Abstract-Band - Fakultät für Informatik, TU Wien - Technische ...
Abstract-Band - Fakultät für Informatik, TU Wien - Technische ...
Abstract-Band - Fakultät für Informatik, TU Wien - Technische ...
Erfolgreiche ePaper selbst erstellen
Machen Sie aus Ihren PDF Publikationen ein blätterbares Flipbook mit unserer einzigartigen Google optimierten e-Paper Software.
the simulation of human movements in areas such as sports, orthopedics or<br />
medicine. As part of our investigations, we assess the accuracy of the used<br />
scanner (Vitronic VI<strong>TU</strong>S smart 3D Bodyscanner). Basic sources of error such as<br />
the distance between scan lines, scan holes and geometric distortions are<br />
discussed, and their influence on the body measurements is further explored.<br />
We finally demonstrate the performance and repeatability of our automatic<br />
measurements in xperiments with several test persons and compare the<br />
results with manual reference measurements.<br />
Arbeitsbereich Information & Software Engineering<br />
Thomas Baumann<br />
Trusted Backups Prototyp eines Backup Tools zum Erstellen von<br />
vertrauenswürdigen Backups mittels TPM (TC)<br />
Studium: Masterstudium Wirtschaftsinformatik<br />
Betreuer: Privatdoz. Dr. Edgar Weippl<br />
Presently a higher and higher value is attached to data security. Companies<br />
become aware of the importance of protecting their data against illegal thirdparty<br />
access. One area that is often overlooked or underestimated is the one<br />
of the security of backups. They must also be protected from unauthorized<br />
access. One approach to achieve this level of security is to encrypt the<br />
backups. A particularly promising approach in this area is the encryption using<br />
Trusted Computing. Data is tied to a hardware chip of a specific physical<br />
hardware and can only be restored on this very platform on which it was<br />
previously made. Despite the number of backup programs that can be found<br />
on the market, there are none that fulfil this security requirement<br />
satisfactorily. Therefore this thesis describes scenarios that were developed in<br />
order to represent the basic use cases for the procedure of backup. The<br />
backup systems already on the market as well as the use cases are analysed.<br />
Based on the obtained findings, basic requirements for a backup program<br />
that is optimal in terms of trustworthiness are developed. Using these criteria,<br />
a concept for a prototype of an ideal backup program is created. The paper<br />
discusses the problems which arise in the development of such a program<br />
and describes the solutions to overcome these problems. The solutions lead<br />
to the creation of specifications and the choice of technologies in order to<br />
use them for the backup prototype. Furthermore, the prototype is<br />
implemented and this paper describes which tools are used for this<br />
implementation and what operations are performed. The reader should thus<br />
be enabled to understand this program as well as to adjust it to his own<br />
needs. After the implementation of the prototype extensive tests of this<br />
program and the abstract concept of trusted backups are conducted. In order<br />
to do so, abuse cases were developed and applied to the previously created<br />
scenarios.<br />
20