Inproceedings3112: Unterschied zwischen den Versionen
Mde (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „{{Publikation Erster Autor |ErsterAutorNachname=Decker |ErsterAutorVorname=Michael }} {{Publikation Author |Rank=2 |Author=Gunther Schiefer }} {{Inproceedings |Re…“) |
Mde (Diskussion | Beiträge) |
||
Zeile 13: | Zeile 13: | ||
|Month=Oktober | |Month=Oktober | ||
|Booktitle=Proceedings of eChallenges 2010 | |Booktitle=Proceedings of eChallenges 2010 | ||
− | |Publisher= | + | |Organization=IIMC |
+ | |Publisher=IEEE | ||
|Address=Warsaw, Poland | |Address=Warsaw, Poland | ||
}} | }} | ||
Zeile 31: | Zeile 32: | ||
is a dynamic access control which considers contextual information for making access | is a dynamic access control which considers contextual information for making access | ||
control decisions. | control decisions. | ||
+ | |Link=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5756547 | ||
|Projekt=SumoDacs | |Projekt=SumoDacs | ||
|Forschungsgruppe=Betriebliche Informationssysteme | |Forschungsgruppe=Betriebliche Informationssysteme |
Aktuelle Version vom 27. Mai 2011, 09:38 Uhr
The SumoDacs-Project: Secure Mobile Data Access with a Tamperproof Hardware Token
The SumoDacs-Project: Secure Mobile Data Access with a Tamperproof Hardware Token
Published: 2010
Oktober
Buchtitel: Proceedings of eChallenges 2010
Verlag: IEEE
Erscheinungsort: Warsaw, Poland
Organisation: IIMC
Referierte Veröffentlichung
BibTeX
Kurzfassung
Most experts would support the statement that mobile computers with the
capability of wireless data communication (e.g., smartphones, netbooks) provide a
great potential for the improvement of business processes. Using these technologies
mobile employees can access enterprise information systems when they are working
outside their company’s premises. However, the employment of mobile technologies
comes along with specific security issues: mobile computers often get lost or stolen
and wireless data communication is much more vulnerable than conventional communication.
To tackle these security issues the project SumoDacs was initiated. SumoDacs
is based on the employment of a so called Hardware Security Token, which
is a special smart card that is resistant even against direct physicals attacks. The enterprise
systems to be accessed reside in a secured network segment and are connected
with special wrappers to a dedicated security server. A further special feature
is a dynamic access control which considers contextual information for making access
control decisions.
Weitere Informationen unter: Link
Betriebliche Informationssysteme