This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-04-27 Creation time: 00-41-34 --- Number of references 15 inproceedings 2021_kiesel_5g Development of a Model to Evaluate the Potential of 5G Technology for Latency-Critical Applications in Production 2021 12 15 739-744 Latency-critical applications in production promise to be essential enablers for performance improvement in production. However, they require the right and often wireless communication system. 5G technology appears to be an effective way to achieve communication system for these applications. Its estimated economic benefit on production gross domestic product is immense ($740 billion Euro until 2030). However, 55% of production companies state that 5G technology deployment is currently not a subject matter for them and mainly state the lack of knowledge on benefits as a reason. Currently, it is missing an approach or model for a use case specific, data-based evaluation of 5G technology influence on the performance of production applications. Therefore, this paper presents a model to evaluate the potential of 5G technology for latency-critical applications in production. First, we derive requirements for the model to fulfill the decision-makers' needs. Second, we analyze existing evaluation approaches regarding their fulfillment of the derived requirements. Third, based on outlined research gaps, we develop a model fulfilling the requirements. Fourth, we give an outlook for further research needs. 5G technology; latency-critical applications; production; evaluation model https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kiesel-5g-model.pdf IEEE Proceedings of the 28th IEEE International Conference on Industrial Engineering and Engineering Management (IEEM '21), December 13-16, 2021, Singapore, Singapore Singapore, Singapore December 13-16, 2021 978-1-6654-3771-4 10.1109/IEEM50564.2021.9673074 1 RaphaelKiesel FalkBoehm JanPennekamp Robert H.Schmitt inproceedings 2021-krude-nfp-pred Determination of Throughput Guarantees for Processor-based SmartNICs 2021 12 7 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-krude-nfp-pred.pdf ACM The 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '21) 978-1-4503-9098-9/21/12 10.1145/3485983.3494842 1 JohannesKrude JanRüth DanielSchemmel FelixRath Iohannes-HeorhFolbort KlausWehrle inproceedings 2021-kunze-spin-tracker Tracking the QUIC Spin Bit on Tofino 2021 12 7 15–21 https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-spin-tracker.pdf ACM Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC (EPIQ '21) 9781450391351 10.1145/3488660.3493804 1 IkeKunze ConstantinSander KlausWehrle JanRüth inproceedings 2021_pennekamp_bootstrapping Confidential Computing-Induced Privacy Benefits for the Bootstrapping of New Business Relationships 2021 11 15 RWTH-2021-09499 In addition to quality improvements and cost reductions, dynamic and flexible business relationships are expected to become more important in the future to account for specific customer change requests or small-batch production. Today, despite reservation, sensitive information must be shared upfront between buyers and sellers. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness following information leaks or breaches of their privacy. To address this issue, the concepts of confidential computing and cloud computing come to mind as they promise to offer scalable approaches that preserve the privacy of participating companies. In particular, designs building on confidential computing can help to technically enforce privacy. Moreover, cloud computing constitutes an elegant design choice to scale these novel protocols to industry needs while limiting the setup and management overhead for practitioners. Thus, novel approaches in this area can advance the status quo of bootstrapping new relationships as they provide privacy-preserving alternatives that are suitable for immediate deployment. bootstrapping procurement; business relationships; secure industrial collaboration; privacy; Internet of Production internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-bootstrapping.pdf RWTH Aachen University Blitz Talk at the 2021 Cloud Computing Security Workshop (CCSW '21), co-located with the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea RWTH Aachen University Seoul, Korea November 14, 2021 10.18154/RWTH-2021-09499 JanPennekamp FrederikFuhrmann MarkusDahlmanns TimoHeutmann AlexanderKreppein DennisGrunert ChristophLange Robert H.Schmitt KlausWehrle inproceedings 2021-sander-shardingrevisited Sharding and HTTP/2 Connection Reuse Revisited: Why Are There Still Redundant Connections? 2021 11 2 legato /fileadmin/papers/2021/2021-sander-sharding-revisited.pdf https://arxiv.org/abs/2110.14239 ACM Proceedings of the Internet Measurement Conference (IMC '21) Internet Measurement Conference 2021 02.11.21 - 04.11.21 978-1-4503-9129-0/21/11 10.1145/3487552.3487832 1 ConstantinSander LeoBlöcher KlausWehrle JanRüth proceedings fink-lcn-demons-2021 DEMONS: Extended Manufacturer Usage Description to Restrain Malicious Smartphone Apps 2021 10 4 nerd-nrw https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-fink-lcn-demons.pdf IEEE online Edmonton, Canada 46th IEEE Conference on Local Computer Networks (LCN) October 4-7, 2021 10.1109/LCN52139.2021.9524879 1 Ina BereniceFink MartinSerror KlausWehrle inproceedings 2021-glebke-service-based-forwarding Service-based Forwarding via Programmable Dataplanes 2021 6 10 reflexes /fileadmin/papers/2021/2021-glebke-service-based-forwarding.pdf IEEE Proceedings of the 2021 IEEE International Conference on High Performance Switching and Routing: Workshop on Semantic Addressing and Routing for Future Networks (SARNET-21) 978-1-6654-4005-9 2325-5609 10.1109/HPSR52026.2021.9481814 1 RenéGlebke DirkTrossen IkeKunze DavidLou JanRüth MirkoStoffers KlausWehrle inproceedings 2021-kunze-coordinate-transformation Investigating the Applicability of In-Network Computing to Industrial Scenarios 2021 5 11 334-340 in-network computing; latency; approximation internet-of-production,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-coordinate-transformation.pdf IEEE Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '21) 978-1-7281-6207-2 10.1109/ICPS49255.2021.9468247 1 IkeKunze RenéGlebke JanScheiper MatthiasBodenbenner Robert H.Schmitt KlausWehrle article 2021_buckhorst_lmas Holarchy for Line-less Mobile Assembly Systems Operation in the Context of the Internet of Production Procedia CIRP 2021 5 3 99 448-453 Assembly systems must provide maximum flexibility qualified by organization and technology to offer cost-compliant performance features to differentiate themselves from competitors in buyers' markets. By mobilization of multipurpose resources and dynamic planning, Line-less Mobile Assembly Systems (LMASs) offer organizational reconfigurability. By proposing a holarchy to combine LMASs with the concept of an Internet of Production (IoP), we enable LMASs to source valuable information from cross-level production networks, physical resources, software nodes, and data stores that are interconnected in an IoP. The presented holarchy provides a concept of how to address future challenges, meet the requirements of shorter lead times, and unique lifecycle support. The paper suggests an application of decision making, distributed sensor services, recommender-based data reduction, and in-network computing while considering safety and human usability alike. Proceedings of the 14th CIRP Conference on Intelligent Computation in Manufacturing Engineering (ICME '20), July 14-17, 2020, Gulf of Naples, Italy Internet of Production; Line-less Mobile Assembly System; Industrial Assembly; Smart Factory internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-buckhorst-holarchy.pdf Elsevier Gulf of Naples, Italy July 14-17, 2020 2212-8271 10.1016/j.procir.2021.03.064 1 Armin F.Buckhorst BenjaminMontavon DominikWolfschläger MelanieBuchsbaum AmirShahidi HenningPetruck IkeKunze JanPennekamp ChristianBrecher MathiasHüsing BurkhardCorves VerenaNitsch KlausWehrle Robert H.Schmitt inproceedings 2021-kunze-aqm-tofino-p4 Tofino + P4: A Strong Compound for AQM on High-Speed Networks? 2021 5 72-80 internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-aqm-tofino-p4.pdf IFIP/IEEE Proceedings of the International Symposium on Integrated Network Management (IM '21) Virtual Event International Symposium on Integrated Network Management (IM '21) May 2021 978-1-7281-9041-9 1 IkeKunze MoritzGunz DavidSaam KlausWehrle JanRüth inproceedings 2021_dahlmanns_entrust Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems 2021 4 28 78–87 The ongoing digitization of industrial manufacturing leads to a decisive change in industrial communication paradigms. Moving from traditional one-to-one to many-to-many communication, publish/subscribe systems promise a more dynamic and efficient exchange of data. However, the resulting significantly more complex communication relationships render traditional end-to-end security futile for sufficiently protecting the sensitive and safety-critical data transmitted in industrial systems. Most notably, the central message brokers inherent in publish/subscribe systems introduce a designated weak spot for security as they can access all communication messages. To address this issue, we propose ENTRUST, a novel solution for key server-based end-to-end security in publish/subscribe systems. ENTRUST transparently realizes confidentiality, integrity, and authentication for publish/subscribe systems without any modification of the underlying protocol. We exemplarily implement ENTRUST on top of MQTT, the de-facto standard for machine-to-machine communication, showing that ENTRUST can integrate seamlessly into existing publish/subscribe systems. cyber-physical system security; publish-subscribe security; end-to-end security internet-of-production, rfc https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-dahlmanns-entrust.pdf ACM Proceedings of the 1st ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS '21), co-located with the 11th ACM Conference on Data and Application Security and Privacy (CODASPY '21), April 26-28, 2021, Virtual Event, USA Virtual Event, USA ACM Workshop on Secure and Trustworthy Cyber-Physical Systems April 28, 2021 978-1-4503-8319-6/21/04 10.1145/3445969.3450423 1 MarkusDahlmanns JanPennekamp Ina BereniceFink BerndSchoolmann KlausWehrle MartinHenze inproceedings 2021-sander-zoom-cc Video Conferencing and Flow-Rate Fairness: A First Look at Zoom and the Impact of Flow-Queuing AQM 2021 3 internet-of-production /fileadmin/papers/2021/2021-sander-zoom-fairness-aqm.pdf https://arxiv.org/abs/2107.00904 Springer Proceedings of the Passive and Active Measurement Conference (PAM '21) Passive and Active Measurement Conference (PAM 2021) 10.1007/978-3-030-72582-2_1 1 ConstantinSander IkeKunze KlausWehrle JanRüth phdthesis 2021-serror-phd-thesis On the Benefits of Cooperation for Dependable Wireless Communications 2021 3 https://www.shaker.de/de/content/catalogue/index.asp?ISBN=978-3-8440-7923-4 Shaker Verlag
Shaker Verlag, Düren, Germany
Reports on Communications and Distributed Systems 21 RWTH Aachen University Ph.D. Thesis 978-3-8440-7923-4 MartinSerror
article 2021_schomakers_insights Insights on Data Sensitivity from the Technical, Legal and the Users' Perspectives Computer Law Review International 2021 2 15 22 1 8-15 Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. This article assesses the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. The key findings here suggest the GDPR adequately protecting users' privacy but for small adjustments. Information Sensitivity, Privacy, European Data Protection Law 1610-7608 10.9785/cri-2021-220103 1 Eva-MariaSchomakers ChantalLidynia DirkMüllmann RomanMatzutt KlausWehrle IndraSpiecker gen. Döhmann MartinaZiefle inproceedings 2019_rut_schomakers_privacy Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Information Sensitivity 2021 1 27 857-870 Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. In this paper, we assess the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. Our key findings still suggest the GDPR adequately protecting users' privacy but for small adjustments. Information Sensitivity,Privacy,European Data Protection Law mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-schomakers-3perspectives.pdf https://dl.gi.de/handle/20.500.12116/34788 https://arxiv.org/abs/1911.06569 Gesellschaft für Informatik
Bonn
INFORMATIK 2020 Karlsruhe, Germany INFORMATIK 2020 2020-09-28 to 2020-10-01 English 10.18420/inf2020_76 1 Eva-MariaSchomakers ChantalLidynia DirkMüllmann RomanMatzutt KlausWehrle IndraSpiecker gen. Döhmann MartinaZiefle