direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments

Security & Privacy

In order to be practically applicable, modern information systems must meet a broad variety of requirements in matters of security and privacy. These requirements typically depend on multiple factors like the application domain (e.g., specific regulatory requirements for the financial sector or for smart grids), the kind of data being collected and processed (e.g. personal data, business secrets, etc.) or the location of storage and processing. Furthermore, security and privacy are never the sole goal of systems design but rather conflict with other functional and nonfunctional objectives like functionality, performance, scalability, usability, interoperability, etc.

In order to appropriately pay regard to these factors and to bring them into reasonable balance, our research approach to security and privacy explicitly comprises interdisciplinary aspects like techno-legal questions of security and privacy (“compliance”), security economics, or collaborative privacy governance. Based on our strong interdisciplinary expertise, integrating these perspectives with methods like cloud benchmarking and technologies like preference languages/ontologies, usage control mechanisms or blockchains allows us to develop novel approaches that are suitable for coping with current and upcoming security and privacy challenges in fields like Cloud/Fog Computing, IoT, Smart Grid, Industry 4.0 and many more. Our overall goal are concrete information systems as well as concepts and mechanisms for building such systems that provide security and privacy “by design”.

A particular focus of our research lies on the comprehensive while still practically applicable transformation of legal and regulatory requirements into concrete technical designs. While, for instance, the concept of “privacy by design” has primarily been picked up in the information systems domain as being about security, data minimization and anonymity, we also consider further core concepts of privacy/data protection law like “informed consent” or “purpose limitation” and transform them into technical representations like technology-mediated privacy preferences or purpose-aware consent management systems.

Related Projects


J.Eberhardt and S.Tai (2017). On or Off the Blockchain? Insights on Off-Chaining Computation and Data. ESOCC 2017: 6th European Conference on Service-Oriented and Cloud Computing

Link zur Publikation

M.-R. Ulbricht and K. Weber (2017). Adieu Einwilligung?. Informationelle Selbstbestimmung im digitalen Wandel. Springer Fachmedien Wiesbaden, 265–286.

Link zur Publikation

K. Weber and N. Kleine and F. Pallas and M.-R. Ulbricht (2017). Technik zur Unterstützung von Citizen Science und Open Science. TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis, 25-30.

Link zur Publikation

F. Pallas and D. Bermbach and S. Müller and S. Tai (2017). Evidence-Based Security Configurations for Cloud Datastores. Proceedings of the the 32nd ACM Symposium on Applied Computing. ACM.

Link zur Publikation

F. Pallas and J. Günther and D. Bermbach (2017). Pick Your Choice in HBase: Security or Performance. Proceedings of the 2016 IEEE International Conference on Big Data. IEEE, 548-554.

Link zur Publikation

Zusatzinformationen / Extras


Schnellnavigation zur Seite über Nummerneingabe