loading
Papers

Research.Publish.Connect.

Paper

Authors: Florian Reimair 1 ; Johannes Feichtner 2 ; Dominik Ziegler 2 ; Sandra Kreuzhuber 3 and Thomas Zefferer 4

Affiliations: 1 Secure Information Technology Center - Austria (A-SIT), Austria ; 2 Graz University of Technology, Austria ; 3 PrimeSign GmbH, Austria ; 4 A-Sit Plus GmbH, Austria

ISBN: 978-989-758-259-2

Keyword(s): Applied Cryptography, Cryptographic Service Providers, Cloud.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Data Protection ; Databases and Data Security ; Information and Systems Security ; Information Assurance ; Risk Assessment ; Security in Information Systems ; Security Information Systems Architecture and Design and Security Patterns ; Security Requirements

Abstract: Current application and device landscapes became a harsh environment for data security. Multi-device users enjoy the convenience and efficiency of modern distributed applications in a highly heterogeneous device landscape. However, today's data protection mechanisms fell behind in taking care of some current use cases and application scenarios. We perform a case study and an in-depth security analysis and risk assessment on a simplified set of three different cryptographic service provider types; software, hardware, and remote. Our case study shows that different provider types can change application characteristics considerably. Our security analysis and risk assessment shows how different provider types can influence the security properties of a set of use cases. We found that no one provider can excel for every cryptographic task. Based on these findings we formulate a list of features which we believe are crucial to get the data protection mechanisms up to speed again so that ever yone can again benefit from data security even in a world of highly distributed applications and data. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.233.224.8

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Reimair, F.; Feichtner, J.; Ziegler, D.; Kreuzhuber, S. and Zefferer, T. (2017). Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth.In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2017) ISBN 978-989-758-259-2, pages 367-374. DOI: 10.5220/0006466603670374

@conference{secrypt17,
author={Florian Reimair. and Johannes Feichtner. and Dominik Ziegler. and Sandra Kreuzhuber. and Thomas Zefferer.},
title={Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2017)},
year={2017},
pages={367-374},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006466603670374},
isbn={978-989-758-259-2},
}

TY - CONF

JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2017)
TI - Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth
SN - 978-989-758-259-2
AU - Reimair, F.
AU - Feichtner, J.
AU - Ziegler, D.
AU - Kreuzhuber, S.
AU - Zefferer, T.
PY - 2017
SP - 367
EP - 374
DO - 10.5220/0006466603670374

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.