Some former topics are listed here:
Study: On the challenges of deploying Smart Card based authentication systems
Mobile Security & Privacy (MoSP)
Online Media Awareness
TCPAuthN: A Method for Dynamic Firewall Operation
Confidentiality as a Service
The Confidentiality as a Service (CaaS) approach is a novel alternative to traditional public key infrastructures (PKI). While a PKI is based on public and private keys which have to be managed by all users, the CaaS avoids the management complexity of asymmetric encryption by leveraging multi-layer symmetric encryption on behalf of the user. The CaaS approach brings multiple advantages such as better usability, no complex infrastructures and better performance, while providing the same level of trust as traditional asymmetric techniques do.
The Mind Mesh is a conceptual extension of Mind Maps that allows the collaborative modeling of research environments. Mind Maps focus on intuitive visualization of ideas, reflecting the way in which humans tend to organize complex relationships between concepts. However, the strict tree-structure of Mind Maps does not lend itself to modeling research collaborations and the relationships between the participating entities. The Mind Mesh models information in a graph structure and allows arbitrary relationships between any two entities. Nankani et al. already showed how automated graph based visualization of research ecosystems is beneficial for human interpretation of complex research ecosystems. We take this concept one step further and suggest that that users allow the user to actively create and maintain the information graph like a Mind Map and combine the visualization with active components to create a fully functional visual translational research ecosystem. Instrumenting the Mind Mesh with functionality to maintain and access data necessitates the integration of security concepts into the Mind Mesh paradigm. Here the same visualization and interaction concepts are used to give an intuitive understanding of the security situation and with direct feedback concerning consequences of security critical actions.
Computer security has been intensively researched over decades. From early military applications up to state of the art technologies such as RSA tokens or even quantum cryptography, there is a theoretical solution to most computer security problems. However, an important part of many security solutions has been neglected: the user. Especially since the widespread adoption of the Internet and new communication technologies, increasingly complex applications find their way into "normal" people's homes. For these users, security is a secondary concern that is only a nuisance in satisfying their shopping or communication needs. The Distributed Computing & Security Group is therefore investigating usability aspects of security technologies and their application in every day life. We believe that especially in domains that are part of the daily routine, e.g. Facebook, security needs to be as unobtrusive as possible. Adopting existing and proven security mechanisms to meet this challenge is the focus of ongoing research.