This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-04-29 Creation time: 20-17-43 --- Number of references 11 techreport draft-ietf-hip-cert-02 <prt>Host Identity Protocol Certificates</prt> 2009 10 1 draft-ietf-hip-cert-02.txt <prt>expires: April 29, 2010 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-02 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-02 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen inproceedings securityforpervasivemedicalsensornetworks Security for Pervasive Medical Sensor Networks 2009 7 13 1 http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-garcia-mobiq.pdf Print IEEE Press
Washington, DC, USA
6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto ICST/IEEE Toronto, CAN 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009) en 978-963-9799-59-2 10.4108/ICST.MOBIQUITOUS2009.6832 1 OscarGarcia-Morchon ThomasFalck TobiasHeer KlausWehrle
techreport draft-ietf-hip-cert-01 <prt>Host Identity Protocol Certificates</prt> 2009 6 1 draft-ietf-hip-cert-01.txt <prt>expires: January 2, 2010 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-01 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-01 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen article 2009-pik-heer-leicht Leichtgewichtge Sicherheitsmechanismen für das Host Identity Protocol PIK Journal 2009 1 32 1/09 48-52 Diploma Thesis Award Article Print K.G. Saur Verlag
Munich, Germany
de 0930-5157 TobiasHeer
article inproceedingsreference200903099502213244 Time accurate integration of software prototypes with event-based network simulations Proceedings of the 11th Joint International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS/Performance 2009) 2009 37 2 49-50 Accepted as poster presentation. https://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-weingaertner-time-accurate-sigmetrics09.pdf Print ACM SIGMETRICS
New York, NY, USA
ACM en 0163-5999 10.1145/1639562.1639580 1 EliasWeingaertner FlorianSchmidt TobiasHeer KlausWehrle
inproceedings 2009-thissen-GI-IMS Evaluating the Performance of an IMS/NGN Deployment 2009 2561-2573 Print S. Fischer, E. Maehle, R. Reischuk Gesellschaft für Informatik Lecture Notes in Informatics 154 Informatik 2009 - Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI) en 978-3-88579-248-2 DirkThißen Juan MiguelEspinosa Carlín RenéHerpertz inproceedings 200906MobiArchgoetzprotocolorchestration Protocol Orchestration: A Semantic Approach to Communication Stacks 2009 43-50 The diversity of today's networking environments, such as wired, wireless, cell-based, or multi-hop, is matched by an equally large amount and heterogeneity of specialized protocols, e.g., overlays, Wi-Fi positioning, MANET routing, cross-layer signaling. However, communication is typically performed with a static set of protocols selected at design time based on simplified assumptions ignoring the environment's heterogeneity. In this paper, we argue that protocols can be orchestrated as software components driven purely by their functionality and the demands of the execution environment. Our end-system protocol framework Adapt bases on extensible ontological models that semantically describe protocol and environment properties. At runtime, each connection receives a custom-tailored protocol stack that Adapt orchestrates from the requirements derived from the application, user, and environment. With this approach, end-systems can reason about the functionality and quality of automatically composed and adapted protocol compounds while remaining open to existing and future protocols. https://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-goetz-mobiarch-protocol-orchestration.pdf print Krzysztof Zielinski and Adam Wolisz and Jason Flinn and Anthony LaMarca ACM
New York, NY, USA
print Proceedings of the Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09) ACM Sigcomm/Sigmobile Krakow, Poland Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09), Krakow, Poland 2009-06-22 en 1 StefanGötz TobiasHeer KlausWehrle
inproceedings 2009morchonpodckeyagreementwsn Lightweight Key Agreement and Digital Certificates for Wireles Sensor Networks 2009 1 326-327 Brief Announcement Print ACM
New York, NY, USA
Proceedings of the 28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009), Calgary Calgary, CN 28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009) en 978-963-9799-59-2 10.1145/1582716.1582791 1 OscarGarcia-Morchon TobiasHeer LudoTolhuizen KlausWehrle
inproceedings 2009-icc-heer-middleboxes End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace 2009 1 791-796 Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, detect network intrusion, control access to network resources, and enforce different levels of quality of service. The cornerstones for these security-related network services are end-host authentication and authorization. Using a cryptographic namespace for end-hosts simplifies these tasks since it gives them an explicit and verifiable identity. The Host Identity Protocol (HIP) is a key-exchange protocol that introduces such a cryptographic namespace for secure end-to-end communication. Although HIP was designed with middleboxes in mind, these cannot securely use its namespace because the on-path identity verification is susceptible to replay attacks. Moreover, the binding between HIP as an authentication protocol and IPsec as payload transport is insufficient because on-path middleboxes cannot securely map payload packets to a HIP association. In this paper, we propose to prevent replays attack by treating packet-forwarding middleboxes as first-class citizens that directly interact with end-hosts. Also we propose a method for strengthening the binding between the HIP authentication process and its payload channel with hash-chain-based authorization tokens for IPsec. Our solution allows on-path middleboxes to efficiently leverage cryptographic end-host identities and integrates cleanly into existing protocol standards. mobile_access http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-heer-icc-end-host-authentication.pdf Print Piscataway, NJ, USA
Dresden, Germany
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany IEEE Dresden, Germany IEEE International Conference on Communications 2009 (ICC 2009) en 978-1-4244-3435-0 1938-1883 10.1109/ICC.2009.5198984 1 TobiasHeer RenéHummen MiikaKomu StefanGötz KlausWehrle
techreport 2009-heer-draft-midauth End-Host Authentication for HIP Middleboxes (Version 2) 2009 draft-heer-hip-midauth-02 The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes. Work in progress Internet Engineering Task Force Internet-Draft TobiasHeer MiikaKomu KlausWehrle techreport 2009-heer-draft-service-id Service Identifiers for HIP 2009 draft-heer-hip-service-00 The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables HIP end-hosts and HIP-aware middleboxes to announce services to HIP hosts during a HIP Base EXchange (BEX) or HIP update. Service providers are able to specify the type and requirements of a service; clients can then decide to agree on the terms of service. This allows the service provider to verify the accordance of the client with the service conditions while the client is able to verify the authenticity of the used service. Work in progress Internet Engineering Task Force Internet-Draft TobiasHeer SamuVarjonen HannoWirtz