Search Results

Documents authored by Flegel, Ulrich


Document
Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality

Authors: Ulrich Flegel, Florian Kerschbaum, and Richard Wacker

Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)


Abstract
In this paper we investigate the privacy dimension of collaborative fraud detection envisioned for outsourcing scenarios. Firstly, we investigate the privacy requirements derived from privacy law and present the resulting judicial argument for pseudonymizing audit data generated for the purpose of fraud detection. Second, we summarize the requirements for such pseudonymization derived from the requirements of the misuse detection approach for fraud detection. Third, we describe our approach for pseudonymization of audit data and two approaches for hiding timestamps in audit data.

Cite as

Ulrich Flegel, Florian Kerschbaum, and Richard Wacker. Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-5, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{flegel_et_al:DagSemProc.08302.3,
  author =	{Flegel, Ulrich and Kerschbaum, Florian and Wacker, Richard},
  title =	{{Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality}},
  booktitle =	{Countering Insider Threats},
  pages =	{1--5},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8302},
  editor =	{Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.3},
  URN =		{urn:nbn:de:0030-drops-17947},
  doi =		{10.4230/DagSemProc.08302.3},
  annote =	{Keywords: Insider threat; occupational fraud; privacy law; PET; logical clocks, pseudonyms,}
}
Document
Fraud Detection from a Business Perspective: Future Directions and Challenges

Authors: Ulrich Flegel, Julien Vayssière, and Gunter Bitz

Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)


Abstract
This contribution summarizes the state of the art of fraud detection in practice and shows the relations between the technology for fraud detection and intrusion detection. We identify prospective directions for further investigation and imminent challenges.

Cite as

Ulrich Flegel, Julien Vayssière, and Gunter Bitz. Fraud Detection from a Business Perspective: Future Directions and Challenges. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{flegel_et_al:DagSemProc.08302.4,
  author =	{Flegel, Ulrich and Vayssi\`{e}re, Julien and Bitz, Gunter},
  title =	{{Fraud Detection from a Business Perspective: Future Directions and Challenges}},
  booktitle =	{Countering Insider Threats},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8302},
  editor =	{Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.4},
  URN =		{urn:nbn:de:0030-drops-17956},
  doi =		{10.4230/DagSemProc.08302.4},
  annote =	{Keywords: Insider threat, occupational fraud, privacy law, PET, logical clocks, pseudonyms}
}
Document
7. 08102 Working Group – Intrusion and Fraud Detection for Web Services

Authors: Marc Daciér, Ulrich Flegel, Ralph Holz, and Norbert Luttenberger

Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)


Abstract
Web services (WS) technology bears the promise to finally bring the power of SOA middleware to the road on a large scale and across organizational domains. Big players such as Google, Amazon, SAP, and IBM have already adopted the technol-ogy. European funding agencies are strongly believing and heavily investing into WS-related technological developments and application scenarios. We expect a growing adoption and widespread use of Web services for different application areas, among them e.g. value added service composition, Web 2.0-enhanced communication sys-tems (e.g. based on Ajax), and focused service offerings from specialized small or medium sized enterprises (SMEs).

Cite as

Marc Daciér, Ulrich Flegel, Ralph Holz, and Norbert Luttenberger. 7. 08102 Working Group – Intrusion and Fraud Detection for Web Services. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{dacier_et_al:DagSemProc.08102.7,
  author =	{Daci\'{e}r, Marc and Flegel, Ulrich and Holz, Ralph and Luttenberger, Norbert},
  title =	{{7. 08102 Working Group – Intrusion and Fraud Detection for Web Services}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.7},
  URN =		{urn:nbn:de:0030-drops-14982},
  doi =		{10.4230/DagSemProc.08102.7},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail