Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas Hildmann is active.

Publication


Featured researches published by Thomas Hildmann.


Proceedings of the fourth ACM workshop on Role-based access control | 1999

Managing trust between collaborating companies using outsourced role based access control

Thomas Hildmann; Jörg Barholdt

In this document we describe an approach for modelling large organisations applying an RBAC-schema to control access to remote services of the organisation. The model is object-oriented, non-hierarchical and divides the organisation into different contexts (posts, groups, persons, services, resources) in which roles are defined local to that context. We explicitly address the problem of access controlling the policy information itself by using the same means as for external resources. Therefore, this approach enables policy information of each context to be managed by another person, namely the one responsible for that very resource context, and makes it superior over strict hierarchical models. The first version of our model was designed to manage the access in one defined organisation. This paper will show how this concept is expanded so that it can also be used for access control between collaborating companies. As an example we will show how an electronic market place can be modelled and each partner in that marketplace can manage access policies to his catalogues, prices, discount rules, orders, etc. on his own while the integrity of the whole marketplace is assured.


Proceedings of the fifth ACM workshop on Role-based access control | 2000

Enabling technologies for role based online decision engines

Thomas Gebhardt; Thomas Hildmann

The implementation of an RBAC system at the TUB led us towards a specific meaning of role-based access control, where decisions regarding user permissions are based on online evaluations of a distributed RBAC model, we call this approach role-based online decision (RoBOD). Requirements of our project partners and the integration of our solution into application environments showed that a number of enabling technologies, i.e. authentication and secure communication, are necessary to employ RBAC in networked application architectures.


Praxis Der Informationsverarbeitung Und Kommunikation | 2007

TUBIS – Integration von Campusdiensten an der Technischen Universität Berlin

Thomas Hildmann; Christopher Ritter

ZUSAMMENFASSUNG Die IT Landschaft der Universitäten ist historisch gewachsen. Unterschiedliche Abteilungen und Fakultäten haben jeweils für sie optimale Softwarelösungen ausgewählt und in ihre Arbeitsabläufe integriert. Die aktuellen Anforderungen an die Universitäten erfordern eine Integration der unterschiedlichen Insellösungen. Die TU-Berlin setzt hierbei auf ein eigenes Produkt, das auf Basis verschiedener Open Source-Lösungen erstellt wurde und stetig erweitert wird. Dabei werden nicht nur Daten zusammengeführt, sondern auch ein universitätsweites, rollen-basiertes Rechtesystem etabliert, das sich, wie bereits gezeigt, in unterschiedliche Anwendungen integrieren lässt.


Archive | 2001

Vermeidung von Datenspuren bei smartcardbasierten Authentisierungssystemen

Thomas Hildmann

Smartcards dienen nicht nur als Schlusseltechnologie fur digitale Signaturen, sie konnen auch als Identifikationsmerkmal bei einem Authentisierungssystem eingesetzt werden. Dabei wird das Single-Sign-On (SSO) von vielen Experten als die Killerapplikation fur Smartcards angesehen. Leider hinterlassen gangige Authentisierungsmechanismen basierend auf Smartcards Datenspuren, die das Anlegen relativ vollstandiger Bewegungsprofile ermoglichen. Diese Profile werden um so vollstandiger, je weiter ein organisationsubergreifendes SSO umgesetzt ist.


international conference on distributed computing systems workshops | 2014

Deploying and Extending On-Premise Cloud Storage Based on ownCloud

Thomas Hildmann; Odej Kao


EUNIS 2013 Congress Proceedings: 2013: ICT Role for Next Generation Universities | 2013

Identity management for the TUB Cloud

Thomas Hildmann; Odej Kao; Christopher Ritter


Sicherheit | 2008

eXtreme Role Engineering: Ein neuer Ansatz zur Rechtedefinition und -vergabe.

Thomas Hildmann; Odej Kao; Christopher Ritter


Archive | 2002

PKI based Access Control with Attribute Certificates for Data held on Smartcards

Lutz Suhrbier; Thomas Hildmann


Archive | 2016

Cloudspeicher im Hochschuleinsatz 2015

Odej Kao; Thomas Hildmann


dfn-forum kommunikationstechnologien | 2015

Dezentrale Verwaltung der Netzwerkinfrastruktur.

Christopher Ritter; Michael Flachsel; Thomas Hildmann

Collaboration


Dive into the Thomas Hildmann's collaboration.

Top Co-Authors

Avatar

Christopher Ritter

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Odej Kao

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Thomas Gebhardt

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Jörg Barholdt

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Lutz Suhrbier

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Patrick Bittner

Technical University of Berlin

View shared research outputs
Researchain Logo
Decentralizing Knowledge