30.01.2014 Aufrufe

Abstract-Band - Fakultät für Informatik, TU Wien - Technische ...

Abstract-Band - Fakultät für Informatik, TU Wien - Technische ...

Abstract-Band - Fakultät für Informatik, TU Wien - Technische ...

MEHR ANZEIGEN
WENIGER ANZEIGEN

Erfolgreiche ePaper selbst erstellen

Machen Sie aus Ihren PDF Publikationen ein blätterbares Flipbook mit unserer einzigartigen Google optimierten e-Paper Software.

the simulation of human movements in areas such as sports, orthopedics or<br />

medicine. As part of our investigations, we assess the accuracy of the used<br />

scanner (Vitronic VI<strong>TU</strong>S smart 3D Bodyscanner). Basic sources of error such as<br />

the distance between scan lines, scan holes and geometric distortions are<br />

discussed, and their influence on the body measurements is further explored.<br />

We finally demonstrate the performance and repeatability of our automatic<br />

measurements in xperiments with several test persons and compare the<br />

results with manual reference measurements.<br />

Arbeitsbereich Information & Software Engineering<br />

Thomas Baumann<br />

Trusted Backups Prototyp eines Backup Tools zum Erstellen von<br />

vertrauenswürdigen Backups mittels TPM (TC)<br />

Studium: Masterstudium Wirtschaftsinformatik<br />

Betreuer: Privatdoz. Dr. Edgar Weippl<br />

Presently a higher and higher value is attached to data security. Companies<br />

become aware of the importance of protecting their data against illegal thirdparty<br />

access. One area that is often overlooked or underestimated is the one<br />

of the security of backups. They must also be protected from unauthorized<br />

access. One approach to achieve this level of security is to encrypt the<br />

backups. A particularly promising approach in this area is the encryption using<br />

Trusted Computing. Data is tied to a hardware chip of a specific physical<br />

hardware and can only be restored on this very platform on which it was<br />

previously made. Despite the number of backup programs that can be found<br />

on the market, there are none that fulfil this security requirement<br />

satisfactorily. Therefore this thesis describes scenarios that were developed in<br />

order to represent the basic use cases for the procedure of backup. The<br />

backup systems already on the market as well as the use cases are analysed.<br />

Based on the obtained findings, basic requirements for a backup program<br />

that is optimal in terms of trustworthiness are developed. Using these criteria,<br />

a concept for a prototype of an ideal backup program is created. The paper<br />

discusses the problems which arise in the development of such a program<br />

and describes the solutions to overcome these problems. The solutions lead<br />

to the creation of specifications and the choice of technologies in order to<br />

use them for the backup prototype. Furthermore, the prototype is<br />

implemented and this paper describes which tools are used for this<br />

implementation and what operations are performed. The reader should thus<br />

be enabled to understand this program as well as to adjust it to his own<br />

needs. After the implementation of the prototype extensive tests of this<br />

program and the abstract concept of trusted backups are conducted. In order<br />

to do so, abuse cases were developed and applied to the previously created<br />

scenarios.<br />

20

Hurra! Ihre Datei wurde hochgeladen und ist bereit für die Veröffentlichung.

Erfolgreich gespeichert!

Leider ist etwas schief gelaufen!