Skip to main content

DSI Publications

Book

Rechtsfragen bei Open Science [Legal Questions Concerning Open Science]

Hamburg: Hamburg University Press
Henning Christian Lahmann, Till Kreutzer (2019)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
open science, open educational resources, law, copyright law, data protection, privacy
The book provides an overview of legal questions in regard to open science, with a particular focus on issues of copyright and data protection.
Pages
156
ISBN
978-3-943423-66-2
ISBN (Online)
978-3-943423-67-9
Conference Proceeding

Attack simulation for a realistic evaluation and comparison of network security techniques

In Secure IT systems, 1st ed., 11252 vols. 236–254. Olso, Norway: Springer International Publishing.
23rd Nordic Conference, NordSec 2018, Oslo, Norway, Proceedings
2018 Other
Alexander Bajic, Georg T. Becker (2018)
Subject(s)
Information technology and systems
Keyword(s)
Moving target defense, attack simulation, attack graphs, network modeling
Secondary Title
Secure IT systems
Edition
1st ed.,
Pages
236–254
Book

Cybersecurity in Germany

SpringerBriefs in Cybersecurity, 1st ed.,New York City, New York: Springer
Martin Schallbruch, Isabel Skierka (2018)
Subject(s)
Economics, politics and business environment; Information technology and systems
Keyword(s)
Cybersecurity, cyber defense, critical infrastructure protection, digital sovereignty, data protection, policy, strategy, regulation
JEL Code(s)
K24, N44, O25, O38
With the digitization of nearly all aspects of life, our societies increasingly depend on the resilience and security of computing and communication technologies. Hence, the protection of information technology (IT) against unauthorized access, attack, and accidental failure, has become a priority for nation-states around the world. Throughout the past one or two decades, most countries have adopted strategies, policies, and practical steps to protect the security of IT and critical infrastructures within their territory, and, by extension, their citizens. These practices are generally subsumed under the umbrella of cybersecurity. The book provides an analysis of the evolution of cybersecurity policy in Germany over the past two and a half decades. It highlights development lines as well as upcoming strategic challenges of the German cybersecurity policy.
Volume
1st ed.,
Pages
76
ISBN
978-3-319-90013-1
ISBN (Online)
978-3-319-90014-8
Conference Proceeding

The governance of safety and security risks in connected healthcare

IET Conference & Seminar Publications CP740
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
Medical devices, e-health, IoT, governance, cybersecurity, safety
Book

Schwacher Staat im Netz: Wie die Digitalisierung den Staat in Frage stellt [The weak state on the internet: How digitalization puts the state into question]

Berlin: Springer
Martin Schallbruch (2018)
Subject(s)
Economics, politics and business environment; Ethics and social responsibility; Information technology and systems; Technology, R&D management
Keyword(s)
Digital strategy, digitalization, cybersecurity, digital law, digital government
JEL Code(s)
H11, H40, H77, O38
Pages
271
ISBN
978-3-658-19946-3
ISBN (Online)
978-3-658-19947-0
Journal Article

Robust fuzzy extractors and helper data manipulation attacks revisited: Theory vs practice

IEEE Transactions on Dependable and Secure Computing PP (99): 1–14
Georg T. Becker (2017)
Subject(s)
Information technology and systems
Keyword(s)
Robust fuzzy extractor, physical unclonable functions (PUFs), helper data manipulation attacks
Volume
PP
Journal Pages
1–14
ISSN (Print)
1545-5971
DSI Industrial & Policy Recommendations Series (IPR)

Recommendations for safety, security and data policy in automotive IT

DSI Industrial & Policy Recommendations Series (IPR) 2017 (4)
Sandro Gaycken, Martin Schallbruch, Georg T. Becker (2017)
Subject(s)
Technology, R&D management
Keyword(s)
Automotive IT, safety, security, data policy, vehicle safety
The DSI has carried out stakeholder workshops with the automotive sector, mobility digital startups, automotive insurers, and vehicle inspectors and, on this basis, has developed the recommendations for safety, security and data policy in automotive IT. The car of the future will collect a wide range of data. Ownership and usage of those data must be clarified, and legal and technical characteristics have to be established in order to endure data protection, data security, vehicle safety, and a fair market.
This issue contains German text and English translation in one file.
Volume
2017
Journal Article

Bitstream Fault Injections (BiFI) – Automated fault attacks against SRAM-based FPGAs

IEEE Transactions on Computers PP (99): 1–13
Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar (2017)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Bitstream encryption vulnerability, FPGA security, bitstream fault injection, automated key recovery, AES
Volume
PP
Journal Pages
1–13