Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Meiko Jensen is active.

Publication


Featured researches published by Meiko Jensen.


international conference on cloud computing | 2009

On Technical Security Issues in Cloud Computing

Meiko Jensen; Jörg Schwenk; Nils Gruschka; Luigi Lo Iacono

The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and operational expenditure (OpEx). In order for this to become reality, however, there are still some challenges to be solved. Amongst these are security and trust issues, since the users data has to be released to the Cloud and thus leaves the protection-sphere of the data owner. Most of the discussions on this topics are mainly driven by arguments related to organizational means. This paper focuses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations.


international conference on cloud computing | 2010

Attack Surfaces: A Taxonomy for Attacks on Cloud Services

Nils Gruschka; Meiko Jensen

The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion of attack surfaces of the cloud computing scenario participants.


european conference on web services | 2007

SOA and Web Services: New Technologies, New Standards - New Attacks

Meiko Jensen; Nils Gruschka; Ralph Herkenhöner; Norbert Luttenberger

Being regarded as the new paradigm for Internet communication, Web Services have introduced a large number of new standards and technologies. Though founding on decades of networking experience, Web Services are not more resistant to security attacks than other open network systems. Quite the opposite is true: Web Services are exposed to attacks well-known from common Internet protocols and additionally to new kinds of attacks targeting Web Services in particular. Along with their severe impact, most of these attacks can be performed with minimum effort from the attackers side. In this paper we present a list of vulnerabilities in the context of Web Services. To proof the practical relevance of the threats, we performed exemplary attacks on widespread Web Service implementations. Further, general countermeasures for prevention and mitigation of such attacks are discussed.


IEEE Transactions on Dependable and Secure Computing | 2013

Security and Privacy-Enhancing Multicloud Architectures

Jens-Matthias Bohli; Nils Gruschka; Meiko Jensen; Luigi Lo Iacono; Ninja Marnau

Security challenges are still among the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues, the cloud paradigm comes with a new set of unique features, which open the path toward novel security approaches, techniques, and architectures. This paper provides a survey on the achievable security merits by making use of multiple distinct clouds simultaneously. Various distinct architectures are introduced and discussed according to their security and privacy capabilities and prospects.


international conference on web services | 2009

Analysis of Signature Wrapping Attacks and Countermeasures

Sebastian Gajek; Meiko Jensen; Lijun Liao; Jörg Schwenk

In recent research it turned out that Boolean verification of digital signatures in the context of WS-Security is likely to fail: If parts of a SOAP message are signed and the signature verification applied to the whole document returns true, then nevertheless the document may have been significantly altered.In this paper, we provide a detailed analysis on the possible scenarios that enable these signature wrapping attacks. Derived from this analysis, we propose a new solution that uses a subset of XPath instead of ID attributes to point to the signed subtree, and show that this solution is both efficient and secure.


international conference on cloud computing | 2011

Security Prospects through Cloud Computing by Adopting Multiple Clouds

Meiko Jensen; Jörg Schwenk; Jens-Matthias Bohli; Nils Gruschka; Luigi Lo Iacono

Clouds impose new security challenges, which are amongst the biggest obstacles when considering the usage of cloud services. This triggered a lot of research activities in this direction, resulting in a quantity of proposals targeting the various security threats. Besides the security issues coming with the cloud paradigm, it can also provide a new set of unique features which open the path towards novel security approaches, techniques and architectures. This paper initiates this discussion by contributing a concept which achieves security merits by making use of multiple distinct clouds at the same time.


availability, reliability and security | 2008

The Impact of Flooding Attacks on Network-based Services

Meiko Jensen; Nils Gruschka; Norbert Luttenberger

One of the most severe threats to Internet security are Denial of Service attacks. Intended to annihilate the availability of a network-based service, this kind of attack troubles all service providers. In this paper we focus on a special type of Denial of Service attacks that relies on message flooding techniques, overloading the victims service with invalid requests. We describe some well- known and some rather new attacks, discuss commonalities and approaches for countermeasures. A main focus of this paper is directed towards Denial of Service attacks on Web Services and Web Service Compositions. We resume these threats by illustrating some possible attacks, and we relate our experimental results to the well-known attack impact of the TCP SYN Flooding attack.


international congress on big data | 2013

Challenges of Privacy Protection in Big Data Analytics

Meiko Jensen

The big data paradigm implies that almost every type of information eventually can be derived from sufficiently large datasets. However, in such terms, linkage of personal data of individuals poses a severe threat to privacy and civil rights. In this position paper, we propose a set of challenges that have to be addressed in order to perform big data analytics in a privacy-compliant way.


engineering of computer-based systems | 2009

A Security Modeling Approach for Web-Service-Based Business Processes

Meiko Jensen; Sven Feja

The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide a transformation that automatically derives WS-Security Policy-conformant security policies from the process model, which in conjunction with the generated WS-BPEL processes and WSDL documents provides the ability to deploy and run the complete security-enhanced process based on Web Service technology.


IEEE Transactions on Services Computing | 2011

Server-Side Streaming Processing of WS-Security

Nils Gruschka; Meiko Jensen; Luigi Lo Iacono; Norbert Luttenberger

With SOAP-based web services leaving the stadium of being an explorative set of new technologies and entering the stage of mature and fundamental building blocks for service-driven business processes-and in some cases even for mission-critical systems-the demand for nonfunctional requirements including efficiency as well as security and dependability commonly increases rapidly. Although web services are capable of coupling heterogeneous information systems in a flexible and cost-efficient way, the processing efficiency and robustness against certain attacks do not fulfill industry-strength requirements. In this paper, a comprehensive stream-based WS-Security processing system is introduced, which enables a more efficient processing in service computing and increases the robustness against different types of Denial-of-Service (DoS) attacks. The introduced engine is capable of processing all standard-conforming applications of WS-Security in a streaming manner. It can handle, e.g., any order, number, and nesting degree of signature and encryption operations, closing the gap toward more efficient and dependable web services.

Collaboration


Dive into the Meiko Jensen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Luigi Lo Iacono

Cologne University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lijun Liao

Ruhr University Bochum

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge