CINXE.COM

Secure Systems Engineering - Fraunhofer AISEC

<!DOCTYPE html> <html lang="en" class=""> <head> <meta charset="utf-8"/> <meta http-equiv="X-UA-Compatible" content="IE=edge"/> <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes"/> <title>Secure Systems Engineering - Fraunhofer AISEC</title> <!-- Avoid annoying toolbar on images in Internet Explorer --> <meta http-equiv="imagetoolbar" content="no" /> <!-- Information for Robots --> <meta name="robots" content="noodp,noydir,index,follow" /> <link rel="alternate" href="https://www.aisec.fraunhofer.de/de/forschungsabteilungen/SSE.html" hreflang="de"/> <link rel="alternate" href="https://www.aisec.fraunhofer.de/en/fields-of-expertise/SSE.html" hreflang="en"/> <!-- open graph and twitter share meta data --> <meta property="og:title" content="Secure Systems Engineering - Fraunhofer AISEC"/> <meta property="og:description" content=""/> <meta property="og:url" content="https://www.aisec.fraunhofer.de/en/fields-of-expertise/SSE.html"/> <meta property="og:type" content="website"/> <meta property="og:site_name" content="Fraunhofer Institute for Applied and Integrated Security "/> <meta http-equiv="last-modified" content="2024-12-09T13:52:43.117Z" /> <meta name="pubdate" content="2024-12-09T14:52:43.117+01:00" /> <meta name="copyright" content="Copyright" /> <!-- / LEGACY meta tags end --> <!--[if !IE]>--> <link rel="stylesheet" href="/etc.clientlibs/fraunhofer/ui/website/css/fraunhofer.min.402872372450437a4d04463c920a8539.css" type="text/css"> <!--<![endif]--> <!--[if gt IE 8]> <![endif]--> <!-- HTML5 shim and Respond.js for IE8 support of HTML5 elements and media queries --> <!--[if lte IE 8]> <link rel="stylesheet" href="/etc.clientlibs/fraunhofer/ui/website/css/lte_ie8.min.css" type="text/css"> <script src="/etc.clientlibs/fraunhofer/ui/website/js/lte_ie8.min.js"></script> <![endif]--> <!-- Favorite icon --> <link rel="shortcut icon" href="/static/css/fraunhofer/resources/img/favicons/favicon_16x16.ico" type="image/x-icon"/> <link rel="apple-touch-icon" sizes="180x180" href="/static/css/fraunhofer/resources/img/favicons/apple-touch-icon_180x180.png"> <meta name="msapplication-TileColor" content="#ffffff"> <meta name="msapplication-TileImage" content="/static/css/fraunhofer/resources/img/favicons/mstile-144x144.png"> <link rel="icon" type="image/png" href="/static/css/fraunhofer/resources/img/favicons/favicon_32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="/static/css/fraunhofer/resources/img/favicons/favicon_96x96.png" sizes="96x96"> <link rel="icon" type="image/svg+xml" href="/static/css/fraunhofer/resources/img/favicons/favicon.svg" sizes="any"> <!-- Platform for Internet Content Selection (PICS) self-rating --> <link rel="meta" href="/static/css/fraunhofer/resources/pics.rdf" type="application/rdf+xml" title="PICS labels"/> <!-- Open Search --> <link rel="search" type="application/opensearchdescription+xml" title="Fraunhofer Institute for Applied and Integrated Security (en)" href="/en.opensearch.xml"/> <meta name="geo.position" content="48.251968;11.634488" /> <meta name="ICBM" content="48.251968, 11.634488" /> </head> <body class="col-3" itemtype="https://schema.org/WebPage" itemscope="itemscope"> <div class="fhg-wrapper"> <header> <input type="hidden" class="available-languages-servlet-path" data-path="/en/fields-of-expertise/SSE/jcr:content.languages.json" /> <div class="fhg-header"> <div class="fhg-grid"> <div class="row1"> <div class="fhg-grid-item fhg-grid-3-2-1-1 section-search"> <section role="search"> <form method="get" action="/en/volltextsuche.html" id="search-form" data-suggest-url="/bin/wcm/enterprisesearch/suggest"> <div> <input type="hidden" name="_charset_" value="UTF-8" /> <input name="numberResults" value="10" type="hidden" /> <input name="page" value="1" type="hidden" /> <input name="scope" value="AISEC" type="hidden"/> <input name="language" value="en" type="hidden"/> <input id="search-query-default-foo" disabled="disabled" value="Suchbegriff" type="hidden"/> <input name="lang" id="search-query-default-foo-hidden" value="en" type="hidden"/> <input type="text" autocomplete="off" name="queryString" id="SSEsearchQuery" class="hasDefault ac_input queryStringContentHeader" maxlength="100"/> </div> <button type="submit">Search</button> </form> </section> </div> <div class="fhg-grid-item fhg-grid-1-1-1-1 section-title"> <a href="/en.html"><div class="logo-heading"> <img class="logo" alt="" title="" src="/content/dam/aisec/aisec_190x52.gif"/> Fraunhofer Institute for Applied and Integrated Security </div> </a></div> </div> <div class="row2"> <div class="fhg-grid-item fhg-grid-1-1-1-1 section-about text-site-identifier"> <a href="/en.html">Fraunhofer Institute for Applied and Integrated Security </a></div> <div class="fhg-grid-item fhg-grid-3-2-1-1 section-nav" id="menu"> <div class="row2-1"> <div class="fhg-grid-item section-menu-plus"> <nav> <ul> <li><a href="/en/jobs-career.html">Jobs / Career</a></li> <li><a href="/en/Blog.html">Blog</a></li> <li><a href="/en/about-us/contact.html">Contact</a></li> <li class="lang"><a href="/de/forschungsabteilungen/SSE.html">Deutsch</a></li> </ul> </nav> </div> </div> <div class="nav-fhg" id="nav"><div class="section-menu"> <nav> <ul class="fhg-mainmenu"> <li class="lvl-1 showInHeader"> <span><a href="/en/jobs-career.html">Jobs / Career</a></span> </li> <li class="lvl-1 "> <span class="navigable"><a href="/en/about-us.html">About Fraunhofer AISEC</a></span> <div class="submenu"> <span class="btn close">[X]</span> <span class="mainmenu-title follow-link"><a href="/en/about-us.html">About Fraunhofer AISEC</a></span> <ul> <li class="lvl-2"> <a href="/en/about-us/in-profile.html">In Profile</a></li> <li class="lvl-2"> <a href="/en/about-us/Collaboration.html">Opportunities for collaboration</a></li> <li class="lvl-2"> <a href="/en/about-us/how-to-find-us.html">How to find us</a></li> <li class="lvl-2 showInHeader"> <a href="/en/about-us/contact.html">Contact</a></li> <li class="lvl-2"> <a href="/en/about-us/Laboratories.html">Laboratories</a></li> <li class="lvl-2"> <a href="/en/about-us/scientific_excellence.html">Scientific Excellence</a></li> <li class="lvl-2"> <a href="/en/about-us/quality_management.html">Quality Management</a></li> <li class="lvl-2"> <a href="/en/about-us/Competence-Center-PQC.html">Competence Center for Post-Quantum Cryptography</a></li> <li class="lvl-2"> <a href="/en/about-us/advisory-board.html">Advisory Board</a></li> <li class="lvl-2"> <a href="/en/about-us/statement-for-democracy.html">Statement for Democracy</a></li> </ul> </div> </li> <li class="lvl-1 "> <span class="navigable"><a href="/en/fields-of-expertise.html">Fields of Expertise</a></span> <div class="submenu"> <span class="btn close">[X]</span> <span class="mainmenu-title follow-link"><a href="/en/fields-of-expertise.html">Fields of Expertise</a></span> <ul> <li class="lvl-2 is-expandable"> <span class="follow-link navigable"><a href="/en/fields-of-expertise/CST.html">Cognitive Security Technologies</a></span> <ul> <li class="lvl-3"> <a href="/en/fields-of-expertise/CST/bayqs.html">BayQS</a></li> </ul> </li> <li class="lvl-2"> <a href="/en/fields-of-expertise/HWS.html">Hardware Security</a></li> <li class="lvl-2"> <a href="/en/fields-of-expertise/SIS.html">Secure Infrastructure</a></li> <li class="lvl-2"> <a href="/en/fields-of-expertise/SSE.html">Secure Systems Engineering</a></li> <li class="lvl-2"> <a href="/en/fields-of-expertise/SOS.html">Secure Operating Systems</a></li> <li class="lvl-2"> <a href="/en/fields-of-expertise/PIN.html">Product Protection and Industrial Security</a></li> <li class="lvl-2"> <a href="/en/fields-of-expertise/SAS.html">Service and Application Security</a></li> </ul> </div> </li> <li class="lvl-1 "> <span class="navigable"><a href="/en/spotlights.html">Spotlights</a></span> <div class="submenu"> <span class="btn close">[X]</span> <span class="mainmenu-title follow-link"><a href="/en/spotlights.html">Spotlights</a></span> <ul> <li class="lvl-2"> <a href="/en/spotlights/trusted-electronics.html">Trusted Electronics</a></li> <li class="lvl-2"> <a href="/en/spotlights/Competence-Center-PQC.html">Post-Quantum Cryptography</a></li> <li class="lvl-2"> <a href="/en/spotlights/Deepfakes.html">Deepfakes</a></li> <li class="lvl-2"> <a href="/en/spotlights/the-cyber-resilience-act---security-requirements-for-products-wi.html">Cyber Resilience Act</a></li> </ul> </div> </li> <li class="lvl-1 "> <span class="navigable"><a href="/en/media.html">Media</a></span> <div class="submenu"> <span class="btn close">[X]</span> <span class="mainmenu-title follow-link"><a href="/en/media.html">Media</a></span> <ul> <li class="lvl-2 is-expandable"> <span class="follow-link navigable"><a href="/en/media/publications.html">Publications</a></span> <ul> <li class="lvl-3"> <a href="/en/media/publications/annual-report-2023.html">Annual Report 2023</a></li> </ul> </li> <li class="lvl-2"> <a href="/en/media/press-releases.html">Press Releases</a></li> <li class="lvl-2"> <a href="/en/media/Newsletter.html">Newsletter</a></li> <li class="lvl-2"> <a href="/en/media/events.html">Events</a></li> <li class="lvl-2 is-expandable"> <span class="follow-link navigable"><a href="/en/media/moremedia.html">More media</a></span> <ul> <li class="lvl-3"> <a href="/en/media/moremedia/CharlieQC.html">Serious Game</a></li> </ul> </li> </ul> </div> </li> <li class="lvl-1 showInHeader"> <span><a href="/en/Blog.html">Blog</a></span> </li> <li class="more lvl-1" id="morefield"><span class="navigable"><span>More</span></span> <ul></ul> </li> </ul> </nav> </div> </div> </div> </div> </div> </div> <div data-emptytext="stage_parsys_hint" class="dummyclass"></div> <nav class="breadcrumbs text-secondary"> <div class="drop-down-bar"> <p>Where am I?</p> </div> <div class="wrapper"> <ul> <li><a href="/en.html">English</a></li> <li><a href="/en/fields-of-expertise.html">Fields of Expertise</a></li> <li>Secure Systems Engineering</li> </ul> </div> </nav> <div class="fhg-section-separator fhg-heading-separator fhg-grid fhg-grid-4-columns "> <div class="fhg-grid-item"> <h1>Secure Systems Engineering</h1> </div> <div class="fhg-grid-item empty"></div> </div> </header> <div class="fhg-main fhg-grid fhg-grid-3-columns"> <div class="contentPar parsys"><div data-emptytext-sectionParsys="section_component_hint" data-emptytext="Drag components here" class="sectionComponent parbase section" data-emptytext-teaserParsys="section_component_marginal_column_parsys_hint"><div class="fhg-grid-section"> <div class="fhg-grid fhg-grid-3-columns"> <section> <div class="sectionParsys parsys"><div class="fhg-content-article fhg-grid section"><article> <div class="fhg-grid-item fhg-grid-3-2-1 fhg-content heading"> <h2 id="System-Security-and-Usable-Security" class="fragment">System Security and Usable Security</h2> </div> <div class="row"> <div class="fhg-grid-item fhg-grid-3-2-1"> <div class="fhg-content fhg-richtext"> <p>Digitization covering more and more areas of life is continuously on the rise. The department Secure Systems Engineering offers developing and implementing secure and usable IT systems to all of its customers. </p> <p>Our considerations cover the entire product lifecycle: we identify necessary security and data protection measures early on during the conception phase, support the implementation in a feasible manner during the development process, and also maintain and adapt them during active use, always in line with emerging product requirements while complying with best practice standards. Our portfolio also includes support in certification in accordance with established process models such as the ISO/IEC 27000 family, IT-Grundschutz or Common Criteria. </p> <p>Our research department draws on experience from numerous research and development projects: Quantum computer-resistant algorithms ensure future proof cryptographic systems. Modern cryptographic processes and protocols guarantee that all requirements regarding information security and data protection are implemented properly. The early involvement of various stakeholders ensures that the implemented security measures can be used by everyone.</p></div> </div> </div> </article> </div> </div> </section> </div> </div></div> <div data-emptytext-sectionParsys="section_component_hint" data-emptytext="Drag components here" class="sectionComponent parbase section" data-emptytext-teaserParsys="section_component_marginal_column_parsys_hint"><div class="sep sectionseparator"><script data-scf-json="true" type='application/json' id='/en/fields-of-expertise/SSE/jcr:content/contentPar/sectioncomponent_1687749402/sep'>{"id":"/en/fields-of-expertise/SSE/jcr:content/contentPar/sectioncomponent_1687749402/sep","resourceType":"fraunhofer/components/sectionseparator","url":"/en/fields-of-expertise/SSE/_jcr_content/contentPar/sectioncomponent_1687749402/sep.social.json","friendlyUrl":"/en/fields-of-expertise/SSE.html"}</script><div class="fhg-section-separator"></div> </div> <div class="fhg-grid-section"> <div class="fhg-grid fhg-grid-3-columns"> <section> <div class="sectionParsys parsys"><div data-emptytext="linklist_add_items" class="fhg-content-article fhg-grid section"><article> <div class="fhg-grid-item fhg-grid-3-2-1 fhg-content heading"> <h2 id="Offerings" class="fragment">Offerings</h2> <p>We work closely with our customers and partners in order to systematically assess and improve the security of both systems and products, to evaluate their reliability, to design them securely, and to sustainably ensure their security throughout the entire life cycle.</p> </div> <div class="row"> <div class=" fhg-grid-item fhg-grid-3-2-1"> <div class="fhg-content fhg-richtext"> <h4>Evaluate security&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br> </h4> <ul> <li style="text-align: left;"><span class="bulletpointlist">Evaluation of security in accordance with a variety of assessment criteria as well as best practice standards</span></li> <li style="text-align: left;"><span class="bulletpointlist">Conducting threat and risk analyses</span></li> <li style="text-align: left;"><span class="bulletpointlist">Analysis of cryptographic methods</span></li> <li style="text-align: left;"><span class="bulletpointlist">Analysis and development of random number generators <br> </span></li> </ul> <h4>Design security <br> </h4> <ul> <li>S<span class="bulletpointlist" style="color: rgb(0,0,0);">upport regarding information security and data protection during development</span></li> <li><span class="bulletpointlist" style="color: rgb(0,0,0);">Development of cryptographic-, IT security- and data protection concepts</span></li> <li><span class="bulletpointlist" style="color: rgb(0,0,0);">Development of secure system architectures</span></li> <li><span class="bulletpointlist" style="color: rgb(0,0,0);">Development of solutions regarding usability, data privacy and security</span></li> <li><span class="bulletpointlist" style="color: rgb(0,0,0);">Secure software development</span></li> <li><span class="bulletpointlist" style="color: rgb(0,0,0);">Inclusion of the latest technologies, e.g., Differential Privacy</span></li> <li><span class="bulletpointlist" style="color: rgb(0,0,0);">Quantum computer resistant cryptography and cryptographic agility &nbsp;</span></li> </ul> <h4>Maintain security&nbsp;&nbsp; <br> </h4> <ul> <li>Risk management<br> </li> <li><span class="bulletpointlist">Security monitoring</span></li> <li><span class="bulletpointlist">Vulnerability management</span></li> <li><span class="bulletpointlist">Incident management</span></li> <li><span class="bulletpointlist">Support in conducting security audits<br> </span></li> <li><span class="bulletpointlist"></span>Training in the areas of identity management, usable privacy and security and post-quantum cryptography<br> </li> </ul></div> </div> </div> </article> </div> </div> </section> </div> </div></div> <div data-emptytext="tabview_new_tab_hint" class="dummyclass section"><div class="sep sectionseparator"><script data-scf-json="true" type='application/json' id='/en/fields-of-expertise/SSE/jcr:content/contentPar/tabview_overview/sep'>{"id":"/en/fields-of-expertise/SSE/jcr:content/contentPar/tabview_overview/sep","resourceType":"fraunhofer/components/sectionseparator","url":"/en/fields-of-expertise/SSE/_jcr_content/contentPar/tabview_overview/sep.social.json","friendlyUrl":"/en/fields-of-expertise/SSE.html"}</script><div class="fhg-section-separator"></div> </div> <div class="fhg-paneled tab-transform can-open"> <div class="section-title"> <h2 id="Expertise" class="fragment">Expertise</h2> </div> <div class="controls"> <a href="#expand-all" class="control-open">Expand all</a> <a href="#close-all" class="control-close">Close all</a> </div> <div class="fhg-accordion tab-transform level-1"> <div data-emptytext="tabview_tabcontent_hint" class="accordion-item tab-item section"><h2 class="item-heading fragment" id="tabview_tab-heading"> <a class="item-title item-trigger collapsed" data-toggle="collapse" href="#1" aria-expanded="false" aria-controls="tabview_tab-content" title="Secure Digital Identities"> Secure Digital Identities</a></h2> <div class="item-body collapse" id="1" aria-labelledby="tabview_tab-heading"> <div class="tabPar parsys"><div class="fhg-content-article fhg-grid section"><article> <div class="row"> <div class="fhg-grid-item fhg-grid-3-2-1"> <div class="fhg-content fhg-richtext"> <p>Secure digital identities (SDI) are key drivers for a successful transition of business processes to the digital world. This applies to both business (e.g., taking out insurance or opening an account on the Internet) and administration (e.g. under the Online Access Act, federal and state administrative services in Germany must be offered online by 2022).</p> <p>Requirements for the secure implementation of electronic identities are formulated in abstract terms only. Depending on the level of security to be implemented, these are stated in the European regulation (EU) 2015/1502 (Minimum requirements and technical specifications on procedures for security levels of electronic identification means). Currently, requirements for identity wallets, digital credentials, and self-sovereign identities (SSI) are under active development.</p> <p>There still are many challenges for all stakeholders that prevent secure digital identities from being used widely.</p> <p>Research in this area conducted by the Secure Systems Engineering department focuses not only on the security of identity solutions, but also on interoperability, privacy, and usability. We support both identity providers as well as development of eID ecosystems in achieving these goals while also researching and developing new methods of implementing secure digital identities.</p></div> </div> </div> </article> </div> </div> </div> </div> <div data-emptytext="tabview_tabcontent_hint" class="accordion-item tab-item section"><h2 class="item-heading fragment" id="tabview_tab_501908116-heading"> <a class="item-title item-trigger collapsed" data-toggle="collapse" href="#501908118" aria-expanded="false" aria-controls="tabview_tab_501908116-content" title="Post-quantum Cryptography"> Post-quantum Cryptography</a></h2> <div class="item-body collapse" id="501908118" aria-labelledby="tabview_tab_501908116-heading"> <div class="tabPar parsys"><div class="fhg-content-article fhg-grid section"><article> <div class="row"> <div class="fhg-grid-item fhg-grid-3-2-1"> <div class="fhg-content fhg-richtext"> <p>Quantum computers are having a significant impact on the security of asymmetric cryptographic methods being used today. A quantum computer algorithm developed by Shor in 1994 efficiently breaks cryptographic methods whose security relies either on the factorization problem (i.e., RSA encryption and digital signatures) or on the discrete logarithm problem (e.g., (EC)-DSA digital signatures or the key agreement method (EC) Diffie-Hellman).</p> <p>This renders almost all currently used public key cryptographic systems&nbsp; insecure (digital signatures, key agreement and public key encryption methods). This is bound to affect almost all cryptographically secured Internet connections (e.g., via https or Virtual Private Network (VPN)).</p> <p>The focus of our research is centered around the security analysis of quantum computer resistant methods, investigations regarding the applicability and optimizations for devices with limited resources as well as the migration of existing systems towards quantum computer resistant systems.</p></div> </div> </div> </article> </div> </div> </div> </div> <div data-emptytext="tabview_tabcontent_hint" class="accordion-item tab-item section"><h2 class="item-heading fragment" id="tabview_tab_275029698-heading"> <a class="item-title item-trigger collapsed" data-toggle="collapse" href="#275029700" aria-expanded="false" aria-controls="tabview_tab_275029698-content" title="Differential Privacy and Machine Learning"> Differential Privacy and Machine Learning</a></h2> <div class="item-body collapse" id="275029700" aria-labelledby="tabview_tab_275029698-heading"> <div class="tabPar parsys"><div class="fhg-content-article fhg-grid section"><article> <div class="row"> <div class="fhg-grid-item fhg-grid-3-2-1"> <div class="fhg-content fhg-richtext"> <p>In the era of growing data streams, automated data analysis methods, such as machine learning (ML), are increasingly being used. ML models are trained to make generalized predictions on unknown data based on their training data. In recent years, there has been a growing understanding that, in many cases, even though a model supposedly contains only an abstraction of its training data, it by no means sufficiently protects the privacy of individuals whose data was used in training said model.</p> <p>It is possible to draw conclusions about the training data from the parameters of a model (e.g., via so-called property inference or model inversion attacks). Protection against such attacks can be provided by mechanisms such as Differential Privacy (DP), which is a mathematical framework that allows meaningful analyses to be performed on a group of individuals without violating the privacy of any single individual. This purpose is achieved by adding mathematical noise during a given analysis. Most commonly, the noise is added in various forms during model training, thereby allowing the privacy of individuals in the training dataset to be protected.</p></div> </div> </div> </article> </div> </div> </div> </div> <div data-emptytext="tabview_tabcontent_hint" class="accordion-item tab-item section"><h2 class="item-heading fragment" id="tabview_tab_152497787-heading"> <a class="item-title item-trigger collapsed" data-toggle="collapse" href="#152497789" aria-expanded="false" aria-controls="tabview_tab_152497787-content" title="Usable Security and Privacy"> Usable Security and Privacy</a></h2> <div class="item-body collapse" id="152497789" aria-labelledby="tabview_tab_152497787-heading"> <div class="tabPar parsys"><div class="fhg-content-article fhg-grid section"><article> <div class="row"> <div class="fhg-grid-item fhg-grid-3-2-1"> <div class="fhg-content fhg-richtext"> <p>Often, the requirements, knowledge and skills of the target audience are not considered at the beginning, but rather at the end of the design phase. Usually, the security goals ("What needs to be protected?") and the security model ("How should it be protected?") are defined first. However, the selected security model has a significant impact on possible user interactions, usually resulting in significant weaknesses regarding usability.</p> <p>An important requirement for usable systems is allowing users to reach their goal while keeping interactions to a minimum. From the perspective of usable security and privacy, this is in most cases is neither possible nor meaningful. Legally binding processes, such as signing a contract or giving consent, require active involvement of users. Interaction should be minimized only to a point where trust in the system does not diminish, and users are not left uncertain about the state of the system.</p> <p>Our research is focused on the development of methods and tools for assessing the usability of- and trust in secure systems and privacy measures, as well as on the development of models for easy and error-free use of such systems.&nbsp;</p></div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> <div data-emptytext="teaser_overview_parsys_hint" class="teaser section"><div class="sep sectionseparator"><script data-scf-json="true" type='application/json' id='/en/fields-of-expertise/SSE/jcr:content/contentPar/teaser_overview_827940098/sep'>{"id":"/en/fields-of-expertise/SSE/jcr:content/contentPar/teaser_overview_827940098/sep","resourceType":"fraunhofer/components/sectionseparator","url":"/en/fields-of-expertise/SSE/_jcr_content/contentPar/teaser_overview_827940098/sep.social.json","friendlyUrl":"/en/fields-of-expertise/SSE.html"}</script><div class="fhg-section-separator"></div> </div> <div class="fhg-grid teaser-layout fhg-grid-4-columns"> <div class="fhg-grid-item teaser-layout__title "> <h2 class="teaser-layout__title-headline fragment" id="Selected-Projects">Selected Projects</h2> </div> <div class="fhg-grid teaser-layout--masonry js-teaser-layout--masonry" data-config-masonry='{"horizontalOrder":false}'> <div class="fhg-grid-column-sizer"></div> <div class="teaserPar parsys"><div data-emptytext="linklist_add_items" class="teaser__item section"><div class="fhg-grid-item teaser-default teaser-default--size-1x2 teaser-default--variant- teaser-default--color-white teaser-default--has-image js-teaser-ellipsis"> <div class="teaser-default__content"> <a href="https://www.aisec.fraunhofer.de/en/about-us/Competence-Center-PQC.html" class="teaser-default__image teaser-default__image--linked teaser-default__image--small small" style="background-image: url(&#39;/en/fields-of-expertise/SSE/jcr:content/contentPar/teaser_overview_827940098/teaserPar/teaser_copy/image.img.2col.large.jpg/1721748071280/Header-Kompetenzzentrum-Post-Quanten-Kryptografie-2.jpg&#39;);background-position: 50% 50%" target="_blank">&nbsp;</a><div class="teaser-default__text"> <div class="teaser-default__text-caption js-teaser-default__text-caption"> <h3 class="teaser-default__text-headline">Competence Center for Post-Quantum Cryptography</h3> <div class="teaser-default__text-richtext"><p>Fraunhofer AISEC is pooling its expertise in the future technology of post-quantum cryptography (PQC) via the Competence Center for Post-Quantum Cryptography. Our goal as a neutral and manufacturer-independent center is to support companies and public research institutions in the switch to quantum-resistant cryptographic process<br> </p></div> </div> <div class="teaser-default__text-cta js-teaser-default__text-cta"> <ul class="teaser-default__text-cta--list fhg-list arrowed-list"> <li class="linkComponent section"><a href="https://www.aisec.fraunhofer.de/en/about-us/Competence-Center-PQC.html" class="" target="_blank">More about</a>&nbsp;(aisec.fraunhofer.de)</li> </ul> </div> </div> </div> </div> </div> <div data-emptytext="linklist_add_items" class="teaser__item section"><div class="fhg-grid-item teaser-default teaser-default--size-1x2 teaser-default--variant- teaser-default--color-white teaser-default--has-image js-teaser-ellipsis"> <div class="teaser-default__content"> <a href="https://www.forschung-it-sicherheit-kommunikationssysteme.de/projekte/veranda" class="teaser-default__image teaser-default__image--linked teaser-default__image--small small" style="background-image: url(&#39;/en/fields-of-expertise/SSE/jcr:content/contentPar/teaser_overview_827940098/teaserPar/teaser_1994164062_co_2141327280/image.img.2col.large.jpg/1733751143892/Cognitive-Security-Technologies.jpg&#39;);background-position: 50% 50%" target="_blank">&nbsp;</a><div class="teaser-default__text"> <div class="teaser-default__text-caption js-teaser-default__text-caption"> <p class="teaser-default__text-meta"> <span class="teaser-default__text-meta-category">New innovative tools for medical diagnostics</span> </p> <h3 class="teaser-default__text-headline">VERANDA</h3> <div class="teaser-default__text-richtext"><p>VERANDA is developing innovative tools that help to further develop medical diagnostics digitally. The aim is to obtain meaningful data while respecting the informational self-determination of patients. It is coordinated by Charité - Universitätsmedizin Berlin, with the TU of Berlin and the German Research Centre for Artificial Intelligence.</p></div> </div> <div class="teaser-default__text-cta js-teaser-default__text-cta"> <ul class="teaser-default__text-cta--list fhg-list arrowed-list"> <li class="linkComponent section"><a href="https://www.forschung-it-sicherheit-kommunikationssysteme.de/projekte/veranda" class="" target="_blank">More about VERANDA (in German)</a></li> </ul> </div> </div> </div> </div> </div> <div data-emptytext="linklist_add_items" class="teaser__item section"><div class="fhg-grid-item teaser-default teaser-default--size-1x2 teaser-default--variant- teaser-default--color-white teaser-default--has-image js-teaser-ellipsis"> <div class="teaser-default__content"> <a href="/en/fields-of-expertise/SSE/anonymed.html" class="teaser-default__image teaser-default__image--linked teaser-default__image--small small" style="background-image: url(&#39;/en/fields-of-expertise/SSE/jcr:content/contentPar/teaser_overview_827940098/teaserPar/teaser_943158842_cop/image.img.2col.large.png/1731069615340/ANONYMED-Rand.png&#39;);background-position: 50% 50%">&nbsp;</a><div class="teaser-default__text"> <div class="teaser-default__text-caption js-teaser-default__text-caption"> <p class="teaser-default__text-meta"> <span class="teaser-default__text-meta-category">Anonymized data for the digitalized future of medicine</span> </p> <h3 class="teaser-default__text-headline">ANONY-MED</h3> <div class="teaser-default__text-richtext"><p>In the ANONY-MED project, Fraunhofer AISEC is working with Charité – Universitätsmedizin Berlin and Smart Reporting GmbH on the anonymization of data for the digitalized medicine of the future. Their goal was to generate new knowledge using AI models, which comply with data privacy standards.</p></div> </div> <div class="teaser-default__text-cta js-teaser-default__text-cta"> <ul class="teaser-default__text-cta--list fhg-list arrowed-list"> <li class="linkComponent section"><a href="/en/fields-of-expertise/SSE/anonymed.html" class="">More about ANONY-MED</a></li> </ul> </div> </div> </div> </div> </div> <div data-emptytext="linklist_add_items" class="teaser__item section"><div class="fhg-grid-item teaser-default teaser-default--size-1x2 teaser-default--variant- teaser-default--color-white teaser-default--has-image js-teaser-ellipsis"> <div class="teaser-default__content"> <a href="https://www.technik-zum-menschen-bringen.de/projekte/werteradar" class="teaser-default__image teaser-default__image--linked teaser-default__image--small small" style="background-image: url(&#39;/en/fields-of-expertise/SSE/jcr:content/contentPar/teaser_overview_827940098/teaserPar/teaser/image.img.2col.large.jpg/1634130551883.jpg&#39;);background-position: 50% 50%" target="_blank">&nbsp;</a><div class="teaser-default__text"> <div class="teaser-default__text-caption js-teaser-default__text-caption"> <p class="teaser-default__text-caption-copyright">© CC BY-SA Aaron Winter</p> <p class="teaser-default__text-meta"> <span class="teaser-default__text-meta-category">Secure sharing of health data</span> </p> <h3 class="teaser-default__text-headline">WerteRadar</h3> <div class="teaser-default__text-richtext"><p>As part of the interdisciplinary project WerteRadar, interactive software is beeing developed for the relective sharing of health data.</p></div> </div> <div class="teaser-default__text-cta js-teaser-default__text-cta"> <ul class="teaser-default__text-cta--list fhg-list arrowed-list"> <li class="linkComponent section"><a href="https://www.technik-zum-menschen-bringen.de/projekte/werteradar" class="" target="_blank">More about Werteradar (ger.)</a></li> </ul> </div> </div> </div> </div> </div> <div data-emptytext="linklist_add_items" class="teaser__item section"><div class="fhg-grid-item teaser-default teaser-default--size-1x2 teaser-default--variant- teaser-default--color-white teaser-default--has-image js-teaser-ellipsis"> <div class="teaser-default__content"> <a href="https://www.once-project.de/" class="teaser-default__image teaser-default__image--linked teaser-default__image--small small" style="background-image: url(&#39;/en/fields-of-expertise/SSE/jcr:content/contentPar/teaser_overview_827940098/teaserPar/teaser_1530765111/image.img.2col.large.png/1634130612619/Once-ke.png&#39;);background-position: 50% 50%" target="_blank">&nbsp;</a><div class="teaser-default__text"> <div class="teaser-default__text-caption js-teaser-default__text-caption"> <p class="teaser-default__text-meta"> <span class="teaser-default__text-meta-category">Secure digital identities</span> </p> <h3 class="teaser-default__text-headline">ONCE</h3> <div class="teaser-default__text-richtext"><p>The ONCE innovation project, funded by the Federal Ministry for Economic Affairs and Energy (BMWi), is designed to enable citizens to identify themselves securely and in a user-friendly way using their smartphones.</p> <p>&nbsp;</p></div> </div> <div class="teaser-default__text-cta js-teaser-default__text-cta"> <ul class="teaser-default__text-cta--list fhg-list arrowed-list"> <li class="linkComponent section"><a href="https://www.once-project.de/" class="" target="_blank">More about ONCE (ger.)</a></li> </ul> </div> </div> </div> </div> </div> <div data-emptytext="linklist_add_items" class="teaser__item section"><div class="fhg-grid-item teaser-default teaser-default--size-1x2 teaser-default--variant- teaser-default--color-white teaser-default--has-image js-teaser-ellipsis"> <div class="teaser-default__content"> <a href="https://botan.randombit.net/" class="teaser-default__image teaser-default__image--linked teaser-default__image--small small" style="background-image: url(&#39;/en/fields-of-expertise/SSE/jcr:content/contentPar/teaser_overview_827940098/teaserPar/teaser_1994164062/image.img.2col.large.jpg/1634132611344.jpg&#39;);background-position: 50% 50%" target="_blank">&nbsp;</a><div class="teaser-default__text"> <div class="teaser-default__text-caption js-teaser-default__text-caption"> <p class="teaser-default__text-meta"> <span class="teaser-default__text-meta-category">Cryptographic library for long-lasting security</span> </p> <h3 class="teaser-default__text-headline">BOTAN</h3> <div class="teaser-default__text-richtext"><p>As part of the BSI project, an open-source, secure, clear, controllable and well-documented cryptographic library was developed in the form of BOTAN, which is suitable for as many deployment scenarios as possible and can also be used in applications with increased security requirements.</p> <p>&nbsp;</p></div> </div> <div class="teaser-default__text-cta js-teaser-default__text-cta"> <ul class="teaser-default__text-cta--list fhg-list arrowed-list"> <li class="linkComponent section"><a href="https://botan.randombit.net/" class="" target="_blank">More</a></li> </ul> </div> </div> </div> </div> </div> <div data-emptytext="linklist_add_items" class="teaser__item section"><div class="fhg-grid-item teaser-default teaser-default--size-1x2 teaser-default--variant- teaser-default--color-white teaser-default--has-image js-teaser-ellipsis"> <div class="teaser-default__content"> <a href="/en/media/press-releases/2023/crypto-protocol-for-quantum-secure-passports.html" class="teaser-default__image teaser-default__image--linked teaser-default__image--small small" style="background-image: url(&#39;/en/fields-of-expertise/SSE/jcr:content/contentPar/teaser_overview_827940098/teaserPar/teaser_1994164062_co/image.img.2col.large.jpg/1731069647103/Infineon-ePass.jpg&#39;);background-position: 50% 50%">&nbsp;</a><div class="teaser-default__text"> <div class="teaser-default__text-caption js-teaser-default__text-caption"> <p class="teaser-default__text-caption-copyright">© Infineon</p> <p class="teaser-default__text-meta"> <span class="teaser-default__text-meta-category">Quantum-secure passports</span> </p> <h3 class="teaser-default__text-headline">PoQuID</h3> <div class="teaser-default__text-richtext"><p>The security chips found on ID cards and passports are under threat from quantum computing. As part of its PoQuID research project, Fraunhofer AISEC, Infineon and Bundesdruckerei have developed cryptographic protocols that are tough enough to withstand attacks waged by quantum computers.</p></div> </div> <div class="teaser-default__text-cta js-teaser-default__text-cta"> <ul class="teaser-default__text-cta--list fhg-list arrowed-list"> <li class="linkComponent section"><a href="/en/media/press-releases/2023/crypto-protocol-for-quantum-secure-passports.html" class="">More about PoQuID</a></li> </ul> </div> </div> </div> </div> </div> </div> </div> </div></div> <div data-emptytext-sectionParsys="section_component_hint" data-emptytext="Drag components here" class="sectionComponent parbase section" data-emptytext-teaserParsys="section_component_marginal_column_parsys_hint"><div class="fhg-grid-section"> <div class="fhg-grid fhg-grid-3-columns"> <section> <div class="sectionParsys parsys"><div data-emptytext="linklist_add_items" class="fhg-content-article fhg-grid section"><article> <div class="fhg-grid-item fhg-grid-3-2-1 fhg-content heading"> <h2 id="Other-Projects" class="fragment">Other Projects</h2> </div> <div class="row"> <div class=" fhg-grid-item fhg-grid-1-2-1"> <figure class="fhg-content image "><picture> <!--[if IE 9]><video style="display: none;"><![endif]--> <source srcset="/en/fields-of-expertise/SSE/jcr:content/contentPar/sectioncomponent_774002555/sectionParsys/textwithasset/imageComponent/image.img.png/1669019268843.png" media="(min-width: 2560px)"> <source srcset="/en/fields-of-expertise/SSE/jcr:content/contentPar/sectioncomponent_774002555/sectionParsys/textwithasset/imageComponent/image.img.4col.png/1669019268843.png" media="(min-width: 1440px)"> <source srcset="/en/fields-of-expertise/SSE/jcr:content/contentPar/sectioncomponent_774002555/sectionParsys/textwithasset/imageComponent/image.img.2col.png/1669019268843.png" media="(min-width: 769px)"> <source srcset="/en/fields-of-expertise/SSE/jcr:content/contentPar/sectioncomponent_774002555/sectionParsys/textwithasset/imageComponent/image.img.2col.png/1669019268843.png" media="(min-width: 480px)"> <source srcset="/en/fields-of-expertise/SSE/jcr:content/contentPar/sectioncomponent_774002555/sectionParsys/textwithasset/imageComponent/image.img.1col.png/1669019268843.png" media="(min-width: 320px)"> <!--[if IE 9]></video><![endif]--> <img data-height="289.0" src="/en/fields-of-expertise/SSE/jcr:content/contentPar/sectioncomponent_774002555/sectionParsys/textwithasset/imageComponent/image.img.png/1669019268843.png" data-width="1032.0" style="object-position:50% 50%;"> </picture> <figcaption> <div class="figure-desc"></div></figcaption> </figure></div> <div class=" fhg-grid-item fhg-grid-2-2-1"> <div class="fhg-content fhg-richtext"> <p>Mobile services are increasingly relevant and can be considered one of the most important technological trends in society. In the healthcare sector in particular, this development poses a major challenge, as the handling of personal data requires a high level of security.</p> <p>In addition to the Fraunhofer Institute for Applied and Integrated Security AISEC, the VEGA consortium consists of Bundesdruckerei GmbH, DAK-Gesundheit, cv cryptovision GmbH and CompuGroup Medical Deutschland AG. The Federal Office for Information Security and T-Systems International GmbH are participating as associated partners.</p> <p>Further information on the project can be found on the <a href="https://www.mi.fu-berlin.de/inf/groups/ag-idm/projects/VEGA/index.html">German website of FU Berlin</a>. &nbsp;</p></div> </div> </div> </article> </div> </div> </section> </div> </div></div> <div data-emptytext="tabview_new_tab_hint" class="dummyclass section"><div class="sep sectionseparator"><script data-scf-json="true" type='application/json' id='/en/fields-of-expertise/SSE/jcr:content/contentPar/tabview_overview_1936483870/sep'>{"id":"/en/fields-of-expertise/SSE/jcr:content/contentPar/tabview_overview_1936483870/sep","resourceType":"fraunhofer/components/sectionseparator","url":"/en/fields-of-expertise/SSE/_jcr_content/contentPar/tabview_overview_1936483870/sep.social.json","friendlyUrl":"/en/fields-of-expertise/SSE.html"}</script><div class="fhg-section-separator"></div> </div> <div class="fhg-paneled tab-transform can-open"> <div class="section-title"> <h2 id="Publications" class="fragment">Publications</h2> </div> <div class="controls"> <a href="#expand-all" class="control-open">Expand all</a> <a href="#close-all" class="control-close">Close all</a> </div> <div class="fhg-accordion tab-transform level-1"> <div data-emptytext="tabview_tabcontent_hint" class="accordion-item tab-item section"><h2 class="item-heading fragment" id="tabview_tab_68542439-heading"> <a class="item-title item-trigger collapsed" data-toggle="collapse" href="#193648387268542441" aria-expanded="false" aria-controls="tabview_tab_68542439-content" title="2023"> 2023</a></h2> <div class="item-body collapse" id="193648387268542441" aria-labelledby="tabview_tab_68542439-heading"> <div class="tabPar parsys"><div class="fhg-content-article fhg-grid section"><article> <div class="row"> <div class="fhg-grid-item fhg-grid-3-2-1"> <div class="fhg-content fhg-richtext"> <ul> <li>M. Fischlin, J. von der Heyden, M. Margraf, F. Morgner, A. Wallner, H. Bock. "Post-Quantum Security for the Extended Access Control Protocol“. In: 8th Security Standardisation Research Conference, SSR 2023, Lyon, France. 2023.</li> <li>Anna-Magdalena Krauß, Sandra Kostic, Rachelle A. Sellung: "A more User-Friendly Digital Wallet? User Scenarios of a Future Wallet". Open Identity Summit 2023. DOI: 10.18420/OID2023_06. Bonn: Gesellschaft für Informatik e.V. pp. 73-84. Regular Research Papers. Heilbronn, Germany. 15.-16. June 2023.</li> <li>Dariush Wahdany, Carlo Schmitt, Jochen L. Cremer: "More than accuracy: end-to-end wind power forecasting that optimises the energy system". In: Electric Power Systems Research. 2023.</li> <li>Anna-Magdalena Krauß, Sandra Kostic, Rachelle A. Sellung: »Ist das die Wallet der Zukunft?« HMD 60, 344–365 (2023).</li> <li>Maximilian Richter, Magdalena Bertram, Jasper Seidensticker, Marian Margraf: »Cryptographic Requirements of Verifiable Credentials for Digital Identification Documents«. SDIM/COMPSAC 2023.</li> <li>Sandra Kostic, Maija Poikela: »Der Wandel von Vertrauen in eine digitale Identität? – Einblicke in eine Nutzerstudie«. HMD 60, 322–343 (2023).</li> <li>Sandra Kostic, Maija Poikela: »The State or Private Enterprise? — The Shift in Users’ Preference for the Provider of an Identity Wallet”. SOUPS 2023 - Symposium on Usable Privacy and Security. 7. Aug. 2023.</li> <li>Tudor Soroceanu, Nicolas Buchmann, Marian Margraf: »On Multiple Encryption for Public-Key Cryptography«. Cryptography. 2023; 7(4):49.</li> </ul></div> </div> </div> </article> </div> </div> </div> </div> <div data-emptytext="tabview_tabcontent_hint" class="accordion-item tab-item section"><h2 class="item-heading fragment" id="tabview_tab_12917137-heading"> <a class="item-title item-trigger collapsed" data-toggle="collapse" href="#193648387212917139" aria-expanded="false" aria-controls="tabview_tab_12917137-content" title="2022"> 2022</a></h2> <div class="item-body collapse" id="193648387212917139" aria-labelledby="tabview_tab_12917137-heading"> <div class="tabPar parsys"><div class="fhg-content-article fhg-grid section"><article> <div class="row"> <div class="fhg-grid-item fhg-grid-3-2-1"> <div class="fhg-content fhg-richtext"> <p>&nbsp;</p> <ul> <li>Jan Dennis Gumz, Simon Sebastian Hunt, Michael Stemmer, Sebastian Bock, Nikolay Vassiley Tcholtchev, Denny Mattern, Adrian<span style="color: black;">&nbsp;</span>Paschke, Marian Margraf. “Quanten-IKT. Quantencomputing und Quantenkommunikation”. (2022)&nbsp;<a>https://publica.fraunhofer.de/bitstreams/f2d2d7d7-20c5-4267-bf99-1aa5dfa6113c/download</a>.</li> <li>J. Priesnitz, R. Huesmann, C. Rathgeb, N. Buchmann, C. Busch. “Mobile Contactless Fingerprint Recognition<span style="color: black;">: Implementation, Performance and Usability Aspects</span>“. In: Sensors. Online journal&nbsp;(2022). DOI <span style="font-size: 12.0pt; line-height: 107.0%; font-family: Helvetica , sans-serif; color: rgb(28,63,82);"><a target="_blank"><span>10.3390/s22030792</span></a></span>.</li> <li>Maximilian Richter, Magdalena Bertram, Jasper Seidensticker und Alexander Tschache.&nbsp;"A Mathematical Perspective on Post-Quantum Cryptography." Mathematics 10, no. 15: 2579. 2022.</li> <li>Christopher Mühl and Franziska Boenisch. "Personalized pate: Differential privacy for machine learning with individual privacy guarantees." PoPETs’23. 2022.</li> <li>Sandra Kostic, Maija Poikela: "Do Users Want To Use Digital Identities?&nbsp;A Study Of A Concept Of An Identity Wallet." SOUPS 22. 2022.</li> <li>Adam Dziedzic, A., Haonan Duan, Muhammad Ahmad Kaleem, Nikita Dhawan, Jonas Guan, Yannis Cattan, Franziska Boenisch and Nicolas Papernot. "Dataset inference for self-supervised models." arXiv e-prints, pages arXiv–2209, NeurIPS’22. 2022.</li> </ul></div> </div> </div> </article> </div> </div> </div> </div> <div data-emptytext="tabview_tabcontent_hint" class="accordion-item tab-item section"><h2 class="item-heading fragment" id="tabview_tab_1291713771-heading"> <a class="item-title item-trigger collapsed" data-toggle="collapse" href="#19364838721291713773" aria-expanded="false" aria-controls="tabview_tab_1291713771-content" title="2021"> 2021</a></h2> <div class="item-body collapse" id="19364838721291713773" aria-labelledby="tabview_tab_1291713771-heading"> <div class="tabPar parsys"><div class="fhg-content-article fhg-grid section"><article> <div class="row"> <div class="fhg-grid-item fhg-grid-3-2-1"> <div class="fhg-content fhg-richtext"> <ul> <li>Franziska Boenisch. “Privatsphäre und Maschinelles Lernen”. In: 45th ser. (2021), pp. 448–452. DOI: <a href="https://doi.org/10.1007/s11623-021-1469-3">https://doi.org/10.1007/s11623-021-1469-3</a>.</li> </ul></div> </div> </div> </article> </div> </div> </div> </div> <div data-emptytext="tabview_tabcontent_hint" class="accordion-item tab-item section"><h2 class="item-heading fragment" id="tabview_tab-heading"> <a class="item-title item-trigger collapsed" data-toggle="collapse" href="#19364838721" aria-expanded="false" aria-controls="tabview_tab-content" title="2020 to 2019"> 2020 to 2019</a></h2> <div class="item-body collapse" id="19364838721" aria-labelledby="tabview_tab-heading"> <div class="tabPar parsys"><div class="fhg-content-article fhg-grid section"><article> <div class="row"> <div class="fhg-grid-item fhg-grid-3-2-1"> <div class="fhg-content fhg-richtext"> <ul> <li>Sebastian Fischer, Katrin Neubauer, and Rudolf Hackenberg. “A Study About the Different Cate-gories of IoT in Scientific Publications”. In:CLOUD COMPUTING 2020, The Eleventh InternationalConference on Cloud Computing, GRIDs, and Virtualization. 2020, pp. 24–30.</li> <li>Lukas Hinterberger, Sebastian Fischer, Bernhard Weber, Katrin Neubauer, and Rudolf Hackenberg.“IoT Device IdentificAtion and RecoGnition (IoTAG)”. In:CLOUD COMPUTING 2020, The EleventhInternational Conference on Cloud Computing, GRIDs, and Virtualization. 2020, pp. 17–23.</li> <li>Katrin Neubauer, Sebastian Fischer, and Rudolf Hackenberg. “Security Risk Analysis of the CloudInfrastructure of Smart Grid and IoT - 4-Level-Trust-Model as a Security Solution”. In:InternationalJournal on Advances in Internet Technology13.1 (2020), pp. 11–20.</li> <li><span class="bulletpointlist">Sebastian Fischer, Katrin Neubauer, Lukas Hinterberger, Bernhard Weber, and Rudolf Hackenberg. “IoTAG: An Open Standard for IoT Device IdentificAtion and RecoGnition”. In: SECURWARE 2019, The Thirteenth International Conference on Emerging Security Information, Systems and Technologies. 2019, pp. 107–113.</span></li> <li><span class="bulletpointlist">Katrin Neubauer, Sebastian Fischer, and Rudolf Hackenberg. “Risk Analysis of the Cloud Infrastructure of Smart Grid and Internet of Things”. In: CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization. 2019, pp. 82–87.</span></li> <li><span class="bulletpointlist">Katrin Neubauer, Sebastian Fischer, and Rudolf Hackenberg. “Work in Progress: Security Analysis for Safetycritical Systems: Smart Grid and IoT”. In: 32nd GI/ITG International Conference on Architecture of Computing Systems May 20 – 21, 2019, Technical University of Denmark, Copenhagen, Denmark Workshop Proceedings. 2019, pp. 101–106.</span></li> <li><span class="bulletpointlist">Tim Ohlendorf,Wolfgang Studier, and Marian Margraf. “Digitale Identitäten auf dem Smartphone”. In: Datenschutz und Datensicherheit-DuD 43.1 (2019), pp. 17–22.</span></li> <li><span class="bulletpointlist">Stefan Pfeiffer and Martin Seiffert. “Security-Management-as-a-Service”. In: Datenschutz und Datensicherheit-DuD 43.1 (2019), pp. 23–27.</span></li> </ul> <p>&nbsp;</p></div> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div class="fhg-sidebar"> <aside> <div class="bcardssnav parsysbcardssnav parsys"><div class="business-card blue-ribbon"> <h3>Contact</h3> <div class="card-container" > <div class="businesscardinclude"><div class="card"></div></div> <div class="businesscardinclude"><div class="card"><div class="img img-horizontal"> <img src="/content/businesscards/AISEC/en/Marian_Margraf_EN/jcr:content/businesscard/image.img.1col.jpg/1669201964242.jpg" alt="Marian Margraf"/> </div> <div class="content"> <h3>Contact Press / Media</h3> <div class="info"> <h4 class="name"> Prof. Dr. Marian Margraf</h4> <p class="position">Secure Systems Engineering</p> <p class="address"> Fraunhofer AISEC (Location Berlin)<br/>Breite Straße 12<br/>14199&nbsp;Berlin</p> <p class="phone"> Phone&nbsp;+49 89 3229986-152</p> <div class="cta-block"> <ul class="fhg-list arrowed-list"> <li class="sendMail"><a href="mailto:Marian.Margraf@aisec.fraunhofer.de" contact="Marian Margraf">Send email</a></li> <li class="printMail" style="display:none">Marian.Margraf@aisec.fraunhofer.de</li> <li><a href="/en/fields-of-expertise/SSE.html">Secure Systems Engineering</a></li> </ul> </div> </div> </div> </div></div> </div> </div> </div> </aside> </div> <div class="sep sectionseparator"><script data-scf-json="true" type='application/json' id='/en/fields-of-expertise/SSE/jcr:content/sep'>{"id":"/en/fields-of-expertise/SSE/jcr:content/sep","resourceType":"fraunhofer/components/sectionseparator","url":"/en/fields-of-expertise/SSE/_jcr_content/sep.social.json","friendlyUrl":"/en/fields-of-expertise/SSE.html"}</script><div class="fhg-section-separator"></div> </div> <footer> <div class="fhg-footer"> <h2 class="invisible fragment" id="Navigation-and-Social-Media">Navigation and Social Media</h2> <div class="fhg-grid"> <div class="fhg-social"> <div class="fhg-grid"> <div class="fhg-grid-item fhg-grid-3-2-2-1"> <div class="content"> <h3 class="fhg-block-heading">Share</h3> <div class="social-bar shariff" data-mail-subject="Recommendation: Secure Systems Engineering" data-mail-body="https://www.aisec.fraunhofer.de/en/fields-of-expertise/SSE.html" data-mail-url="mailto:" data-lang="en" data-services="[&quot;facebook&quot;,&quot;twitter&quot;,&quot;linkedin&quot;,&quot;xing&quot;,&quot;youtube&quot;,&quot;instagram&quot;]" data-title="Secure Systems Engineering - " data-url="https://www.aisec.fraunhofer.de/en/fields-of-expertise/SSE.html"> </div> </div> </div> <div class="fhg-grid-item fhg-grid-1-1-1-1 secondary-buttons"> <div class="fhg-grid-item-contents"> <button class="print">Print</button> <!--<button>Download</button>--> </div> </div> </div> </div><div class="row-quick-links links-list"> <div class="fhg-grid-item fhg-grid-1-1-1-1 section-h-links"> </div> <div class="fhg-grid-item fhg-grid-3-2-1-1 section-links"> <ul class="fhg-list arrowed-list"> </ul> </div> </div> <div class="row-social"> </div> <div class="row-footer-nav"> <div class="fhg-grid-item fhg-grid-3-2-1-1 section-menu text-secondary"> <nav> <ul> <li> <a href="/en/Visitorregulations.html">Visitor regulations</a></li> <li> <a href="/en/Tenders.html">Tenders</a></li> <li> <a href="/en/imprint.html">Imprint</a></li> <li> <a href="/en/data_protection.html">Data Protection</a></li> </ul> </nav> </div> <div class="fhg-grid-item fhg-grid-1-1-1-1 section-copy text-secondary"> <span>© 2025 </span> </div> </div> </div> <div class="print-footer"> <p><strong>Source: Fraunhofer-Gesellschaft<br>Fraunhofer Institute for Applied and Integrated Security - Secure Systems Engineering</strong></p> <p>Online in Internet; URL: https://www.aisec.fraunhofer.de/en/fields-of-expertise/SSE.html</p> <p>Date: 17.2.2025 11:48</p> </div> </div> </footer> </div> <script src="/etc.clientlibs/fraunhofer/ui/website/js/thirdparty/requirejs.min.js"></script> <script src="/etc.clientlibs/fraunhofer/ui/website/js/fraunhofer.min.js"></script> <!--[if lte IE 9]> <script type="text/javascript"> require(['input-placeholder']); </script> <![endif]--> <!-- Tracking Code BEGIN --><script type="text/javascript">(function(d,s){var l=d.createElement(s),e=d.getElementsByTagName(s)[0]; l.async=true;l.type='text/javascript'; l.src='https://c.leadlab.click/565a3d25efbb39b9.js'; e.parentNode.insertBefore(l,e);})(document,'script');</script><!-- Tracking Code END --></body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10