Skip to main content

    Alf Zugenmaier

    ABSTRACT Pervasive computing can be divided into computing on personal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy... more
    ABSTRACT Pervasive computing can be divided into computing on personal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy concerns arise. This paper presents an approach to dispel concerns relating to improper use of personal data based on digital rights management technology. A prototype implementation of this approach in a smart hospital environment is described.
    ABSTRACT The next generation communications system will constitute of a heterogeneous access network technologies under a common IP layer. This next generation is often called beyond third generation, B3G. The heterogeneity present in... more
    ABSTRACT The next generation communications system will constitute of a heterogeneous access network technologies under a common IP layer. This next generation is often called beyond third generation, B3G. The heterogeneity present in these networks leads to security challenges not present in homogeneous networks. Besides the security issues there is also the issue of providing fast handover such that the user does not perceive any change in service quality or in other words seamless handover. In this paper, we will first define B3G systems and present some of the issues related to it. Next, we will propose approaches to secure and seamless handover in a B3G system.
    Enhancing Applications with Approved Location Stamps ... The model of security rela-tionships between different entities in a communications net-work with Intelligent ... Kreutzer, A. Zugenmaier, „Location Stamps for Digital Signatures:A... more
    Enhancing Applications with Approved Location Stamps ... The model of security rela-tionships between different entities in a communications net-work with Intelligent ... Kreutzer, A. Zugenmaier, „Location Stamps for Digital Signatures:A New Service for Mobile Telephone Networks ...
    Location aware services are expected to make up a large share of the mobile telephone market in the future. The services proposed so far make use of uncertified location information—information push services, guidance systems, positioning... more
    Location aware services are expected to make up a large share of the mobile telephone market in the future. The services proposed so far make use of uncertified location information—information push services, guidance systems, positioning for emergency calls, etc. We propose a service that provides certified location information. Integrated with cryptographic digital signatures this service enables the determination of the
    ABSTRACT First Page of the Article
    Devices supporting nomadic applications are assumed to be able to take advantage of the capabilities of surrounding devices. This paper discusses the access control requirements of such ad-hoc federations of communicating devices, some of... more
    Devices supporting nomadic applications are assumed to be able to take advantage of the capabilities of surrounding devices. This paper discusses the access control requirements of such ad-hoc federations of communicating devices, some of which may be administered by a different authority, and illustrates how such scenarios would be handled in the Web Services Securityand the framework proposed in the WiTness project. The adaptation of the WiTness flexible attribute certificate infrastructure as tokens for the Web Services Securityspecifications suite is finally discussed as an option to support scenarios where a full-time attachment to a global network is impossible.
    Research Interests:
    Software patching has not been e#ective as a first-line defense against large-scale worm attacks, even when patches have long been available for their corresponding vulnerabilities. Generally, people have been reluctant to patch their... more
    Software patching has not been e#ective as a first-line defense against large-scale worm attacks, even when patches have long been available for their corresponding vulnerabilities. Generally, people have been reluctant to patch their systems immediately, because patches are perceived to be unreliable and disruptive to apply. To address this problem, we propose a first-line worm defense in the network stack, using shields --- vulnerability-specific, exploit-generic network filters installed in end systems once a vulnerability is discovered, but before a patch is applied. These filters examine the incoming or outgoing tra#c of vulnerable applications, and correct tra#c that exploits vulnerabilities. Shields are less disruptive to install and uninstall, easier to test for bad side e#ects, and hence more reliable than traditional software patches. Further, shields are resilient to polymorphic or metamorphic variations of exploits [43].
    (MBMS) has been included in the 3GGP architecture to provide broadcast/multicast services. In the 3GPP Long Term Evolution, the evolved MBMS (e-MBMS) architecture is currently being standardized. This position paper discusses the security... more
    (MBMS) has been included in the 3GGP architecture to provide broadcast/multicast services. In the 3GPP Long Term Evolution, the evolved MBMS (e-MBMS) architecture is currently being standardized. This position paper discusses the security issues currently being considered for the e-MBMS IP multicast user plane. Currently proposed security architectures "limit " themselves to include Group Security Associations (GSA). In this paper we raise the position that GSA might not be a sufficiently secure solution in the long run. In sight of this, we propose to adopt a secure multicast overlay approach as a possible short-term solution, thanks to its straightforward deployment. To prove this latter point we overview how to set-up a proof-of-concept implementation over public domain linux routers. We functionally compare GSA with the proposed secure multicast overlay approach, showing that the overlay approach provides not only the same level of security, but also a reduced risk of ...
    ABSTRACT Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights... more
    ABSTRACT Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their customers. Users may benefit from identity management to simplify logging in to websites and computer systems (single sign-on), as well as streamlining management of their personal information and preferences (user centricity). Current systems for identity management only partially achieve these goals, and still suffer from several security, privacy and usability issues. We will discuss how personal mobile devices (like mobile phones and PDA's) can be used to overcome this 'identity crisis', to increase the security, privacy and usability of identity management systems.
    Page 1. Anchor-Less Secure Session Mobility Alf Zugenmaier1,⋆ , Julien Laganier2,⋆ , Anand Prasad3,⋆ , and Kristian Slavov4 ... References 1. Perkins, C. (ed.): Mobile IP for IPv4. IETF, RFC 3344 (2004) 2. Johnson, D., Perkins, C., Arkko,... more
    Page 1. Anchor-Less Secure Session Mobility Alf Zugenmaier1,⋆ , Julien Laganier2,⋆ , Anand Prasad3,⋆ , and Kristian Slavov4 ... References 1. Perkins, C. (ed.): Mobile IP for IPv4. IETF, RFC 3344 (2004) 2. Johnson, D., Perkins, C., Arkko, J.: Mobile IP for IPv6. ...
    Pervasive computing can be divided into computing on per- sonal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy concerns... more
    Pervasive computing can be divided into computing on per- sonal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy concerns arise. This paper presents an approach to dispel concerns relating to improper use of personal data based on digital rights management technology. A prototype implementation of this
    Software patching has not been effective as a first-line defense against large-scale worm attacks, even when patches have long been available for their corresponding vulnerabilities. Generally, people have been reluctant to patch their... more
    Software patching has not been effective as a first-line defense against large-scale worm attacks, even when patches have long been available for their corresponding vulnerabilities. Generally, people have been reluctant to patch their systems immediately, because patches are perceived to be unreliable and disruptive to apply. To address this problem, we propose a first-line worm defense in the network stack,
    Pervasive computing can be divided into computing on personal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy concerns... more
    Pervasive computing can be divided into computing on personal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy concerns arise. These concerns would be unnecessary if the behavior of services in the smart environment could be authenticated and known to be compliant to given policies. Based upon
    Research Interests:
    ... Telecommunications System (UMTS) and it is required to base the security protocols on ... Section IV proposes solutions for inter-working between the existing solutions and their ... The enhancement includes reduced latency, higher... more
    ... Telecommunications System (UMTS) and it is required to base the security protocols on ... Section IV proposes solutions for inter-working between the existing solutions and their ... The enhancement includes reduced latency, higher data rates, improved capacity and coverage, and ...
    ABSTRACT Issues of privacy and marketing are once again topical. AOL is suing the senders of spam which has clogged up its network. Location based marketing is a step closer in the UK with the introduction of the first 3G mobile phones.... more
    ABSTRACT Issues of privacy and marketing are once again topical. AOL is suing the senders of spam which has clogged up its network. Location based marketing is a step closer in the UK with the introduction of the first 3G mobile phones. Yet currently the regulation of direct marketing using electronic communications is, at best, confusing. Different pieces of legislation and codes of conduct have been used to regulate different forms of communications. The Directive on Privacy and Electronic Communications (the “Directive”) aims partly to bring the various threads together. This article considers how effectively it achieves this by examining the main provisions of that Directive relating to privacy and how they will change the current regime in the UK.