mind while designing such a system and point out possible solutions. Thereby, we concentrate on attacks on linkability and identifiability, and possible protection methods. 2005 DIM '05. Proceedings of the 2005 ACM Workshop on Digital Identity Management, Nov. 11, George Mason University, Fairfax, VA, USA ACM
New York
84—93 https://epub.uni-regensburg.de/28661/ Sebastian Clau? Dogan Kesdogan Tobias K?lsch L. Pimenidis Stefan Schiffner Sandra Steinbrecher
incollection epub28673 Privacy for Profitable Location Based Services_百利宫_百利宫娱乐平台¥官网 Location based services (LBS) are distributed multi-party infrastructures with the opportunity to generate profitable m-business applications. Also, LBS pose a great risk for their users? privacy, as they have access to private information about a person?s whereabouts in a particular context. As location data is the essential input for LBS, protection of privacy in LBS is not a problem of providing anonymity by supressing data release, but a problem of identity management and control over information handling. In this paper we show a solution that ensures a LBS user?s control over location information with managed identities. At the same time, our solution enables profitable business models, e.g. for mobile telephony operators. Additionally, we provide fine-grained consent management for the LBS user. 2005 Security in Pervasive Computing. 2nd Internat. Conf., SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings 3450 Springer
Berlin
Lecture Notes in Computer Science 164—178 https://epub.uni-regensburg.de/28673/ Tobias K?lsch Lothar Fritsch Markulf Kohlweiss Dogan Kesdogan
incollection epub28672 Secure Multi-Party Computation with Security Modules_百利宫_百利宫娱乐平台¥官网 2005 Sicherheit 2005: Beitr?ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5.-8. April 2005 in Regensburg P-62 K?llen
Bonn
Lecture Notes in Informatics P Hannes Federrath https://epub.uni-regensburg.de/28672/ Zinaida Benenson Felix G?rtner Dogan Kesdogan
incollection epub28671 Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web (= Security Evaluation of Anonymity Techniques)_百利宫_百利宫娱乐平台¥官网 2005 Sicherheit 2005: Beitr?ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5.-8. April 2005 in Regensburg P-62 K?llen
Bonn
Lecture Notes in Informatics P Hannes Federrath https://epub.uni-regensburg.de/28671/ Dogan Kesdogan O. Rattay
incollection epub28677 The Hitting Set Attack on Anonymity Protocols_百利宫_百利宫娱乐平台¥官网 A passive attacker can compromise a generic anonymity protocol by applying the so called disclosure attack, i.e. a special traffic analysis attack. In this work we present a more efficient way to accomplish this goal, i.e. we need less observations by looking for unique minimal hitting sets. We call this the hitting set attack or just HS-attack. In general, solving the minimal hitting set problem is NP-hard. Therefore, we use frequency analysis to enhance the applicability of our attack. It is possible to apply highly efficient backtracking search algorithms. We call this approach the statistical hitting set attack or SHS-attack. However, the statistical hitting set attack is prone to wrong solutions with a given small probability. We use here duality checking algorithms to resolve this problem. We call this final exact attack the HS*-attack. 2005 Information Hiding. 6th Internat. Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers 3200 Springer
Berlin
Lecture Notes in Computer Science 326—339 https://epub.uni-regensburg.de/28677/ Dogan Kesdogan Lexi Pimenidis
incollection epub28675 User Authentication in Sensor Networks (extended abstract)_百利宫_百利宫娱乐平台¥官网 2004 Informatik 2004 : Informatik verbindet : Beitra?ge der 34. Jahrestagung der Gesellschaft fu?r Informatik e.V. (GI), Ulm, 20. - 24. September 2004 50-51 Ges. f. Informatik
Bonn
GI-Edition: Lecture notes in informatics (LNI). Proceedings Peter Daman https://epub.uni-regensburg.de/28675/ Zinaida Benenson Felix G?rtner Dogan Kesdogan
incollection epub28679 Limits of Anonymity in Open Environments_百利宫_百利宫娱乐平台¥官网 A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity providing technique is to establish an anonymity set. In open environments, such as the Internet, the established anonymity sets in the whole are observable and change with every anonymous communication. We use this fact of changing anonymity sets and present a model where we can determine the protection limit of an anonymity technique, i.e. the number of observations required for an attacker to ?break? uniquely a given anonymity technique. In this paper, we use the popular MIX method to demonstrate our attack. The MIX method forms the basis of most of the today?s deployments of anonymity services (e.g. Freedom, Onion Routing, Webmix). We note that our approach is general and can be applied equally well to other anonymity providing techniques. 2003 Information Hiding. 5th Internat. Workshop, IH 2002 Noordwijkerhout, The Netherlands, Oct. 7-9, 2002 Revised Papers 2578 Springer
Berlin
Lecture Notes in Computer Science 53—69 https://epub.uni-regensburg.de/28679/ Dogan Kesdogan Dakshi Agrawal Stefan Penz
article epub28680 Measuring Anonymity: The Disclosure Attack_百利宫_百利宫娱乐平台¥官网 The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated with whom, for how long, and from which location, by hiding traffic information. This is accomplished by organizing additional traffic to conceal particular communication relationships and by embedding the sender and receiver of a message in their respective anonymity sets. If the number of overall participants is greater than the size of the anonymity set and if the anonymity set changes with time due to unsynchronized participants, then the anonymity technique becomes prone to traffic analysis attacks. We are interested in the statistical properties of the disclosure attack, a newly suggested traffic analysis attack on the MIXes. Our goal is to provide analytical estimates of the number of observations required by the disclosure attack and to identify fundamental (but avoidable) 'weak operational modes' of the MIXes and thus to protect users against a traffic analysis by the disclosure attack. 2003 IEEE security & privacy 1 IEEE 27—34 6 https://epub.uni-regensburg.de/28680/ Dakshi Agrawal Dogan Kesdogan incollection epub28678 Probabilistic Treatment of MIXes to Hamper Traffic Analysis_百利宫_百利宫娱乐平台¥官网 The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated with whom, for how long, and from which location, by hiding traffic information. This is accomplished by organizing additional traffic to conceal particular communication relationships and by embedding the sender and receiver of a message in their respective anonymity sets. If the number of overall participants is greater than the size of the anonymity set and if the anonymity set changes with time due to unsynchronized participants, then the anonymity technique becomes prone to traffic analysis attacks. We are interested in the statistical properties of the disclosure attack, a newly suggested traffic analysis attack on the MIXes. Our goal is to provide analytical estimates of the number of observations required by the disclosure attack and to identify fundamental (but avoidable) 'weak operational modes' of the MIXes and thus to protect users against a traffic analysis by the disclosure attack. 2003 SP '03 : Proceedings of the 2003 IEEE Symposium on Security and Privacy, 11-14 May 2003, Oakland, CA, USA IEEE CS Press
Washington, DC
16—27 https://epub.uni-regensburg.de/28678/ Dakshi Agrawal Dogan Kesdogan Stefan Penz
incollection epub28681 Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?_百利宫_百利宫娱乐平台¥官网 The technique "Private Information Retrieval" (PIR) perfectly protects a user?s access pattern to a database. An attacker cannot observe (or determine) which data element is requested by a user and so cannot deduce the interest of the user. We discuss the application of PIR on the World Wide Web and compare it to the MIX approach. We demonstrate particularly that in this context the method does not provide perfect security, and we give a mathematical model for the amount of information an attacker could obtain. We provide an extension of the method under which perfect security can still be achieved. 2003 Privacy Enhancing Technologies : 2nd Internat. Worksh., PET 2002, San Francisco, CA, USA, April 14?15, 2002. Revised Papers 2482 Springer
Berlin
Lecture Notes in Computer Science 224—238 https://epub.uni-regensburg.de/28681/ Dogan Kesdogan Max Borning Michael Schmeink
article epub28700 Anonymit?t und Unbeobachtbarkeit im Internet (= Anonymity and unobservability in the Internet)_百利宫_百利宫娱乐平台¥官网 Durch seine vielf?ltigen M?glichkeiten spielt das Internet in immer mehr Bereichen des privaten und ?ffentlichen Lebens eine zunehmende Rolle. Ein spezieller Bereich ist der E-Commerce, der den elektronischen Handel im Allgemeinen und die wirtschaftlichen Beziehungen zwischen Anbietern, Kunden und anderen Akteuren im Speziellen bezeichnet. 百利宫_百利宫娱乐平台¥官网e gestiegene Bedeutung des Internets in vielen Bereichen des Lebens steigert auch das Interesse seitens Dritter, durch Beobachtung m?glichst viel über einzelne Personen, ihre Interessen und Neigungen mittels des Internets in Erfahrung zu bringen. In diesem Artikel werden daher verschiedene Verfahren vorgestellt, die einen gewissen Schutz vor solchen Angriffen bieten. With its broad variety of potential uses the Internet is becoming more and more important in many areas of both private and public life. This holds particularly for Electronic Commerce, i.e., electronic transactions between businesses, consumers, and potentially other actors. With the increasing importance of the Internet especially in this domain, third parties may want to illegally obtain as much information as possible about the acting parties through espionage. This article discusses some methods that offer protection against such attacks. 2001 Information technology : it 43 Oldenbourg 254—263 4 https://epub.uni-regensburg.de/28700/ Mark Borning Dogan Kesdogan Otto Spaniol incollection epub28699 Die Blinded-Read-Methode zum unbeobachtbaren Surfen im WWW (=Anonymous Surfing on the World Wide Web)_百利宫_百利宫娱乐平台¥官网 2001 Verl?ssliche IT-Systeme : Sicherheit in komplexen IT-Infrastrukturen Vieweg
Wiesbaden
37—54 https://epub.uni-regensburg.de/28699/ Dogan Kesdogan Mark Borning Michael Schmeink
incollection epub28545 Enhancing Trust in SOA Based Collaborative Environments_百利宫_百利宫娱乐平台¥官网 Considering trust and privacy requirements for online and collaborative distance learning environments, this paper discusses potential extensions of SOA based applications to simultaneously support authentication and authorization services, and offering mutual trust to both learners and service providers. This study shows that the security mechanisms integrated in the SOA platform can be effectively extended and correlated with a trust model. 2001 Systems and Virtualization Management. Standards and the Cloud Third International DMTF Academic Alliance Workshop, SVM 2009, Wuhan, China, September 22-23, 2009. Revised Selected Papers 71 Springer
Berlin
Communications in Computer and Information Science 94—102 https://epub.uni-regensburg.de/28545/ Latifa Boursas Mohamed Bourimi Wolfgang Hommel Dogan Kesdogan
incollection epub28698 Evaluation of Anonymity Providing Techniques using Queuning Theory_百利宫_百利宫娱乐平台¥官网 2001 Proceedings / LCN 2001, 26th Annual IEEE Conference on Local Computer Networks : 14 - 16 November 2001, Tampa, Florida IEEE CS Press
Los Alamitos, Calif.
https://epub.uni-regensburg.de/28698/ Dogan Kesdogan
incollection epub28684 How to go Shopping on the World Wide Web without having your Privacy Violated_百利宫_百利宫娱乐平台¥官网 2001 4th Int. Conf. on Electronic Commerce Research (ICECR-4), Dallas, TX, USA, Nov. 8-11, 2001 Southern Methodist Univ.
Dallas, TX, USA
529—240 https://epub.uni-regensburg.de/28684/ Kathy Bohrer Xuan Liu Dogan Kesdogan Edith Schonberg Muninder Singh
incollection epub28683 Personal Information Management and Distribution_百利宫_百利宫娱乐平台¥官网 2001 4th Int. Conf. on Electronic Commerce Research (ICECR-4), Dallas, TX, USA, Nov. 8-11, 2001 Southern Methodist Univ.
Dallas, TX, USA
https://epub.uni-regensburg.de/28683/ Kathy Bohrer Xuan Liu Dogan Kesdogan Edith Schonberg Moninder Singh Susan L. Spraragen
inproceedings epub28696 Privacy in E-Commerce_百利宫_百利宫娱乐平台¥官网 2001 International Conference on Multimedia Internet, Video Technologies (MIV'01),World Scientific and Engineering Society (WSES) https://epub.uni-regensburg.de/28696/ Mark Borning Dogan Kesdogan book epub28708 Privacy im Internet : vertrauenswürdige Kommunikation in offenen Umgebungen_百利宫_百利宫娱乐平台¥官网 2000 Braunschweig
Vieweg
https://epub.uni-regensburg.de/28708/ Zugl.: Aachen, Techn. Hochsch., Diss., 1999 Dogan Kesdogan
incollection epub28707 ?bersicht und Bewertung von VPN-Produktl?sungen (=Overview and Evaluation of VPN Solutions)_百利宫_百利宫娱乐平台¥官网 2000 7. Workshop Sicherheit in Vernetzten Systemen : 8. und 9. M?rz 2000, Hamburg ( DFN-CERT) 90 Verein zur F?rderung eines Deutschen Forschungsnetzes
Berlin
DFN-Bericht https://epub.uni-regensburg.de/28707/ Dogan Kesdogan M. Sch?ffter
inproceedings epub28712 Active Intrusion Detection - An Approach To Dynamic Risk Management_百利宫_百利宫娱乐平台¥官网 1999 Proceedings of the 4th Nordic Workshop on Secure IT systems (NordSec?99) https://epub.uni-regensburg.de/28712/ Roland Büschkes Tobias Haustein Dogan Kesdogan incollection epub28709 Klassifizierung von Anonymisierungstechniken (= Classification of Anonymization Techniques)_百利宫_百利宫娱乐平台¥官网 Mit der fortschreitenden Vernetzung von Rechner- und Kommunikationssystemen gewinnen datenschutzfreundliche Technologien zunehmend an Bedeutung. In der aktuellen Literatur werden verschiedene Techniken diskutiert, die insbesondere auch die Anonymisierung der Nutzer erm?glichen und deren Unbeobachtbarkeit sicherstellen. Für den Nutzer, der solche Techniken anwenden will, ist es wichtig, die verschiedenen vorgeschlagenen Techniken im Hinblick auf ihre Sicherheit und Leistungsf?higkeit bewerten und vergleichen zu k?nnen. In dieser Arbeit wird die bisher auf dem Gebiet existierende modelltheoretische Welt erweitert und Klassifizierungsgr??en vorgeschlagen, welche die geforderte Einordnung der Techniken erm?glichen. Die exemplarische Anwendung dieser Gr??en auf aktuell diskutierte Anonymisierungstechniken wird dazu genutzt, einen ?berblick über den aktuellen Forschungsstand auf dem Gebiet zu geben. 1999 Sicherheitsinfrastrukturen : Grundlagen, Realisierungen, rechtliche Aspekte, Anwendungen Vieweg
Braunschweig
331—332 https://epub.uni-regensburg.de/28709/ Dogan Kesdogan Roland Büschkes
incollection epub28713 Privacy Enhanced Intrusion Detection_百利宫_百利宫娱乐平台¥官网 1999 Multilateral security in communications : [basis of the International Conference on Multilateral Security in Communications, to be held on the 16th and 17th of July 1999 in Stuttgart]. Vol. 3 Addison-Wesley
München
https://epub.uni-regensburg.de/28713/ Roland Büschkes Dogan Kesdogan
incollection epub28714 Stop-And-Go-MIXes Providing Pro-babilistic Anonymity in an Open System_百利宫_百利宫娱乐平台¥官网 1999 Multilateral security in communications : [basis of the International Conference on Multilateral Security in Communications, to be held on the 16th and 17th of July 1999 in Stuttgart]. Vol. 3 Addison-Wesley
München
https://epub.uni-regensburg.de/28714/ Dogan Kesdogan Roland Büschkes Otto Spaniol
incollection epub28710 Strategies for Minimizing the Average Cost of Paging on the Air Interface_百利宫_百利宫娱乐平台¥官网 Location Management of mobile users in a cellular network covers tracking and paging (searching) functionality. In this paper a sequential search strategy is proposed which reduces the signaling on the air interface and also considers the user?s privacy using implicit addresses. After introducing some related work on paging and reducing the costs of paging, the basic idea of the search strategy is described. The used paging methods are crucial for the effectiveness of this strategy. For that, three different paging methods are proposed using fixed and variable segment sizes. The methods are evaluated according to their costs in terms of delay, bandwidth and paging steps. For that the model is described we used for our simulations. Metrics are defined to evaluate the strategies before presenting our results using an event-driven simulation. 1999 Kommunikation in Verteilten Systemen (KiVS): 11. ITG/GI-Fachtagung. Darmstadt, 2.-5. M?rz 1999 Springer
Berlin
488—499 https://epub.uni-regensburg.de/28710/ Dogan Kesdogan A. Trofimov D. Trossen
incollection epub28711 Transaction-based Anomaly Detection_百利宫_百利宫娱乐平台¥官网 The increasing complexity of both tele and data communication networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse by in- and outsiders is becoming more and more difficult. This paper deals with a new technique that appears to be suitable for solving these issues, i.e. anomaly detection based on the specification of transactions. The traditional transaction and serialization concepts are discussed, and a new model of anomaly detection, based on the concept of transactions, is introduced. Applying this model to known attacks gives a first insight concerning the feasibility of our approach. 1999 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, USA. Prodeedings www.usenix.org 129—134 https://epub.uni-regensburg.de/28711/ Roland Büschkes Mark Borning Dogan Kesdogan incollection epub28715 Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks_百利宫_百利宫娱乐平台¥官网 One of the major security aspects in mobile communication networks concerns information about the localization of the (mobile) network user. This information may be protected by establishing a trusted third party that is responsible for creating suitable pseudonyms for the user identity. Distributing the maintenance of pseudonyms among n independent trusted parties allows to increase further the security of location information. In this paper, a method is proposed that guarantees security as long as at least one of the n parties may definitely be trusted whereas the other parties may turn out to be corrupt. The pseudonym collision probability is derived analytically before a detailed OPNET simulation evaluates the cost of the new approach compared to standard GSM. 1998 Computer Security — ESORICS 98 : 5th Europ. Symp. on Research in Computer Security, Louvain-la-Neuve, Belgium, Sept. 16?18, 1998. Proceedings 1485 Springer
Berlin
Lecture Notes in Computer Science 295—312 https://epub.uni-regensburg.de/28715/ Dogan Kesdogan Peter Reichl Klaus Jungh?rtchen
incollection epub28717 How to Increase Security in Mobile Networks by Anomaly Detection_百利宫_百利宫娱乐平台¥官网 The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- and outsiders becomes more and more difficult. This paper deals with a relatively new technique that appears to be suitable for solving these issues, i.e. anomaly detection based on profiling mobile users. Mobility pattern generation and behavior prediction are discussed in depth, before a new model of anomaly detection that is based on the Bayes decision rule is introduced. Applying this model to mobile user profiles proves the feasibility of our approach. Finally, a special emphasis is put on discussing privacy aspects of anomaly detection. 1998 14th Annual Computer Security Applications Conference, Phoenix, AZ, 07-11 Dec 1998; Proceedings IEEE 3—12 https://epub.uni-regensburg.de/28717/ Roland Büschkes Dogan Kesdogan Peter Reichl inproceedings epub28716 Intrusion Detection and User Privacy - A Natural Contradiction?_百利宫_百利宫娱乐平台¥官网 1998 International Symposium on Recent Advances in intrusion Detection 1998 (RAID 98) https://epub.uni-regensburg.de/28716/ Roland Büschkes Dogan Kesdogan incollection epub28719 Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks_百利宫_百利宫娱乐平台¥官网 The information about the location of a mobile user belongs to the most sensitive data within mobile communication networks. One possibility to protect it especially against curious insiders with access to the network consists of storing the actual information in so-called ?home trusted devices? and using temporary pseudonyms for user registration in the network databases. This paper presents a detailed OPNET simulation and evaluation of the signalling cost of this approach compared to standard GSM. 1998 Computer Performance Evaluation. Modelling Techniques and Tools, 10th International Conference, Tools?98 Palma de Mallorca, Spain, September 14?18, 1998 Proceedings 1469 Springer
Berlin
Lecture Notes in Computer Science 105—116 https://epub.uni-regensburg.de/28719/ Peter Reichl Dogan Kesdogan Klaus Jungh?rtchen Marko Schuba
incollection epub28718 Stop-And-Go-MIXes Providing Probabilistic Anonymity in an Open System_百利宫_百利宫娱乐平台¥官网 Currently known basic anonymity techniques depend on identity verification. If verification of user identities is not possible due to the related management overhead or a general lack of information (e.g. on the Internet), an adversary can participate several times in a communication relationship and observe the honest users. In this paper we focus on the problem of providing anonymity without identity verification. The notion of probabilistic anonymity is introduced. Probabilistic anonymity is based on a publicly known security parameter, which determines the security of the protocol. For probabilistic anonymity the insecurity, expressed as the probability of having only one honest participant, approaches 0 at an exponential rate as the security parameter is changed linearly. Based on our security model we propose a new MIX variant called ?Stop-and-Go-MIX? (SG-MIX) which provides anonymity without identity verification, and prove that it is probabilistically secure. 1998 Information Hiding. 2nd Internat.l Workshop, IH?98, Portland, Oregon, USA, April 14?17, 1998. Proceedings 1525 Springer
Berlin
Lecture Notes in Computer Science 83—98 https://epub.uni-regensburg.de/28718/ Dogan Kesdogan Jan Egner Roland Büschkes
incollection epub7410 Allokation von Sicherheitsfunktionen in Telekommunikationsnetzen_百利宫_百利宫娱乐平台¥官网 1997 Mehrseitige Sicherheit in der Kommunikationstechnik. 2 B?nde Addison-Wesley-Longman
Bonn
Reihe Informationssicherheit Günter Müller and Andreas Pfitzmann 325—357 Security in general (overviews/surveys) https://epub.uni-regensburg.de/7410/ Reiner Sailer Hannes Federrath Anja Jerichow Dogan Kesdogan Andreas Pfitzmann
inproceedings epub7401 Minimizing the Average Cost of Paging on the Air Interface — An Approach Considering Privacy_百利宫_百利宫娱乐平台¥官网 1997 IEEE 47th Annual International Vehicular Technology Conference (VTC) Mobile communication https://epub.uni-regensburg.de/7401/ erschienen in: Technology in motion / 1997 IEEE 47th Vehicular Technology Conference. 3 B?nde. Piscataway, NJ: IEEE Service Center, 1997. ISBN 0-7803-3659-3; 0-7803-3660-7; 0-7803-4075-2; 0-7803-3661-5. Hannes Federrath Anja Jerichow Dogan Kesdogan Andreas Pfitzmann Dirk Trossen incollection epub7408 Mobilkommunikation ohne Bewegungsprofile_百利宫_百利宫娱乐平台¥官网 1997 Mehrseitige Sicherheit in der Kommunikationstechnik. 2 B?nde Addison-Wesley-Longman
Bonn
Reihe Informationssicherheit Günter Müller and Andreas Pfitzmann 169—180 Mobile communication https://epub.uni-regensburg.de/7408/ Nachdruck des in it+ti 38/4 (1996) erschienenen Artikels Hannes Federrath Anja Jerichow Dogan Kesdogan Andreas Pfitzmann Otto Spaniol
inproceedings epub28723 Analysis of Security and Privacy in Mobile-IP_百利宫_百利宫娱乐平台¥官网 1996 Fourth International Conference on Telecommunication Systems 96, Modelling and Analysis https://epub.uni-regensburg.de/28723/ Andreas Fasbender Dogan Kesdogan Olaf Kubitz inproceedings epub7414 Location management strategies increasing privacy in mobile communication_百利宫_百利宫娱乐平台¥官网 1996 IFIP SEC, International Information Security Conference; 12 39—48 Mobile communication https://epub.uni-regensburg.de/7414/ Titel der proceedings: Katsikas, Sokratis K. (Hrsg.): Information systems security: facing the information society of the 21st century/ IFIP SEC '96 Conference. London: Chapman & Hall, 1996. ISBN 0-412-78120-4 Dogan Kesdogan Hannes Federrath Anja Jerichow Andreas Pfitzmann incollection epub28721 Mobile User Profile Generation - A Challenge between Performance and Security_百利宫_百利宫娱乐平台¥官网 1996 Proc. of the 2nd Workshop on Personal Wireless Communications, Frankfurt a.M., Germany, 1Dec 10-11 1996 (IFIP TC 6) Univ.
Frankfurt am Main
63—74 https://epub.uni-regensburg.de/28721/ Dogan Kesdogan Margarethe Zywiecki Klaus Beulen
article epub7416 Mobilkommunikation ohne Bewegungsprofile_百利宫_百利宫娱乐平台¥官网 1996 Informationstechnik und technische Informatik: it + ti 38 Oldenbourg 24—29 4 Mobile communication https://epub.uni-regensburg.de/7416/ Hannes Federrath Anja Jerichow Dogan Kesdogan Andreas Pfitzmann Otto Spaniol incollection epub28724 Secure Location Management in UMTS, Communications and Multimedia Security_百利宫_百利宫娱乐平台¥官网 1996 Communications and multimedia security II : Proc. of the IFIP TC6/TC11 Internat. Conf. on Communications and Multimedia Security, Essen, Germany, 23rd-24th Sept. 1996 Chapman &Hall
London
https://epub.uni-regensburg.de/28724/ Simon Hoff Kai Jakobs Dogan Kesdogan
incollection epub28722 Variable and Scaleable Security Protection of Location Information in Mobile-IP_百利宫_百利宫娱乐平台¥官网 The amount of mobile and nomadic computing is expected to increase dramatically in the near future. Hand in hand with this ubiquitous mobile computing security and privacy problems show up, which have not been dealt with sufficiently up to now. The main problems are traffic analysis and the easy access to location information, for example in the popular Internet just by looking at the address headers of messages. The need for security and privacy supporting networks is discussed. We present the nondisclosure method (NDM) as a way to provide the user with variable and scalable security and privacy. We exemplarily demonstrate the applicability of NDM in an existing network by presenting an upward compatible protocol extension to the Internet protocol (IP), the secure IP in IP protocol. Its main design goal is the untraceability of network connections in mobile environments 1996 Mobile Technology for the Human Race. IEEE 46th Vehicular Technology Conference, Atlanta, GA, USA, 28 Apr 1996-01 May 1996. Vol. 2 IEEE 963—967 https://epub.uni-regensburg.de/28722/ Andreas Fasbender Dogan Kesdogan Olaf Kubitz article epub7418 Erreichbarkeitsmanagement_百利宫_百利宫娱乐平台¥官网 1995 Praxis der Informationsverarbeitung und Kommunikation: PIK 18 Saur 231—234 3 Security in general (overviews/surveys) https://epub.uni-regensburg.de/7418/ Andreas Bertsch Herbert Damker Hannes Federrath Dogan Kesdogan Michael Schneider