Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jan Zibuschka is active.

Publication


Featured researches published by Jan Zibuschka.


information security conference | 2007

Enabling Privacy of Real-Life LBS

Jan Zibuschka; Lothar Fritsch; Mike Radmacher; Tobias Scherner; Kai Rannenberg

Privacy in computerized environments is perceived very differently depending on the respective point of view. Often “privacy enhancing technologies” — initiated by the user, as a measure of self-defense — are seen as conflicting with business goals such as cost-efficiency, revenue assurance, and options for further business development based on existing data. This paper presents the design and implementation of an architecture and prototype for privacy-friendly, interoperable location-based services (LBS), based on intermediation of location data via a location middleware component. The aim is to combine privacy-friendliness, efficiency, and market potential. Therefore the security interests of the stakeholders are analyzed and an architecture solution including an intermediary is introduced. Then the prototype implementation (at a mobile operator) is described and the usage of the prototype for a commercial service and product offer by the operator involved in the development is discussed.


European Journal of Information Systems | 2014

Users’ Willingness to Pay for Web Identity Management Systems

Heiko Roßnagel; Jan Zibuschka; Oliver Hinz; Jan Muntermann

Electronic services such as virtual communities or electronic commerce demand user authentication. Several more or less successful federated identity management systems have emerged to support authentication across diverse service domains in recent years. In this paper, we explore the determinants for success and failure of such systems with a focus on Germany representing one of the largest markets in Europe. To achieve this goal, we analyze the preferences and willingness to pay of prospective users by conducting a choice-based conjoint analysis. Our results indicate that users prefer simple systems where an intermediary takes care of their data. An additional market analyses confirms these findings and contradicts the assumptions of many researchers, especially in the fields of engineering and computer science, supporting systems with higher and higher levels of privacy and security.


DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy | 2010

Towards privacy-enhancing identity management in mashup-providing platforms

Jan Zibuschka; Matthias Herbert; Heiko Roßnagel

Mashups empower users to easily combine and connect resources from independent Web-based sources and domains. However, these characteristics also introduce new and amplify existing security and privacy problems. This is especially critical in the emerging field of enterprise Mashups. Despite several contributions in the field of Mashup security the issue of protecting exchanged resources against the Mashup-providing Platform has generally been neglected. In this contribution we address the security challenges of server-side Mashup-providing Platforms with the aim of minimizing the required amount of trust. We achieve this by implementing a privacy-enhancing identity management system into the Mashup-providing Platform using Reverse Identity Based Encryption.


americas conference on information systems | 2010

Agent-Based Simulation for Evaluation of a Mobile Emergency Management System

Heiko Roßnagel; Jan Zibuschka; Olaf Junker

Large public events such as sporting events, concerts, fairs and street festivals are quite common in metropolitan areas. Because of the high frequency of such events and the increasing number of involved parties, the stakeholders responsible for the organization and execution have to cope with increasing complexity and shortening time frames for planning and preparation. Especially in public transportation, unplanned incidents that occur during these events can have devastating effects because of the high concentration of passengers. Emergency management systems that utilize mobile communication infrastructures can provide prompt information delivery to save human lives. In this contribution we propose a system design for mobile emergency management. We also present an evaluating approach for this system design using a multi-agent based simulation, based on empirical data for a particular large event as well as for normal rush hour traffic. We also consider characteristics of the mobile communication infrastructure.


nordic conference on secure it systems | 2009

Facilitating the Adoption of Tor by Focusing on a Promising Target Group

Heiko Roßnagel; Jan Zibuschka; Lexi Pimenides; Thomas Deselaers

The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has not emerged as of today. One possibility to stimulate adoption is to facilitate it in a specific subnet. The idea is to identify a promising target group which has a substantial benefit from adopting the technology and to facilitate the adoption within that target group. We examine the feasibility of this approach for anonymity services. We identify a potential target group --- consumers of pornographic online material --- and empirically validate their suitability by conducting a traffic analysis. We also discuss several business models for anonymity services. We argue that providers of anonymity services should try to generate revenue from content providers like adult entertainment distributors. The latter could benefit from offering anonymous access to their products by differentiating against competitors or by selling their products at a higher price over the anonymous channel.


IDMAN | 2008

Implementing Strong Authentication Interoperability with Legacy Systems

Jan Zibuschka; Heiko Roßnagel

In a WWW environment, users need to come up with passwords for a lot of different services, e.g. in the area of e-commerce. These authentication secrets need to be unrelated if the user does not want to make himself vulnerable to insider attacks. This leads to a large number of passwords that a user has to generate, memorize, and remember. This password management is quite straining for users. Single sign on systems provide a solution for this dilemma. However, existing solutions often require the implementation of specific interfaces by the individual service providers, and usually do not support existing strong authentication factors, e.g. smart cards, without protocol extensions or modification of implementations. In this paper we propose a different approach that generates strong passwords using electronic signatures. Our approach builds on existing smart card infrastructures to achieve strong authentication, while at the same time it provides an interface to legacy password authentication systems.


international conference on web engineering | 2011

Secure mashup-providing platforms - implementing encrypted wiring

Matthias Herbert; Tobias Thieme; Jan Zibuschka; Heiko Roßnagel

Mashups were not designed with security in mind. Their main selling point is the flexible and easy to use development approach. The fact that mashups enable users to compose services to create a piece of software with new functionalities, integrating inputs from various sources, implies a security risk. However, in many scenarios where mashups add business value, e.g. enterprise mashups, security and privacy are important requirements. A secure environment for the handling of potentially sensitive end user information is needed, unless the user fully trusts the mashup-providing-platform (MPP), which is unlikely for hosted enterprise mashups. In this paper we present a proof-of-concept implementation which enables the secure usage of a mashup-providing platform and protects sensitive data against malicious widgets and platform operators.


Digital privacy | 2011

Privacy and identity management requirements: an application prototype perspective

Tobias Kölsch; Jan Zibuschka; Kai Rannenberg

The following requirements, which have been derived from the previously described application prototype scenarios, constitute features that a privacy-friendly identity management system should support, based on a wide range of application scenarios. However, the requirements should not be read as absolute: some of them might be impractical or even impossible to implement in a specific context, e.g. because of high system resource requirements with regard to their operation or difficulty of implementation. Rather, this chapter contributes experiences from the application prototype development to the ongoing discussion of generic identity management requirements. It also shows to a certain extent how PRIME could meet those requirements. Still, it always tries to stay generic in its descriptions, to ease comparison between scenarios and with other scenarios. The prototypes presented in the preceding chapters include examples of complex services that are offered by consortia; so, for example, more than just the two “classic” stakeholders (customer, provider) may be involved in, e.g., location-based services. For a more detailed discussion of particular aspects of this, refer to the chapters on the individual prototypes of Part IV and to selected chapters in Part III of the book, e.g. Chapter 22 for multilateral user-to-user interactions. This chapter will briefly list the main requirements for the key stakeholders identified in the scenarios and then elaborate on them.


Digital privacy | 2011

Location-based services

Jan Zibuschka; Kai Rannenberg; Tobias Kölsch

A location tracking unit for use with a location based service system is presented. The location tracking unit comprises: a navigation receiver adapted to implement a location tracking function; data processing means adapted to determine an occupied location according to a first location matching process, the first location matching process using navigation data from the navigation receiver and a first set of geographic data; and data processing means adapted to verify the integrity of the first location matching process based on a second location matching process using navigation data and a second set of geographic data.


Datenschutz Und Datensicherheit - Dud | 2006

Single Sign On mit Signaturen

Heiko Roßnagel; Jan Zibuschka

ZusammenfassungAuch fast zehn Jahre nach der Verabschiedung des ersten Signaturgesetzes haben sich qualifizierte elektronische Signaturen am Markt nicht durchgesetzt. Es fehlen Anwendungen, die für eine breite Masse von Anwendern von Interesse sind. Die Autoren stellen eine Möglichkeit vor, wie man elektronische Signaturen für Authentifizierung bei Passwortsystemen nutzen kann. Dadurch kann auf der einen Seite das „Strong Password Dilemma“ gelöst werden und auf der anderen Seite die Akzeptanz für Signaturkarten erhöht werden.

Collaboration


Dive into the Jan Zibuschka's collaboration.

Top Co-Authors

Avatar

Tobias Scherner

Goethe University Frankfurt

View shared research outputs
Top Co-Authors

Avatar

Jan Muntermann

University of Göttingen

View shared research outputs
Top Co-Authors

Avatar

Heiko Rossnagel

Goethe University Frankfurt

View shared research outputs
Top Co-Authors

Avatar

Kai Rannenberg

Goethe University Frankfurt

View shared research outputs
Top Co-Authors

Avatar

Oliver Hinz

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Lothar Fritsch

Norwegian Computing Center

View shared research outputs
Top Co-Authors

Avatar

Mike Radmacher

Goethe University Frankfurt

View shared research outputs
Top Co-Authors

Avatar

Eleni Kosta

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Jos Dumortier

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge