Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Frank Pallas is active.

Publication


Featured researches published by Frank Pallas.


Informatik Spektrum | 2010

Software als Institution und ihre Gestaltbarkeit

Carsten Orwat; Oliver Raabe; Erik Buchmann; Arun Anandasivam; Johan-Christoph Freytag; Natali Helberger; Kei Ishii; Bernd Lutterbeck; Dirk Neumann; Thomas Otter; Frank Pallas; Ralf H. Reussner; Peter Sester; Karsten Weber; Raymund Werle

ZusammenfassungSoftware regelt immer mehr zwischenmenschliche Interaktionen. Üblicherweise werden die Funktionsmechanismen, Wirkungen und Gestaltungsoptionen von Regeln in der Institutionenforschung behandelt. In diesem Artikel soll beleuchtet werden, inwieweit sich Ansätze der Institutionenforschung auf Software anwenden lassen und was sich aus dieser Forschungsperspektive zu den Regelungswirkungen und Gestaltungsoptionen von Software ableiten lässt.


ieee international conference on cloud engineering | 2014

Benchmarking the Performance Impact of Transport Layer Security in Cloud Database Systems

Steffen Müller; David Bermbach; Stefan Tai; Frank Pallas

Cloud storage services and NoSQL systems are optimized for performance and availability. Hence, enterprise-grade features like security mechanisms are typically neglected even though there is a need for them with increased cloud adoption by enterprises. Only Transport Layer Security (TLS) is frequently supported. Furthermore, the standard Transport Layer Security (TLS) protocol offers many configuration options which are usually chosen purely based on chance. We argue that in cloud database systems, configuration options should be chosen based on the degree of vulnerability to attacks and security threats as well as on the performance overhead of the respective algorithms. Our contributions are a benchmarking approach for transparent analysis of the performance impact of various TLS configuration options and a custom TLS socket implementation which offers more fine-grained control over the configuration options chosen. We also use our benchmarking approach to study the performance impact of TLS in Amazon DynamoDB and Apache Cassandra.


ieee international conference on cloud computing technology and science | 2013

An Architectural Model for Deploying Critical Infrastructure Services in the Cloud

Marcus Schöller; Roland Bless; Frank Pallas; Jens Horneber; Paul Smith

The Cloud Computing operational model is a major recent trend in the IT industry, which has gained tremendous momentum. This trend will likely also reach the IT services that support Critical Infrastructures (CI), because of the potential cost savings and benefits of increased resilience due to elastic cloud behaviour. However, realizing CI services in the cloud introduces security and resilience requirements that existing offerings do not address well. For example, due to the opacity of cloud environments, the risks of deploying cloud-based CI services are difficult to assess, especially at the technical level, but also from legal or business perspectives. This paper discusses challenges and objectives related to bringing CI services into cloud environments, and presents an architectural model as a basis for the development of technical solutions with respect to those challenges.


european conference on service-oriented and cloud computing | 2013

Modeling Quality Attributes of Cloud-Standby-Systems

Alexander Lenk; Frank Pallas

Contingency plans for disaster preparedness and concepts for resuming regular operation as quickly as possible have been an integral part of running a company for a long time. Today, large portions of revenue generation are taking place over the Internet and it has to be ensured that the respective resources and processes are secured against disasters, too. Cloud-Standby-Systems are a way for replicating an IT infrastructure to the Cloud. In this work, a Markov-based model is presented that can be used to analyze and configure such systems on a long term basis. It is shown that by using a Cloud-Standby-System the availability can be increased, how configuration parameters like the replication interval can be optimized, and that the model can be used for supporting the decision whether the infrastructure should be replicated or not.


Archive | 2007

Information Security and Knowledge Management: Solutions Through Analogies?

Timo Glaser; Frank Pallas

Information Security Management and Knowledge Management show a couple of intriguing similarities. This paper identifies some of these similarities and highlights abstract problems arising from them in both areas. Those analogies motivate to look for possibilities to transfer solutions from one area to the other.


international conference on big data | 2016

Pick your choice in HBase: Security or performance

Frank Pallas; Johannes Gunther; David Bermbach

When analyzing sensitive data in a cloud-deployed Hadoop stack, data-in-transit security needs to be enabled, especially in the underlying storage tier. This, however, will affect the performance of the system and may partially offset the cost benefits of the cloud. In this paper, we discuss two strategies for securing HBase deployments in the cloud. For both, we present benchmarking results which show performance impacts that significantly exceed the suggested 10% from the official documentation. These results demonstrate (i) that security configurations should follow a rational decision process based on benchmarking results and (ii) that the security architecture of HBase/HDFS should be redesigned with an emphasis on performance.


grid economics and business models | 2014

An Agency Perspective to Cloud Computing

Frank Pallas

The field of cloud computing is strongly affected by conflicts of interest between providers and users of resources. A comprehensive and integrative model for representing and analyzing these conflicts on a theoretically well-founded basis is, however, still lacking. Therefore, this paper establishes such a model based on economic agency theory. Employing two realistic example scenarios, we identify representative challenges faced by cloud users and generalize them as typical problems present in agency relations. Based on this conception, we correlate existing practices and strategies from cloud computing with corresponding abstract instruments from agency theory. Finally, we identify approaches that are – even if suggested by economic theory – not practically employed in the cloud domain and discuss the potential to utilize them in future technical and non-technical developments.


Computer Und Recht: Forum für die Praxis des Rechts der Datenverargeitung, Information und Automation | 2011

Harmonisierung konträrer Kommunikationsmodelle im Datenschutzkonzept des EnWG – Stern trifft Kette

Oliver Raabe; Mieke Lorenz; Frank Pallas; Eva Weis

̧ Die Autoren Dr. iur. Oliver Raabe, Forschungsgruppenleiter; Mieke Lorenz, Ass. iur., akademische Mitarbeiterin; Prof. Dr. ing. Frank Pallas, akademischer Mitarbeiter und Eva Weis, Ass. iur., akademische Mitarbeiterin sind als Forschungsgruppe am Karlsruher Institut für Technologie (KIT) in mehreren Forschungsprojekten mit den Themen Smart Grid und Elektromobilität befasst. Mit der Novelle des EnWG wurden erstmals, motiviert durch die Einführung kommunikativ vernetzter Messsysteme, datenschutzrechtliche Regelungen in dieses Gesetz aufgenommen. Bei der Konzeption der Normen sind allerdings die energiewirtschaftlichen Rahmenbedingungen nicht hinreichend zur Kenntnis genommen worden. Dies gilt insbesondere für die bestehenden verbindlichen Vorgaben der gerade etablierten elektronischen Marktkommunikation, aber auch hinsichtlich der klimapolitischen Zielsetzungen, die mit der Einführung dieser Messsysteme bei Endkunden verfolgt werden. Die folgende Untersuchung leistet deshalb im ersten Schritt eine Bestandaufnahme der energiewirtschaftlichen Rahmenbedingungen (II.) und beschreibt das neuartige Konzept der Sicherung der „Datenhoheit“ durch technische Schutzprofile (III.). Im Kern stellt sich dabei die Frage, ob die der Konzeption des materiellen und technischen Datenschutzrechts offensichtlich zugrunde liegende fehlerhafte Grundannahme, dass es sich bei den Messsystemen um Teile des „unstrukturiert offenen Internet“ handle, kompensiert werden kann (IV.). Der Beitrag untersucht daher im nächsten Schritt, ob die nun bestehenden Regelungen auch unter den tatsächlich gegebenen Bedingungen strukturierter Prozessvorgaben der verbindlichen Marktkommunikation sinnvoll angewendet, durch Konkretisierungen in der kommenden Verordnung angepasst oder sogar hinsichtlich des technischen Datenschutzniveaus verbessert werden können (V.).


Archive | 2007

Technologiepaternalismus — Soziale Auswirkungen des Ubiquitous Computing jenseits von Privatsphäre

Sarah Spiekermann; Frank Pallas

Die Technologien des Ubiquitous Computing werden weitreichende Auswirkungen auf unser tagliches Leben haben. Derzeit konzentrieren sich die meisten Debatten zu den sozialen Auswirkungen hauptsachlich auf die Gebiete des Datenschutzes und der Datensicherheit. Jedoch vertreten die Autoren dieses Beitrags die Auffassung, dass auch weitere Aspekte aus der sozialen Perspektive betrachtet werden mussen. Insbesondere wird die Frage aufgeworfen, wie Menschen in einer Umgebung, die immer weiter automatisiert sein soll, weiterhin die Kontrolle behalten konnen. Unter Hinweis auf die Moglichkeit, dass Menschen von autonom agierenden Maschinen kontrolliert werden konnten, wird der Begriff des Technologiepaternalismus eingefuhrt. Hierzu wird eine Arbeitsdefinition entwickelt und das Konzept anhand bereits existierender wie auch moglicher zukunftiger Technologien illustriert. Zudem wird auf die Beziehung zwischen Allgegen-wartigkeit und Kontrolle eingegangen und Ansatze zur Sicherstellung einer angemessenen Balance unterschiedlicher Interessen vorgestellt. Einer dieser Vorschlage ist ein generelles Recht auf das letzte Wort.


conference on the future of the internet | 2015

Impact of Critical Infrastructure Requirements on Service Migration Guidelines to the Cloud

Christian Wagner; Aleksandar Hudic; Silia Maksuti; Markus Tauber; Frank Pallas

A high level of information security in critical infrastructure IT systems and services has to be preserved when migrating their IT services to the cloud. Often various legislative and security constraints have to be met in line with best practice guidelines and international standards to perform the migration. To support the critical infrastructure providers in migrating their services to the cloud we are developing a process based migration guideline for critical infrastructure providers focusing on information security. First of all we investigate, via questionnaires, how the importance of individual security topics covered in such guidelines differentiates between industry stakeholders and critical infrastructure providers. This supports the selection of relevant security topics and the considered guidelines and standards, which we survey in search for common relevant security topics. Subsequently we present the analysis of the above-mentioned security requirements and how they affect a here developed taxonomy for a process-based security guideline. Furthermore we present potential service migration use cases and how our methodology would affect the migration of secure critical infrastructure services.

Collaboration


Dive into the Frank Pallas's collaboration.

Top Co-Authors

Avatar

Oliver Raabe

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

David Bermbach

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Max-Robert Ulbricht

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Mieke Lorenz

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Stefan Tai

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Christian Wagner

Austrian Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Sarah Spiekermann

Vienna University of Economics and Business

View shared research outputs
Researchain Logo
Decentralizing Knowledge