Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Monika Maidl is active.

Publication


Featured researches published by Monika Maidl.


web services and formal methods | 2005

Choreographing security and performance analysis for web services

Stephen Gilmore; Valentin Haenel; Leı̈la Kloul; Monika Maidl

We describe a UML-based method which supports model-driven development of service-oriented architectures including those used in Web services. Analysable content is extracted from the UML models in the form of process calculus descriptions. These are analysed to provide strong guarantees of satisfactory security and performance. The results are reflected back in the form of a modified version of the UML model which highlights points of the design which can give rise to operational difficulties. A design platform supporting the methodology, Choreographer, interoperates with state-of-the-art UML modelling tools such as Poseidon. We illustrate the approach on an example.


international conference on computer safety reliability and security | 2008

Formal Security Analysis of Electronic Software Distribution Systems

Monika Maidl; David von Oheimb; Peter Hartmann; Richard Robinson

Software distribution to target devices like factory controllers, medical instruments, vehicles or airplanes is increasingly performed electronically over insecure networks. Such software often implements vital functionality, and so the software distribution process can be highly critical, both from the safety and the security perspective. In this paper, we introduce a novel software distribution system architecture with a generic core component, such that the overall software transport from the supplier to the target device is an interaction of several instances of this core component communicating over insecure networks. The main advantage of this architecture is reduction of development and certification costs. The second contribution of this paper describes the validation and verification of the proposed system. We use a mix of formal methods, more precisely the AVISPA tool, and the Common Criteria (CC) methodology, to achieve high confidence in the security of the software distribution system at moderate costs.


international workshop on security | 2010

A case study in decentralized, dynamic, policy-based, authorization and trust management: automated software distribution for airplanes

Peter Hartmann; Monika Maidl; David von Oheimb; Richard Robinson

We apply SecPAL, a logic-based policy language for decentralized authorization and trust management, to our case study of automated software distribution for airplanes. In contrast to established policy frameworks for authorization like XACML, SecPAL offers constructs to express trust relationships and delegation explicitly and to form chains of trusts. We use these constructs in our case study to specify and reason about dynamic, ad-hoc trust relationships between airlines and contractors of suppliers of software that has to be loaded into airplanes.


Archive | 2009

Datenschutzrechtliche und sicherheitstechnische Anforderungen und Gestaltungsziele

Philip Laue; Monika Maidl

Die in Kapitel II.1 beschriebenen technologischen Entwicklungen bilden eine Grundvoraussetzung fur Entwicklung und Angebot eines mobilen Touristenfuhrers und ermoglichen es, im Bereich des Tourismus neue Wege der Erlebnis- und Wissensvermittlung zu beschreiten. Die fur den Dienst notwendige Individualisierung ist in der Regel jedoch nur dann zu erreichen, wenn der Diensteanbieter auf eine grose Anzahl individueller Daten des Nutzers zugreifen kann. So werden neben dem jeweiligen Aufenthaltsort und der Verweildauer des Nutzers zahlreiche weitere Informationen wie beispielsweise Angaben uber personliche Vorlieben des Nutzers gesammelt. Fur den Nutzer hat dies den Vorteil, dass er nicht mit einer unuberschaubaren Anzahl von Attraktionen belastet wird. Er erhalt die seinen Interessen entsprechenden Angebote genau zu dem Zeitpunkt und an dem Ort, an dem er sie benotigt.


Datenschutz Und Datensicherheit | 2007

Zweckbindung in ämterübergreifenden Verwaltungsworkflows: Zugriffsschutz durch feingranulare Verschlüsselung auf XML-Basis

Philip Laue; Monika Maidl; Jan Peters

ZusammenfassungE-Government bietet das Potential, Verwaltungsprozesse durch ämterübergreifende Vorgangsbearbeitung zu optimieren. Dabei muss die datenschutzrechtliche Zweckbindung jedoch technisch abgesichert werden. Durch ein XML-basiertes Verschlüsselungsverfahren kann dies erreicht werden.


Archive | 2011

Method for the Cryptographic Protection of an Application

Monika Maidl; Stefan Seltzsam


Archive | 2009

Method for combining data to be processed with a data-specific apparatus, and apparatus and computer program for implementing the method

Jorge Cuellar; Hans-Georg Köpken; Matthias Lenord; Monika Maidl


Archive | 2009

Method, System and Apparatus for Processing Rights

Jorge Cuellar; Hans-Georg Köpken; Matthias Lenord; Monika Maidl


Archive | 2008

Method of combining data with a device to be used for processing data, corresponding functionality to execute the individual steps in the procedure and computer program to implement the procedure

Hans-Georg Köpken; Jorge Dr. Cuellar; Matthias Lenord; Monika Maidl


Multimedia Systems | 2007

Die datenschutz- und sicherheitskonforme Ausgestaltung von Location Based Services am Beispiel eines mobilen Touristenführers.

Silvio Becher; Philip Laue; Monika Maidl; Marko Modsching

Collaboration


Dive into the Monika Maidl's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peter Hartmann

University of Applied Sciences Landshut

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge