Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Silke Holtmanns is active.

Publication


Featured researches published by Silke Holtmanns.


Archive | 2006

Context-Aware Adaptive Trust

Silke Holtmanns; Zheng Yan

Trust is a very complex and multi-disciplined concept. In this article we start by analysing social trust scenarios to derive abstract trust concepts. From these abstract trust concepts a context-aware adaptive trust concept is developed. The context aware adaptive trust concept takes into account the dynamics of trust and the context based grouping of trust properties. The implementation of the concept will be subject to further evaluation and research.


International Journal of Internet Technology and Secured Transactions | 2007

Tailored trustworthiness estimations in Peer-to-Peer networks

Katri Sarkio; Silke Holtmanns

In peer-to-peer (P2P) communities, users make personal trust evaluations of each other based on their experiences and observations. The available information of the peers past behavior, i.e. reputation, is often incomplete, the credibility of evaluations is a concern and the relevance of the available information varies. In this paper, we propose functions for producing tailored trustworthiness estimations in P2P communities based on the peers past behavior. The presented mechanism provides some flexibility on applying it in different kinds of P2P networks.


Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005. | 2005

Tailored trustworthiness estimations in peer-to-peer networks

Katri Ylitalo; Silke Holtmanns

In peer-to-peer (P2P) communities, users make personal trust evaluations of each other based on their experiences and observations. The available information of the peers past behavior, i.e. reputation, is often incomplete, the credibility of evaluations is a concern and the relevance of the available information varies. In this paper, we propose functions for producing tailored trustworthiness estimations in P2P communities based on the peers past behavior. The presented mechanism provides some flexibility on applying it in different kinds of P2P networks.


international conference on formal engineering methods | 2016

A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks

Linas Laibinis; Elena Troubitsyna; Inna Pereverzeva; Ian Oliver; Silke Holtmanns

The number of security attacks on the telecommunication networks is constantly increasing. To prevent them, the telecom sector is looking for new automated techniques facilitating a discovery of potential network vulnerabilities and rectification of them. In this paper, we propose an approach for identifying potential attack scenarios and defining recommendations for preventing them. The approach is formalised in the Event-B framework. It allows us to not only formalise the analysed part of the network architecture and verify consistency of the control and data flow of the associated services but also employ model checking to generate and analyse attack scenarios. By applying the proposed approach, the designers can systematically explore network vulnerabilities and propose recommendations for attack prevention.


international conference on networking | 2007

Access Authentication to IMS Systems in Next Generation Networks

Silke Holtmanns; Son Phan-Anh

IP multimedia system (IMS) access authentication over fixed networks faces some challenges in the process of converging fixed and mobile networks. Authentication in 3GPP IMS system is bound to lower layer authentication mechanisms, hence the used protocols can not be used directly for the NGN fixed network environment. Therefore different mechanisms were proposed in standardization, we will outline the approaches and their integration into the 3GPP IMS system.


Archive | 2005

Methods, system and mobile device capable of enabling credit card personalization using a wireless network

Silke Holtmanns; Pekka Laitinen


Archive | 2008

Trust Modeling and Management: From Social Trust to Digital Trust

Zheng Yan; Silke Holtmanns


Archive | 2007

User equipment credential system

Silke Holtmanns; Pekka Laitinen


Archive | 2007

Authenticating an application

Shreekanth Lakshmeshwar; Philip Ginzboorg; Pekka Laitinen; Silke Holtmanns


Archive | 2010

Methods and apparatuses for access credential provisioning

Silke Holtmanns; André Dolenc

Collaboration


Dive into the Silke Holtmanns's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge