We present different topics of our research every Thursday at 12:00 noon in room 103, Obermarkt 17. For news about the EAD-Lunch talks and seminars please feel free to subscribe to EAD-Public@googlegroups.com. (Register here: https://groups.google.com/forum/?hl=de&fromgroups#!forum/ead-public)
contact: Paul.Laetsch(at)hszg.de
The blockchain paradigm when coupled with cryptographically-secured transactions has demonstrated its utility through a number of projects, not least Bitcoin. Each such project can be seen as a simple application on a decentralised, but singleton, compute resource. We can call this paradigm a transactional singleton machine with shared-state. Ethereum implements this paradigm in a generalised manner. Furthermore it provides a plurality of such resources, each with a distinct state and operating code but able to interact through a message-passing framework with others. (Abstract from: gavwood.com/Paper.pdf - contains further reading on this topic.)
contact: s3flhaje(at)stud.hszg.de
The talk is about Florians internship and his involvement in the SERVING research project. In particular, he is going to present a framework he developed on tthe basis of PyCIM to work with the standardized and widely used Common Information Model (CIM). The talk will also go into some detail about how CIM is used in the project, specifically in terms of modelling and calculating the state of the energy grid.
contact: m.ullrich(at)hszg.de
Company data are today stored in various locations and in various forms. The use of all these data in a single application is no longer a problem thanks to existing cloud integration applications. Many of these applications can monitor known data sources and retrieve the data according to predetermined patterns. Adding data sources or correcting connection problems with these software, makes always an extensive intervention by IT specialists necessary. The goal of the HC project is to simplify the addition of new data sources by automatically recognizing data structure and operating parameters. During the operation, changes to these are also to be recognized and the corresponding APIs adapted. If adaptation is not possible, adjustments are to be proposed via a coordinated API change management process. This should ideally make the application available with all its data sources without any downtime. The experience of a system administrator / application supervisor is to be handled with the help of the so-called cognitive computing.
contact: Robert.Kloss(at)hszg.de
Company data are today stored in various locations and in various forms. The use of all these data in a single application is no longer a problem thanks to existing cloud integration applications. Many of these applications can monitor known data sources and retrieve the data according to predetermined patterns. Adding data sources or correcting connection problems with these software, makes always an extensive intervention by IT specialists necessary. The goal of the HC project is to simplify the addition of new data sources by automatically recognizing data structure and operating parameters. During the operation, changes to these are also to be recognized and the corresponding APIs adapted. If adaptation is not possible, adjustments are to be proposed via a coordinated API change management process. This should ideally make the application available with all its data sources without any downtime. The experience of a system administrator / application supervisor is to be handled with the help of the so-called cognitive computing.
contact: d.tasche(at)hszg.de
This event is a follow-up of the previous talk. With the experts of the EAD Group and the new Fraunhofer Lernlabor Cybersicherheit several aspects of the SIOC architecture were discussed.
contact: d.tasche(at)hszg.de
E-Commerce is playing an increasingly important role for both, operators of shopping platforms and customers. The forecasted revenue for the German E-Commerce market amounts to EUR 46.7 million, which equals to more than 10% of the total retail sector. 30% of the online purchases in Germany are done via a mobile device. Despite an increasing public awareness of the issue of data protection, nowadays only in the rarest cases customers are enabled to decide how and whether their per-sonal information and buying behavior is stored and processed. This threat to the right to informational self-determination is further exacerbated by the fact that the increasing use of smartphones, tablets and other portable devices leads to an ever more detailed profiling and thus in a deeper engagement in the privacy of each individual. Based on this situation, the SIOC project´s vision is the improvement of the self-data protection in E-Commerce. SIOC enables customers to perform the online-shopping process transparent, as anonymous as possible and following the principle of data thrift/minimization (collection limitation principle). At the same time online platform providers still have the possibility to submit personalized offers and recommendations based on anonymized, voluntary aggregated customer profiles. Moreover, in case of non-paying customers, anonymization can be revoked to clearly identify customers. Thus, SIOC objective is the design of an anonymous approach to online shopping in accordance to Stakeholders requirements and business models to achieve the best compromise between these conflicting interests while implementing data protection by design and data protection by default as essential principles of EU data protection rules.
contact: a.bartusiak(at)hszg.de Marcel.Kuehne(at)hszg.de
With the continuous digitalization of our society the threat potential for cyber attacks increases significantly along with the risk of becoming a victim to cyber attacks. Besides common attacks on IT infrastructures, an increasing amount of cyber attacks on critical infrastructures and industrial facilities can be observed. Related to this problematic, a new project by the Fraunhofer IOSB-AST, IDMT, Fraunhofer Academy and the University of Applied Sciences Zittau/Görlitz has been started in the beginning of 2017. In this initiative a further education program about 'Cyber-security in critical infrastructures', is being developed. The talk introduces among other things project partners, core topics and project goals.
contact: daniel.muessig(at)hszg.de s3rostri(at)stud.hszg.de
Conventional scaling strategies based on general metrics such as technical RAM or CPU measures are not aligned with the business and hence often lack precision flexibility. First, the paper argues that custom metrics for scaling, load balancing and load prediction result in better business-alignment of the scaling behavior as well as cost reduction. Furthermore, due to scaling requirements of structural –non-business– services, existing authorization patterns such as API-gateways result in inefficient scaling behavior. By introducing a new pattern for authorization processes, the scalability can be optimized. In sum, the changes result in improvements of not only scalability but also availability, robustness and improved security characteristics of the infrastructure. Beyond this, resource optimization and hence cost reduction can be achieved.