% % This file was created by the TYPO3 extension % bib % --- Timezone: CET % Creation date: 2024-03-28 % Creation time: 10-34-59 % --- Number of references % 15 % @Inproceedings { goetz2008adapt, title = {ADAPT: A Semantics-Oriented Protocol Architecture}, year = {2008}, month = {12}, day = {10}, volume = {5343/2008}, pages = {287-292}, abstract = {Although modularized protocol frameworks are flexible and adaptive to the increasing heterogeneity of networking environments, it remains a challenge to automatically compose communication stacks from protocol modules. The typical static classification into network layers or class hierarchies cannot appropriately accommodate cross-cutting changes such as overlay routing or cross-layer signaling. In this paper, we discuss how protocol composition can be driven by functionality and demand at runtime based on extensible semantic models of protocols and their execution environment. Such an approach allows to reason about the functionality and quality of automatically composed and adapted protocol compounds and it is open to existing and future protocols.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-goetz-mobiarch-adapt.pdf}, misc2 = {Print}, editor = {Karin Anna Hummel and James P. G. Sterbenz}, publisher = {Springer-Verlag}, address = {Tiergartenstra{\ss}e 17, 69121 Heidelberg, Germany}, series = {Lecture Notes in Computer Science}, booktitle = {Proceedings of the 3rd International Workshop on Self-Organizing Systems, Vienna, Austria}, event_place = {Vienna, Austria}, event_name = {3rd International Workshop on Self-Organizing Systems (IWSOS)}, event_date = {2008-12-10}, language = {en}, ISBN = {978-3-540-92156-1}, DOI = {10.1007/978-3-540-92157-8\textbackslash_27}, reviewed = {1}, author = {G{\"o}tz, Stefan and Beckel, Christian and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { heer-2008-conext-alpha, title = {ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication}, year = {2008}, month = {12}, volume = {1}, pages = {23:1--23:12}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-conext-alpha.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, series = {CoNEXT '08}, booktitle = {Proceedings of the 2008 ACM CoNEXT Conference, Madrid, Spain}, event_place = {Madrid, Spain}, event_name = {ACM Conext 2008}, event_date = {December 2008}, language = {en}, ISBN = {978-1-60558-210-8}, DOI = {10.1145/1544012.1544035}, reviewed = {1}, author = {Heer, Tobias and G{\"o}tz, Stefan and Garcia-Morchon, Oscar and Wehrle, Klaus} } @Techreport { draft-ietf-hip-cert-00, title = {{Host Identity Protocol Certificates}}, year = {2008}, month = {10}, volume = {1}, number = {draft-ietf-hip-cert-00.txt}, note = {{expires: January 2, 2010 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-cert-00}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-00}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Inproceedings { DugosijaEHVHM2008, title = {Online Gaming as Tool for Career Development}, year = {2008}, month = {9}, day = {16}, volume = {386}, abstract = {Gaming has undergone a transition from a niche hobby to a part of everyday culture, with the most prominent examples of professional gaming in Korea and the success of World of Warcraft. This transition alongside with the advance of use of the Internet has created a new kind of social environment, commonly known as virtual life. This paper presents an excerpt of the results of a survey investigating this environment with particular regard to the interaction between gaming and career, relationships as well as social groups. “Man only plays when in the full meaning of the word he is a man, and he is only completely a man when he plays. ” Schiller 1}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-steg-vaegs-gaming.pdf}, web_url = {http://www.slideshare.net/vaegs/online-gaming-as-tool-for-career-development-presentation}, editor = {Ralf Klamma, Nalin Sharda, Baltasar Fern{\'a}ndez-Manj{\'o}n, Harald Kosch and Marc Spaniol}, series = {CEUR Workshop Proceedings}, booktitle = {Proceedings of the First International Workshop on Story-Telling and Educational Games (STEG'08)}, event_place = {Maastricht School of Management, Maastricht, The Netherlands}, event_name = {First International Workshop on Story-Telling and Educational Games (STEG'08)}, event_date = {September 16, 2008}, language = {en}, author = {Dugosija, Darko and Efe, Vadi and Hackenbracht, Stephan and Vaegs, Tobias and Hannemann, Anna} } @Techreport { draft-varjonen-hip-cert-01, title = {{Host Identity Protocol Certificates}}, year = {2008}, month = {7}, volume = {1}, number = {draft-varjonen-hip-cert-01.txt}, note = {{expires: January 15, 2009 (work in progress)}}, url = {http://tools.ietf.org/html/draft-varjonen-hip-cert-01}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Conference { 2008-heer-pisa-full, title = {Secure Wi-Fi Sharing at Global Scales}, year = {2008}, month = {6}, day = {16}, volume = {1}, pages = {1-7}, abstract = {The proliferation of broadband Internet connections has lead to an almost pervasive coverage of densely populated areas with private wireless access points. To leverage this coverage, sharing of access points as Internet uplinks among users has first become popular in communities of individuals and has recently been adopted as a business model by several companies. However, existing implementations and proposals suffer from the security risks of directly providing Internet access to strangers. In this paper, we present the P2P Wi-Fi Internet Sharing Architecture PISA, which eliminates these risks by introducing secure tunneling, cryptographic identities, and certificates as primary security concepts. Thus, PISA offers nomadic users the same security that they expect from a wired Internet connection at home. Based on its three fundamental mechanisms, PISA achieves a flexibility which opens significant advantages over existing systems. They include user mobility, anonymity, service levels with different performance and availability characteristics, and different revenue models for operators. With this combination of key features, PISA forms an essential basis for global, seamless, and secure Wi-Fi sharing for large communities.}, tags = {mobile_access}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-ict-secure-wifi.pdf}, misc2 = {Print}, publisher = {IEEE}, address = {Washington, DC, USA}, booktitle = {Proc. of 15th International Conference on Telecommunication (ICT), St. Petersburg, Russian Federation}, event_place = {St. Petersburg, Russian Federation}, event_name = {15th International Conference on Telecommunication (ICT)}, event_date = {16-19 June 2008}, language = {en}, ISBN = {978-1-4244-2035-3}, reviewed = {1}, author = {Heer, Tobias and G{\"o}tz, Stefan and Weingaertner, Elias and Wehrle, Klaus} } @Techreport { draft-varjonen-hip-cert-00, title = {{Host Identity Protocol Certificates}}, year = {2008}, month = {2}, volume = {1}, number = {draft-varjonen-hip-cert-01.txt}, note = {{expires: August 21, 2008 (work in progress)}}, url = {http://tools.ietf.org/html/draft-varjonen-hip-cert-00}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, author = {Heer, Tobias and Varjonen, Samu} } @Article { 200808WeingaertnerSIGMETRICSPERSyncNetWorkEmulation, title = {Synchronized network emulation: matching prototypes with complex simulations}, journal = {SIGMETRICS Performance Evaluation Review}, year = {2008}, volume = {36}, number = {2}, pages = {58-63}, abstract = {Network emulation, in which real systems interact with a network simulation, is a common evaluation method in computer networking research. Until now, the simulation in charge of representing the network has been required to be real-time capable, as otherwise a time drift between the simulation and the real network devices may occur and corrupt the results. In this paper, we present our work on synchronized network emulation. By adding a central synchronization entity and by virtualizing real systems for means of control, we can build-up network emulations which contain both unmodified x86 systems and network simulations of any complexity.}, note = {This is a revised version of a paper originally presented at the ACM HotMetrics 2008 workshop.}, misc2 = {print}, language = {en}, ISSN = {0163-5999}, DOI = {10.1145/1453175.1453185}, reviewed = {1}, author = {Weingaertner, Elias and Schmidt, Florian and Heer, Tobias and Wehrle, Klaus} } @Inbook { 2008-thissen-LNCS-multimedia, title = {Multimedia and VR Support for Direct Communication of Designers}, year = {2008}, pages = {268-299}, misc2 = {Print}, editor = {M. Nagl, W. Marquardt}, publisher = {Springer}, series = {Lecture Notes in Computer Science 4970}, booktitle = {Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support}, language = {en}, ISBN = {978-3-540-70551-2}, author = {Sch{\"u}ppen, Andr{\'e} and Spaniol, Otto and Thi{\ss}en, Dirk and Assenmacher, Ingo and Haberstroh, Edmund and Kuhlen, Thorsten} } @Inbook { 2008-thissen-LNCS-synergy, title = {Synergy by Integrating New Functionality}, year = {2008}, pages = {519-526}, misc2 = {Print}, editor = {M. Nagl, W. Marquardt}, publisher = {Springer}, series = {Lecture Notes in Computer Science 4970}, booktitle = {Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support}, language = {en}, ISBN = {978-3-540-70551-2}, author = {Becker, Simon and Heller, Markus and Jarke, Matthias and Marquardt, Wolfgang and Nagl, Manfred and Spaniol, Otto and Thi{\ss}en, Dirk} } @Inbook { 2008-heer-hipbook-lhip, title = {Lightweight HIP}, year = {2008}, volume = {1}, pages = {121-163}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470997907.html}, misc2 = {Print}, editor = {Andrei Gurtov}, publisher = {Wiley and Sons}, address = {West Sussex, England, UK}, chapter = {8}, booktitle = {Host Identity Protocol (HIP): Towards the Secure Mobile Internet}, language = {en}, ISBN = {978-0-470-99790-1}, author = {Heer, Tobias} } @Inbook { 2008-heer-hipbook-security, title = {Introduction to Network Security}, year = {2008}, volume = {1}, pages = {13-42}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470997907.html}, misc2 = {Print}, editor = {Andrei Gurtov}, publisher = {Wiley and Sons}, address = {West Sussex, England, UK}, chapter = {2}, booktitle = {Host Identity Protocol (HIP): Towards the Secure Mobile Internet}, language = {en}, ISBN = {978-0-470-99790-1}, author = {Heer, Tobias} } @Techreport { 2008-heer-draft-cert-2, title = {HIP Certificates (Version 0)}, year = {2008}, abstract = {This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates.}, note = {Work in progress}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Varjonen, Samu and Heer, Tobias} } @Techreport { 2008-heer-draft-midauth, title = {End-Host Authentication for HIP Middleboxes (Version 1)}, year = {2008}, number = {draft-heer-hip-midauth-01}, abstract = {The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes.}, note = {Work in progress}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Heer, Tobias and Komu, Miika and Wehrle, Klaus} } @Techreport { 2008-heer-draft-cert, title = {HIP Certificates (Version 1)}, year = {2008}, abstract = {This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates.}, note = {draft-varjonen-hip-cert-01.txt. Work in progress.}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Varjonen, Samu and Heer, Tobias} }