Views
5 years ago

x - Faculty of Computer Science - Technische Universität Dresden

x - Faculty of Computer Science - Technische Universität Dresden

protection concerning

protection concerning protection against designer and producer of the tools to design and produce designer of the system producer of the system service and maintenance user of the system outsiders Which protection measures against which attacker ? operator of the system to achieve the intended to prevent the unintended intermediate languages and intermediate results, which are analyzed independently see above + several independent designers independent analysis of the product control as if a new product, see above restrict physical access, restrict and log logical access physical and logical restriction of access protect the system physically and protect data cryptographically from outsiders physical distribution and redundance confidentiality, unobservability, anonymity, unlinkability: avoid the ability to gather “unnecessary data” 40

money time Considered maximal strength of the attacker attacker model It‘s not possible to protect against an omnipotent attacker. – roles of the attacker (outsider, user, operator, service and maintenance, producer, designer …), also combined – area of physical control of the attacker – behavior of the attacker • passive / active • observing / modifying (with regard to the agreed rules) – stupid / intelligent • computing capacity: – not restricted: computationally unrestricted – restricted: computationally restricted 41

faculty of computer science - Fakultät Informatik - Technische ...
Optimierung und Frustration: - Technische Universität Dresden
Statistics beyond Physics - Technische Universität Dresden
OCL By Example Lecture - Technische Universität Dresden
Graphs - Www-st.inf.tu-dresden.de - Technische Universität Dresden
2. Mobile Internet - Faculty of Computer Science - Technische ...
3. Mobile Internet - Faculty of Computer Science - Technische ...
4. Context Awareness - Faculty of Computer Science - Technische ...
3. Adaptation - Faculty of Computer Science - Technische ...
5. Adaptation - Faculty of Computer Science - Technische ...
Wiki Event Navigation - Computer Networks - Technische Universität ...
02 - Technische Universität Dresden
Content Sharing - Technische Universität Dresden
7. Location-based Se.. - Faculty of Computer Science - Technische ...
6. Context Awareness - Faculty of Computer Science - Technische ...
Computer Science and Engineering - Technische Universiteit ...
5. Location-based Se.. - Faculty of Computer Science - Technische ...
First Presentation - Faculty of Computer Science
diplomarbeit - Computer Networks - Technische Universität Dresden
Technische Universität Dresden - Computer Networks - Technische ...
TRANSCRIPT OF RECORDS - Technische Universität Dresden