Skip to main content

Showing 1–6 of 6 results for author: Kunz, I

Searching in archive cs. Search in all archives.
.
  1. owl2proto: Enabling Semantic Processing in Modern Cloud Micro-Services

    Authors: Christian Banse, Angelika Schneider, Immanuel Kunz

    Abstract: The usefulness of semantic technologies in the context of security has been demonstrated many times, e.g., for processing certification evidence, log files, and creating security policies. Integrating semantic technologies, like ontologies, in an automated workflow, however, is cumbersome since they introduce disruptions between the different technologies and data formats that are used. This is es… ▽ More

    Submitted 10 November, 2024; originally announced November 2024.

    Comments: Accepted for publication at KEOD 2024

    Report number: Proceedings of the 16th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K 2024) - Volume 2: KEOD

  2. Poster: Patient Community -- A Test Bed For Privacy Threat Analysis

    Authors: Immanuel Kunz, Angelika Schneider, Christian Banse, Konrad Weiss, Andreas Binder

    Abstract: Research and development of privacy analysis tools currently suffers from a lack of test beds for evaluation and comparison of such tools. In this work, we propose a benchmark application that implements an extensive list of privacy weaknesses based on the LINDDUN methodology. It represents a social network for patients whose architecture has first been described in an example analysis conducted b… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

    Comments: 3 pages, 1 figure

    Journal ref: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2022. S. 3383-3385

  3. Application-Oriented Selection of Privacy Enhancing Technologies

    Authors: Immanuel Kunz, Andreas Binder

    Abstract: To create privacy-friendly software designs, architects need comprehensive knowledge of existing privacy-enhancing technologies (PETs) and their properties. Existing works that systemize PETs, however, are outdated or focus on comparison criteria rather than providing guidance for their practical selection. In this short paper we present an enhanced classification of PETs that is more application-… ▽ More

    Submitted 15 June, 2022; originally announced June 2022.

    Journal ref: Annual Privacy Forum. Springer, Cham, 2022. S. 75-87

  4. arXiv:2206.07323  [pdf, other

    cs.CR

    A Continuous Risk Assessment Methodology for Cloud Infrastructures

    Authors: Immanuel Kunz, Angelika Schneider, Christian Banse

    Abstract: Cloud systems are dynamic environments which make it difficult to keep track of security risks that resources are exposed to. Traditionally, risk assessment is conducted for individual assets to evaluate existing threats; their results, however, are quickly outdated in such a dynamic environment. In this paper, we propose an adaptation of the traditional risk assessment methodology for cloud infra… ▽ More

    Submitted 15 June, 2022; originally announced June 2022.

  5. Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis

    Authors: Christian Banse, Immanuel Kunz, Angelika Schneider, Konrad Weiss

    Abstract: In this paper, we present the Cloud Property Graph (CloudPG), which bridges the gap between static code analysis and runtime security assessment of cloud services. The CloudPG is able to resolve data flows between cloud applications deployed on different resources, and contextualizes the graph with runtime information, such as encryption settings. To provide a vendor- and technology-independent re… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

  6. Towards Tracking Data Flows in Cloud Architectures

    Authors: Immanuel Kunz, Valentina Casola, Angelika Schneider, Christian Banse, Julian Schütte

    Abstract: As cloud services become central in an increasing number of applications, they process and store more personal and business-critical data. At the same time, privacy and compliance regulations such as GDPR, the EU ePrivacy regulation, PCI, and the upcoming EU Cybersecurity Act raise the bar for secure processing and traceability of critical data. Especially the demand to provide information about e… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

    Comments: 11 pages, 5 figures, 2020 IEEE 13th International Conference on Cloud Computing (CLOUD)