Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Simone Fischer-Hübner is active.

Publication


Featured researches published by Simone Fischer-Hübner.


information security | 1997

Pseudonymous audit for privacy enhanced intrusion detection

Michael Sobirey; Simone Fischer-Hübner; Kai Rannenberg

Intrusion detection systems can serve as powerful security audit analysis tools. But by analysing the user activities, they are affecting the privacy of the users at the same time. Pseudonymous audit can be the basis for privacy enhanced intrusion detection. In this paper, the concept of pseudonymous audit for privacy enhanced intrusion detection and its prototype realisations are presented. Furthermore it is discussed whether IT security evaluation criteria cover pseudonymous audit and the respective changes are suggested.*


international symposium on signal processing and information technology | 2005

Trust in PRIME

C. Andersson; J. Camenisch; S. Crane; Simone Fischer-Hübner; R. Leenes; S. Pearsorr; John Sören Pettersson; D. Sommer

The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy and trust of e-shopping customers. It also discusses the socio-psychological factors and HCI aspects influencing the end users trust in privacy enhancing identity management, and shows why HCI research, user studies, and socio-psychological research, are necessary efforts to accompany system design


ieee international conference on cloud computing technology and science | 2012

Accountability for cloud and other future Internet services

Siani Pearson; Vasilios Tountopoulos; Daniele Catteddu; Mario Südholt; Refik Molva; Christoph Reich; Simone Fischer-Hübner; Christopher Millard; Volkmar Lotz; Martin Gilje Jaatun; Ronald Leenes; Chunming Rong; Javier Lopez

Cloud and IT service providers should act as responsible stewards for the data of their customers and users. However, the current absence of accountability frameworks for distributed IT services makes it difficult for users to understand, influence and determine how their service providers honour their obligations. The A4Cloud project will create solutions to support users in deciding and tracking how their data is used by cloud service providers. By combining methods of risk analysis, policy enforcement, monitoring and compliance auditing with tailored IT mechanisms for security, assurance and redress, A4Cloud aims to extend accountability across entire cloud service value chains, covering personal and business sensitive information in the cloud.


Information Management & Computer Security | 2012

Towards Usable Privacy Policy Display a Management

Julio Angulo; Simone Fischer-Hübner; Erik Wästlund; Tobias Pulls

This paper discusses the approach taken within the PrimeLife project for providing user-friendly privacy policy interfaces for the PrimeLife Policy Language (PPL).We present the requirements, desig ...


Information, Communication & Society | 1998

Privacy and security at risk in the global information society

Simone Fischer-Hübner

Abstract In the global information society, individual privacy is seriously endangered. An increasing amount of personal data is being transferred around the world, and communication data of users could be easily traced and used to create individual communication using new information infrastructures. With contemporary network technologies, it is difficult to protect personal data adequately. The Internet, as an important contemporary information highway, is missing essential features of reliability, functionality, confidentiality and integrity, and is threatened by various security attacks. This paper discusses privacy and security risks in the global information society. It also compares and critically analyses the approaches to privacy protection of different information infrastructure programmes. The difficulties for a common harmonised legal approach to privacy protection, due to cultural differences, are analysed. Finally, possibilities for designing information infrastructures adequate under social...


Telecommunication Systems | 2010

Blocking attacks on SIP VoIP proxies caused by external processing

Ge Zhang; Simone Fischer-Hübner; Sven Ehlert

As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Telephone Network (PSTN). One of the reasons is that VoIP applications rely heavily on external Internet-based infrastructures (e.g., DNS server, web server), so that vulnerabilities of these external infrastructures have an impact on the security of VoIP systems as well. This article presents a Denial of Service (DoS) attack on VoIP systems by exploiting long response times of external infrastructures. This attack can lead the whole VoIP system in a blocked state thus reducing the availability of its provided signalling services. The results of our experiments prove the feasibility of blocking attacks. Finally, we also discuss several defending methods and present an improved protection mechanism against blocking attacks.


8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, jun 17-21, 2013, Nijmegen, Netherlands | 2013

How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used?

Simone Fischer-Hübner; Julio Angulo; Tobias Pulls

Transparency is a basic privacy principle and factor of social trust. However, the processing of personal data along a cloud chain is often rather intransparent to the data subjects concerned. Transparency Enhancing Tools (TETs) can help users in deciding on, tracking and controlling their data in the cloud. However, TETs for enhancing privacy also have to be designed to be both privacy-preserving and usable. In this paper, we provide requirements for usable TETs for the cloud. The requirements presented in this paper were derived in two ways; at a stakeholder workshop and through a legal analysis. Here we discuss design principles for usable privacy policies and give examples of TETs which enable end users to track their personal data. We are developing them using both privacy and usability as design criteria.


Privacy and Identity Management for Life | 2011

Trust and Assurance HCI

Simone Fischer-Hübner; Hans Hedbom; Erik Wästlund

In this chapter, we present our HCI (Human Computer Interaction) work for mediating the degree of trustworthiness of services sides to end users and for enhancing their trust in PrimeLife-enabled applications. For this, we will present the user interface development work of a trust evaluation function and the PrimeLife Data Track.


privacy forum | 2015

Towards a New Paradigm for Privacy and Security in Cloud Services

Thomas Lorünser; Charles Bastos Rodriguez; Denise Demirel; Simone Fischer-Hübner; Thomas Groß; Thomas Länger; Mathieu des Noes; Henrich C. Pöhls; Boris Rozenberg; Daniel Slamanig

The market for cloud computing can be considered as the major growth area in ICT. However, big companies and public authorities are reluctant to entrust their most sensitive data to external parties for storage and processing. The reason for their hesitation is clear: There exist no satisfactory approaches to adequately protect the data during its lifetime in the cloud. The EU Project Prismacloud (Horizon 2020 programme; duration 2/2015–7/2018) addresses these challenges and yields a portfolio of novel technologies to build security enabled cloud services, guaranteeing the required security with the strongest notion possible, namely by means of cryptography. We present a new approach towards a next generation of security and privacy enabled services to be deployed in only partially trusted cloud infrastructures.


Asia Pacific Business Review | 2008

Benefits of Privacy-Enhancing Identity Management

Simone Fischer-Hübner; Hans Hedbom

Privacy-enhancing identity management systems allow users to act securely in the information society while keeping sovereignty over their personal spheres. This paper elaborates the benefits that privacy-enhancing identity management can provide for both end users and services sides. These benefits include increased privacy protection for end users and enhanced trust relations between users and services sides. The PRIME system developed within the EU project PRIME (Privacy and Identity Management for Europe) and a PRIME-enable e-shopping application scenario are used to illustrate these benefits. Besides, also potential business drivers for services sides to deploy privacy-enhancing identity management systems are discussed.

Collaboration


Dive into the Simone Fischer-Hübner's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge