Nils Gruschka

Orcid: 0000-0001-7360-8314

According to our database1, Nils Gruschka authored at least 54 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
A framework for analyzing authentication risks in account networks.
Comput. Secur., December, 2023

Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.
Proceedings of the Ubiquitous Security, 2023

Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
A Policy Language to Capture Compliance of Data Protection Requirements.
Proceedings of the Integrated Formal Methods - 17th International Conference, 2022

Where There is No CISO.
Proceedings of the Freedom and Social Inclusion in a Connected World, 2022

Protecting FIDO Extensions Against Man-in-the-Middle Attacks.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2022

Multi-Account Dashboard for Authentication Dependency Analysis.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Extraction and Accumulation of Identity Attributes from the Internet of Things.
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, Juni 1-2, 2021., 2021

Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

Representing Data Protection Aspects in Process Models by Coloring.
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021

2020
Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics.
Proceedings of the Open Identity Summit 2020, 26. - 27.05.2020, Copenhagen, Denmark., 2020

2019
Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services.
Proceedings of the Secure IT Systems, 2019

Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality.
Proceedings of the Secure IT Systems, 2019

Towards Aligning GDPR Compliance with Software Development: A Research Agenda.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Signalling over-privileged mobile applications using passive security indicators.
J. Inf. Secur. Appl., 2017

Mobile Personal Identity Provider Based on OpenID Connect.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

2016
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Information Quality Challenges in Industry 4.0.
Proceedings of the 21st International Conference on Information Quality, 2016

Datenschutz im Fahrzeug der Zukunft: Vernetzt, Autonom, Elektrisch.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016

2015
Privacy-Preserving Detection of Plagiarism in Scientific Documents.
Proceedings of the 2015 IEEE World Congress on Services, 2015

2014
Analysis of the current state in website certificate validation.
Secur. Commun. Networks, 2014

Aligning User Consent Management and Service Process Modeling.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

2013
Security and Privacy-Enhancing Multicloud Architectures.
IEEE Trans. Dependable Secur. Comput., 2013

Wasch mich, aber mach mich nicht nass - Anonymisierungsverfahren als Schlüssel zur datenschutzkonformen E-Mail-Filterung.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

2011
Server-Side Streaming Processing of WS-Security.
IEEE Trans. Serv. Comput., 2011

Sicherheitsprobleme im Cloud Computing.
Prax. Inf.verarb. Kommun., 2011

Browser as a Service (BaaS): Security and Performance Enhancements for the Rich Web.
Proceedings of the 17th GI/ITG Conference on Communication in Distributed Systems, 2011

All your clouds are belong to us: security analysis of cloud management interfaces.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

Security Prospects through Cloud Computing by Adopting Multiple Clouds.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Packaged HTTP: Reconsidering Web Efficiency.
Int. J. Adv. Comp. Techn., 2010

Identity and access management in multi-institutional medical research.
Elektrotech. Informationstechnik, 2010

Password Visualization beyond Password Masking.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Server-Side Streaming Processing of Secured MTOM Attachments.
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010

Security for XML Data Binding.
Proceedings of the Communications and Multimedia Security, 2010

Attack Surfaces: A Taxonomy for Attacks on Cloud Services.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages.
Proceedings of the ARES 2010, 2010

2009
A survey of attacks on web services.
Comput. Sci. Res. Dev., 2009

XML Signature Wrapping Angriffe - What you process is not always what you verify.
Datenschutz und Datensicherheit, 2009

Vulnerable Cloud: SOAP Message Security Validation Revisited.
Proceedings of the IEEE International Conference on Web Services, 2009

Session-Based SOAP Transmission and Processing.
Proceedings of the Seventh IEEE European Conference on Web Services (ECOWS 2009), 2009

Privacy Against the Business Partner: Issues for Realizing End-to-End Confidentiality in Web Service Compositions.
Proceedings of the Database and Expert Systems Applications, 2009

On Technical Security Issues in Cloud Computing.
Proceedings of the IEEE International Conference on Cloud Computing, 2009

2008
Schutz von Web Services durch erweiterte und effiziente Nachrichtenvalidierung.
PhD thesis, 2008

Flooding Attack Issues of Web Services and Service-Oriented Architectures.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008

The Impact of Flooding Attacks on Network-based Services.
Proceedings of the The Third International Conference on Availability, 2008

2007
Event-based application of ws-security policy on soap messages.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

A Stateful Web Service Firewall for BPEL.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

SOA and Web Services: New Technologies, New Standards - New Attacks.
Proceedings of the Fifth IEEE European Conference on Web Services (ECOWS 2007), 2007

2006
Event-Based SOAP Message Validation for WS-SecurityPolicy-Enriched Web Services.
Proceedings of the 2006 International Conference on Semantic Web & Web Services, 2006

Protecting Web Services from DoS Attacks by SOAP Message Validation.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

2004
Checking and Signing XML Documents on Java Smart Cards - Challenges and Opportunities.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004


  Loading...