Issue

Dagstuhl Reports, Volume 1, Issue 12



Thumbnail PDF

Publication Details


Access Numbers

Documents

No documents found matching your filter selection.
Document
Complete Issue
Dagstuhl Reports, Volume 1, Issue 12, December 2011, Complete Issue

Abstract
Dagstuhl Reports, Volume 1, Issue 12, December 2011, Complete Issue

Cite as

Dagstuhl Reports, Volume 1, Issue 12, December 2011, Complete Issue. In Dagstuhl Reports, Volume 1, Issue 12, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2012)


Copy BibTex To Clipboard

@Article{DagRep.1.12,
  title =	{{Dagstuhl Reports, Volume 1, Issue 12, December 2011, Complete Issue}},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{1},
  number =	{12},
  editor =	{},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.12},
  URN =		{urn:nbn:de:0030-drops-34536},
  doi =		{10.4230/DagRep.1.12},
  annote =	{Keywords: Dagstuhl Reports, Volume 1, Issue 12, December 2011, Complete Issue}
}
Document
Front Matter
Dagstuhl Reports, Table of Contents, Volume 1, Issue 12, 2011

Abstract
Table of Contents, Frontmatter

Cite as

Dagstuhl Reports, Table of Contents, Volume 1, Issue 12, 2011. In Dagstuhl Reports, Volume 1, Issue 12, pp. i-ii, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2012)


Copy BibTex To Clipboard

@Article{DagRep.1.12.i,
  title =	{{Dagstuhl Reports, Table of Contents, Volume 1, Issue 12, 2011}},
  pages =	{i--ii},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{1},
  number =	{12},
  editor =	{},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.12.i},
  URN =		{urn:nbn:de:0030-drops-34527},
  doi =		{10.4230/DagRep.1.12.i},
  annote =	{Keywords: Table of Contents, Frontmatter}
}
Document
Secure Computing in the Cloud (Dagstuhl Seminar 11491)

Authors: Benny Pinkas, Ahmad-Reza Sadeghi, and Nigel P. Smart


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 11491 ``Secure Computing in the Cloud''. Cloud Computing offers a lot of benefits for end customers: high-end machines, incredible amounts of storage, high availability and everything available at the touch of a button. In this seminar we concentrate on compute clouds: Clouds, that do not only offer storage but also computations that can be outsourced in form of virtual machines (VMs). Outsourcing computations as well as data to a third party, in this case the cloud provider, are accompanied by the qualms of confiding data to the cloud provider based on blindly trusted service level agreements. The participants of this seminar discuss the involved risks, create threat models as basic assumptions that describe the (un-)trusted entities and present solutions that augment trust in the cloud provider, the integrity and verifiability of computations and data processed in the cloud.

Cite as

Benny Pinkas, Ahmad-Reza Sadeghi, and Nigel P. Smart. Secure Computing in the Cloud (Dagstuhl Seminar 11491). In Dagstuhl Reports, Volume 1, Issue 12, pp. 1-10, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2012)


Copy BibTex To Clipboard

@Article{pinkas_et_al:DagRep.1.12.1,
  author =	{Pinkas, Benny and Sadeghi, Ahmad-Reza and Smart, Nigel P.},
  title =	{{Secure Computing in the Cloud (Dagstuhl Seminar 11491)}},
  pages =	{1--10},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{1},
  number =	{12},
  editor =	{Pinkas, Benny and Sadeghi, Ahmad-Reza and Smart, Nigel P.},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.12.1},
  URN =		{urn:nbn:de:0030-drops-33838},
  doi =		{10.4230/DagRep.1.12.1},
  annote =	{Keywords: cloud computing, outsourced computation, verifiability, integrity, confidentiality, trust}
}
Document
Secure Architectures in the Cloud (Dagstuhl Seminar 11492)

Authors: Sabrina De Capitani di Vimercati, Wolter Pieters, and Christian W. Probst


Abstract
This report documents the outcomes of Dagstuhl Seminar 11492 ``Secure Architectures in the Cloud''. In cloud computing, data storage and processing are offered as services, and data are managed by external providers that reside outside the control of the data owner. The use of such services reduces the burden of the owners in managing their data, and may provide significant cost savings. However, cloud computing introduces new security and privacy concerns. In fact, there is little consensus on how to guarantee the confidentiality, integrity, and availability of data in cloud computing scenarios. Also, it is unclear to what extent parties can be held accountable in case something goes wrong. In this seminar, we searched for architectures, modelling approaches, and mechanisms that can help in providing guarantees for cloud security. We proposed the concept of verification-as-a-service that can guide architectures for verification of cloud architectures and configurations, as well as results of computations. We also proposed architectures for organising customisability of security and privacy for cloud customers.

Cite as

Sabrina De Capitani di Vimercati, Wolter Pieters, and Christian W. Probst. Secure Architectures in the Cloud (Dagstuhl Seminar 11492). In Dagstuhl Reports, Volume 1, Issue 12, pp. 11-26, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2012)


Copy BibTex To Clipboard

@Article{decapitanidivimercati_et_al:DagRep.1.12.11,
  author =	{De Capitani di Vimercati, Sabrina and Pieters, Wolter and Probst, Christian W.},
  title =	{{Secure Architectures in the Cloud (Dagstuhl Seminar 11492)}},
  pages =	{11--26},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{1},
  number =	{12},
  editor =	{De Capitani di Vimercati, Sabrina and Pieters, Wolter and Probst, Christian W.},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.12.11},
  URN =		{urn:nbn:de:0030-drops-33843},
  doi =		{10.4230/DagRep.1.12.11},
  annote =	{Keywords: attestation, auditing, cloud computing, security architectures, security modelling, verification}
}
Document
Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data (Dagstuhl Seminar 11501)

Authors: Bernhard Burgeth and Carl-Fredrik Westin


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 11501 "Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data", taking place December 11-16, 2011. The Seminar gathered 26 senior and younger researchers from various countries in the unique atmosphere offered by Schloss Dagstuhl. The focus of the seminar was to discuss modern and emerging methods for analysis and visualization of tensor and higher order descriptors from medical imaging and engineering applications. Abstracts of the talks are collected in this report.

Cite as

Bernhard Burgeth and Carl-Fredrik Westin. Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data (Dagstuhl Seminar 11501). In Dagstuhl Reports, Volume 1, Issue 12, pp. 27-46, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2012)


Copy BibTex To Clipboard

@Article{burgeth_et_al:DagRep.1.12.27,
  author =	{Burgeth, Bernhard and Westin, Carl-Fredrik},
  title =	{{Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data (Dagstuhl Seminar 11501)}},
  pages =	{27--46},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{1},
  number =	{12},
  editor =	{Burgeth, Bernhard and Westin, Carl-Fredrik},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.12.27},
  URN =		{urn:nbn:de:0030-drops-34447},
  doi =		{10.4230/DagRep.1.12.27},
  annote =	{Keywords: visualization, image processing, tensor fields, diffusion tensor imaging (DTI), diffusion MRI (dMRI), fiber tractography, higher-order tensors, partia mechanics, solid mechanics}
}
Document
Design of Reversible and Quantum Circuits (Dagstuhl Seminar 11502)

Authors: Kenichi Morita and Robert Wille


Abstract
It is a widely supported prediction that conventional computer hardware technologies are going to reach their limits in the near future. Consequently, researchers are working on alternatives. Reversible circuits and quantum circuits are one promising direction which allows to overcome fundamental barriers. However, no real design flow for this new kind of circuits exists so far. Physical implementations are in its infancy. Within this seminar, recent research questions of this emerging technology have been discussed.

Cite as

Kenichi Morita and Robert Wille. Design of Reversible and Quantum Circuits (Dagstuhl Seminar 11502). In Dagstuhl Reports, Volume 1, Issue 12, pp. 47-61, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2012)


Copy BibTex To Clipboard

@Article{morita_et_al:DagRep.1.12.47,
  author =	{Morita, Kenichi and Wille, Robert},
  title =	{{Design of Reversible and Quantum Circuits (Dagstuhl Seminar 11502)}},
  pages =	{47--61},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{1},
  number =	{12},
  editor =	{Morita, Kenichi and Wille, Robert},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.12.47},
  URN =		{urn:nbn:de:0030-drops-34503},
  doi =		{10.4230/DagRep.1.12.47},
  annote =	{Keywords: reversible computation, quantum computation, computer aided design, hardware and software design, physical implementation, applications}
}
Document
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511)

Authors: Stefan Katzenbeisser, Klaus Kursawe, Bart Preneel, and Ahmad-Reza Sadeghi


Abstract
The ``smart energy grid'' promises to improve the reliability and efficiency of the future energy grid by exchanging detailed usage information between the end consumers and the utilities. This application raises different questions with regard to privacy and security. For instance, detailed meter readings enable to infer detailed information on the private life of the consumers; furthermore, manipulations of meter readings open the possibility of fraud. The goal of the seminar was thus to raise awareness of the privacy and security problems associated with smart meters and bring together academic researchers as well as utility experts in order to start an open dialogue on smart grid privacy and security problems and potential solutions.

Cite as

Stefan Katzenbeisser, Klaus Kursawe, Bart Preneel, and Ahmad-Reza Sadeghi. Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511). In Dagstuhl Reports, Volume 1, Issue 12, pp. 62-68, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2012)


Copy BibTex To Clipboard

@Article{katzenbeisser_et_al:DagRep.1.12.62,
  author =	{Katzenbeisser, Stefan and Kursawe, Klaus and Preneel, Bart and Sadeghi, Ahmad-Reza},
  title =	{{Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511)}},
  pages =	{62--68},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{1},
  number =	{12},
  editor =	{Katzenbeisser, Stefan and Kursawe, Klaus and Preneel, Bart and Sadeghi, Ahmad-Reza},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.12.62},
  URN =		{urn:nbn:de:0030-drops-34518},
  doi =		{10.4230/DagRep.1.12.62},
  annote =	{Keywords: privacy, security, smart grid, digital metrology}
}

Filters


Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail