Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael Schläpfer is active.

Publication


Featured researches published by Michael Schläpfer.


financial cryptography | 2011

A new approach towards coercion-resistant remote e-voting in linear time

Oliver Spycher; Reto E. Koenig; Rolf Haenni; Michael Schläpfer

Remote electronic voting has attracted increasing attention in cryptographic research. A promising protocol presented by Juels et al. is currently widely discussed. Although it offers a remarkably high degree of coercion-resistance under reasonable assumptions, it can not be employed in practice due to its poor efficiency. The improvements that have been proposed either require stronger trust assumptions or turned out to be insecure. In this paper, we present an enhancement of the protocol, which runs in linear time without changing the underlying trust assumptions.


international conference on engineering secure software and systems | 2010

Automatic generation of smart, security-aware GUI models

David A. Basin; Manuel Clavel; Marina Egea; Michael Schläpfer

In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and security: when the application data is protected by an access control policy, the GUI should be aware of this and respect the policy. For example, the GUI should not display options to users for actions that they are not authorized to execute on application data. Taking this idea one step further, the application GUI should not just be security-aware, it should also be smart. For example, the GUI should not display options to users for opening other widgets when these widgets will only display options for actions that the users are not authorized to execute on application data. We establish this link between visualization and security using a model-driven development approach. Namely, we define and implement a many-models-to-model transformation that, given a security-design model and a GUI model, makes the GUI model both security-aware and smart.


VoteID'11 Proceedings of the Third international conference on E-Voting and Identity | 2011

Efficient vote authorization in coercion-resistant internet voting

Michael Schläpfer; Rolf Haenni; Reto E. Koenig; Oliver Spycher

Some years ago, Juels et al. introduced the first coercion-resistant Internet voting protocol. Its basic concept is still the most viable approach to address voter coercion and vote selling in Internet voting. However, one of the main open issues is its unrealistic computational requirements of the quadratic-time tallying procedure. In this paper, we examine the cause of this issue, namely the authorization of votes, and summarize the most recent proposals to perform this step in linear time. We explain the key underlying concepts of these proposals and introduce a new protocol based on anonymity sets. The size of these anonymity sets serves as an adjustable security parameter, which determines the degree of coercion-resistance. The main advantage of the new protocol is to move computational complexity introduced in recent works from the voter side to the tallying authority side.


international conference on software engineering | 2010

SSG: a model-based development environment for smart, security-aware GUIs

Miguel Angel García de Dios; Carolina Dania; Michael Schläpfer; David A. Basin; Manuel Clavel; Marina Egea

We present a development environment for automatically building smart, security-aware GUIs following a model-based approach. Our environment consists of a number of plugins that have been developed using the Eclipse framework and includes three model editors, a model-transformation tool, and a code generator.


Archive | 2011

Authentication and Access Control

David A. Basin; Patrick Schaller; Michael Schläpfer

Access control is the means by which access to system resources is restricted to authorized subjects. Access control has a wide scope and can be found in hardware and software, at all levels of the software stack. This includes memory management, operating systems, middleware application servers, databases and applications.


Archive | 2011

Logging and Log Analysis

David A. Basin; Patrick Schaller; Michael Schläpfer

Operating systems and applications typically come with mechanisms for reporting errors as well as security-relevant actions such as users logging on and off. These events are reported as entries in log files. The objective of logging is to make these events transparent and comprehensible. The log files can be used to analyze and optimize services as well as to detect and diagnose security breaches.


Archive | 2011

The Virtual Environment

David A. Basin; Patrick Schaller; Michael Schläpfer

In the following chapters we examine a variety of problems related to information security, as they arise in modern computer and communication systems. To deepen your understanding of these problems, we do not merely consider them abstractly. Rather, we additionally provide you with a set of preconfigured virtual machines that allow you to work through the examples actively in a virtual environment.


Archive | 2011

Certificates and Public Key Cryptography

David A. Basin; Patrick Schaller; Michael Schläpfer

We concluded the previous chapter by describing the standard way of enabling HTTPS on an Apache web server. Our main goal was to protect the information exchanged between clients and the server from adversaries eavesdropping on communication. In this chapter, we will brush up on public key cryptography and examine its use in more detail.


Archive | 2011

Web Application Security

David A. Basin; Patrick Schaller; Michael Schläpfer

This chapter covers web applications and their associated security mechanisms. You will audit web applications and identify vulnerabilities from a user’s (or adversary’s), a maintainer’s and a developer’s perspective. You will exploit the vulnerabilities and see their consequences. Then you will investigate the reasons for the vulnerabilities and finally work on the source code to rectify the underlying problems.


international conference on theory and practice of electronic governance | 2012

The secure platform problem taxonomy and analysis of existing proposals to address this problem

Michael Schläpfer; Melanie Volkamer

Collaboration


Dive into the Michael Schläpfer's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Oliver Spycher

Bern University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rolf Haenni

Bern University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar

Melanie Volkamer

Technische Universität Darmstadt

View shared research outputs
Researchain Logo
Decentralizing Knowledge