Introduction of Researcher

 

[Name] 

WOHLGEMUTH, Sven

:::::Desktop:Sven Wohlgemuth.jpg

[Doctoral degrees] 

2008, Dr.-Ing., Albert-Ludwigs University of Freiburg, Germany

[Affiliation / Position] 

Associate Professor at Transdisciplinary Research Integration Center of Research Organization of Information and Systems (ROIS) and National Institute of Informatics (NII), Japan

[Telephone] 

+81-3-4212-2516

[Facsimile] 

+81-3-3556-1916 (c/o Prof. Dr. Isao Echizen)

[E-mail] 

wohlgemuth@nii.ac.jp

[Research fields] 

Resilience, security, and privacy

 

 

 

 

<> 

Outline of Current Research

<> 

Education

<> 

Career

<> 

Awards

 

<> 

Activities / Professional Experiences

 

<> 

Courses and Teaching Experiences

 

<> 

Academic Societies

 

<> 

Publications in Journals

 

<> 

Refereed Conference Publications, Workshops and Published Books

 

<> 

Editorials

 

<> 

Invited Talks

 

<> 

Competitive Research Funds

 

 

[Outline of Current Research] 


Adaptive IT systems following the computing paradigm of Ubiquitous Computing promise to achieve liveness properties of data processing in any case of faults and changes. Hence, they are an option for improving cyber-physical systems in monitoring and controlling social infrastructures even in hostile environments. Although on demand orchestration of services creates adaptive IT systems of systems to implement the required functionality, these desired interdependencies bear vulnerabilities by covert channels. Unfortunately, all covert channels cannot be automatically detected. Isolation of data processing is an essential requirement to prevent covert channels. Isolation can be seen a special sort of privacy, where the service should not be making contact with other services, and service providers should not know what data are used in the service and for what purpose the service is used by the service consumer.

 

Whereas isolation is well studied for models and their implementation for separated security domains, this is not the case for adaptive IT systems. Firstly, adaptive IT systems change continuously their state. A model can only consider those states, which have already passed. Secondly, security domains overlap in adaptive IT systems, which demand a disclosure of private data to third parties resulting in data aggregation at services of different security domains. Thirdly, some processing purposes are not predictable at the time of data collection and service orchestration and should not be excluded for new services. Enforcement of isolation in adaptive IT systems equals to enforcement of liveness and safety properties to achieve correct services by means of dependable and secure computing.


Our review and the results of our conducted workshops ISSI 2009, Transport and Mobility - Challenges for the Future 2010, RISI 2011, and ReISOC 2011 on current means of dependable and secure computing show that they are in general not suitable for adaptive IT systems, but are a starting point for isolation patterns. The ability of an IT system to maintain an acceptable level of service in the face of any faults and challenges to normal operation is understood as resilience. A measurement for the current state and suitability of isolation patterns for the affected systems are necessary to decide if and how they will reach acceptable level of service.

[Education] 

 

2008: Dr.-Ing. (Computer Science), Albert-Ludwigs University of Freiburg, Germany

 

2001: Diploma (Major: Computer Science; Minor: Econmics), University of Saarland, Germany

 

[Career] 

 

Since 2011: Associate Professor at Transdisciplinary Research Integration Center of Research Organization of Information and Systems (ROIS) and National Institute of Informatics (NII), Japan

 

2009-2011: Postdoctoral Scholar, National Institute of Informatics, Japan

 

2008-2009: Project Researcher, Albert-Ludwigs University of Freiburg, Germany

 

2008-2008: Visiting Researcher, National Institute of Informatics, Japan

 

[Awards] 

 

2010: The paper Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy has been selected as one of the best papers by the committee of the paper review of IFIP SEC 2010

 

2009: Gerd Griesser Award for On Privacy in Medical Services with Electronic Health Records as the best paper chosen by the program committees of the International Medical Informatics Association WG4 Security in Health Information Systems (IMIA SiHIS) 2009 Workshop on the Collaborative Meetings on Health Informatics (CoMHI) in Hiroshima

 

2003: doIT Software Award (3rd prize) of Federal State Baden-Württemberg, Germany for Security and Usability by Identity Management

 

[Activities / Professional Experiences] 

 

Since 2009: Member oft the Japanese-European Institute for Security (JEISec) management

 

2011: Member of the organizing committee of the int. workshops Resilience and IT Risks in Social Infrastructures (RISI) 2011 and Resilience and ICT for Secure Open Cities (ReISOC) 2011

 

2011: Guest editor of Editor of special focus Sustainable Cloud Computing, BISE 3(3), 2011, Gabler

 

2010: Member of the organizing committee of the Japan-Austria Workshop on ICT hold in Tokyo, Japan and funded by the Japan Science and Technology Agency (JST)

 

2010: Member of the organizing committee of the 150 Year Japan-Germany Friendship Symposium: Transport and Mobility - Challenges for the Future hold in Tokyo, Japan and funded by the Japanese Society for the Promotion of Science (JSPS) and JSPS German Alumni Club e.V.

 

2009: Member of the organizing committee of the International Workshop on Information Systems for Social Innovation (ISSI) 2009 at the National Institute of Informatics, Japan

 

2007-2008: Member of the organizing and scientific program committees of German IT security conference SICHERHEIT 2008 ? Sicherheit, Schutz und Zuverlässigkeit, Saarbrücken, Germany

 

2006-2008: Founding coordinator of the workgroup Privacy in Business Processes (WP14) of the European Network of Excellence Future of Identity in the Information Society (FIDIS) funded within the 6th Framework Programme of the European Commission

 

2005-2006: Member of the organizing committee of the International Conference on Emerging Trends in Information and Communication Security (ETRICS) 2006 hold in Freiburg, Germany and funded by the German Research Foundation (DFG)

 

2001-2006: Coordinator of the German Priority Program Security in Information and Communication Technology (SPP 1079) funded by the German Research Foundation (DFG)


[Courses and Teaching Experiences] 

 

2011: Supervising MOU internship student Martin Salfer, University of Augsburg, Germany

 

2010: Supervising the MOU intership students Hai Van Dang from the National University of Natural Sciences, Vietnam National University of Ho Chi Minh, Vietnam, Jeremie Tharaud from the National School of Applied Mathematics and Computer Science of Grenoble, ENSIMAG, France, and Klaus Rechert, Albert-Ludwig University Freiburg, Germany

 

2009: Supervising the MOU internship student Hue Thi Bach Pham from University of Natural Sciences, Vietnam National University of Ho Chi Minh, Vietnam

 

2001-2008: Coordinating the following courses and given selected classes at the Albert-Ludwigs University of Freiburg, Germany:

·       Telematics I: Basics of Telematics

·       Telematics IV: IT-Security and Privacy

 

2001-2008: Supervising the diploma thesis Sicherheit für Web Services und deren Anwendung für die ambulante Pflege, of six student research projects, and 15 term papers on the topic of Sicherheit, Privatsphäre und Identität

 

[Academic Societies] 

 

Member, ACM (Association for Computing Machinery)

 

Member, GI (German Society of Computer Science, e.V.)

 

Member, IEEE (The Institute of Electrical and Electronics Engineers, Inc.)


Member, IEEE Communications Society


Member, JSPS German Alumni Club e.V.


Program committee member, HICSS-46 Minitrack on Personalization, Privacy and Identity Disclosure in Virtual Society in the Internet and the Digital Economy Track, 2013


Organizer, Resilience and IT Risks in Social Infrastructures (RISI) 2012


Program committee member, IEEE Int. Workshop on Security and Privacy in Internet of Things (SPIoT) 2012


Program committee member, GI German Conference SICHERHEIT 2012 - Sicherheit, Schutz und Zuverlässigkeit

 

Program committee member, Security 12, 2012

 

Program committee member, Resilience and ICT for Secure Open Cities (ReISOC) 2011

 

Program committee member, IEEE Int. Workshop on Security and Privacy in Internet of Things (SPIoT) 2011

 

Organizer, Resilience and IT Risks in Social Infrastructures (RISI) 2011

 

Invited participation at Dagstuhl Perspectives Workshop 11061: Online Privacy: Towards Informational Self-Determination on the Internet, Schloss Dagstuhl Leibniz Center for Informatics, 2011.

 

Program committee member, WI 2011 (German conference on Information Systems / Business Information Systems Engineering)

 

Program committee member, 26th IFIP International Information Security Conference 2011 (IFIP SEC2011)

 

Program committee member, 25th IFIP International Information Security Conference 2010 (IFIP SEC2010)

 

Program committee member, 5th International Workshop on Security (IWSEC 2010)

 

Program committee member, GI German Conference SICHERHEIT 2008 - Sicherheit, Schutz und Zuverlässigkeit

 

Organizer and session chair, GI German Conference INFORMATIK 2003, Session DFG-Schwerpunktprogramm - Sicherheit in der Informations- und Kommunikationstechnik (SPP 1079)

 

Reviewer, Journal IEEE Transactions on Dependable and Secure Computing, IEEE Computer Society


Reviewer, Springer Journal of Personal and Ubiquitous Computing Theme Issue on Security and Trust in Context-Aware Systems

 

2002-2009: Speaker of the GI for the area of South Baden, Germany

 

[Publications in Journals] 

 

  1. Stefan Leinenbach and Sven Wohlgemuth. VR-basierte Benutzeroberflächen. IWimation Vol. 35, Institut für Wirtschaftsinformatik Prof. Scheer, pp. 6-8, 1996.
  2. Sven Wohlgemuth, Daniela Gerd tom Markotten, Uwe Jendricke, and Günter Müller. DFG-Schwerpunktprogramm Sicherheit in der Informations- und Kommunikationstechnik. it - Information Technology, Methoden und innovative Anwendungen der Informatik und Informationstechnik, 45(1), Oldenbourg, pp. 46-54, 2003.
  3. Daniela Gerd tom Markotten, Sven Wohlgemuth, and Günter Müller. Mit Sicherheit zukunftsfähig. PIK Sonderheft Sicherheit 2003, 26(1), pp. 5-14, 2003.
  4. Sven Wohlgemuth and Günter Müller. Vertretungsregelung - Möglichkeiten und Grenzen informationeller Selbstbestimmung bei mehrstufigen Geschäftsprozessen. In: Die Zeitschrift für Informationssicherheit (4)22, SecuMedia Verlags-GmbH, pp. 11-18, 2006.
  5. Sven Wohlgemuth and Günter Müller. Privatheit mit Identitätsmanagement. Digma. Zeitschrift für Datenrecht und Informationssicherheit Schulthess, Schweiz, Vol. 2, pp. 26-29, 2006.
  6. Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, and Günter Müller. Privacy in Business Processes - On Enforcement of Privacy Policies regarding Usage of Personal Data. Int. Journal of the Japan Society for Security Management (JSSM), Vol. 24, No. 2, 2010.
  7. Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, and Günter Müller. Privacy-compliant Disclosure of Personal Data to Third Parties. Int. Journal it - Information Technology 52(6), Oldenbourg, pp. 350-355, 2010.
  8. Sebastian Haas, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, and Günter Müller. Aspects of Privacy for Electronic Health Records. Int. Journal of Medical Informatics, Special Issue: Security in Health Information Systems 80(2), pp. e26-e31, Elsevier, 2011, http://dx.doi.org/10.1016/j.ijmedinf.2010.10.001.
  9. Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, and Günter Müller. On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking. Int. Journal of Information Hiding and Multimedia Signal Processing, pp. 270-281, Ubiquitous International, 2011, http://bit.kuas.edu.tw/~jihmsp/2011/vol2/JIH-MSP-2011-04-007.pdf.
  10. Simone Fischer-Hübner, Chris Hoofnagle, Kai Rannenberg, Michael Waidner, Ioannis Krontiris, Michael Marhöfer, and (Edited in cooperation with) Sven Wohlgemuth. Report from Dagstuhl Perspectives Workshop 11061: Online Privacy: Towards Informational Self-Determination on the Internet, Dagstuhl Reports 1(2), Schloss Dagstuhl Leibniz Center for Informatics, pp. 1-15, http://dx.doi.org/10.4230/DagRep.1.2.1, 2011.
  11. Noboru Sonehara, Isao Echizen, and Sven Wohlgemuth. Isolation in Cloud Computing und Mechanismen zum Schutz der Privatsphäre. Schwerpunktheft Nachhaltiges Computing in Clouds der Zeitschrift WIRTSCHAFTSINFORMATIK 53(3), Gabler, http://dx.doi.org/10.1007/s11576-011-0274-2, 2011.
  12. Noboru Sonehara, Isao Echizen, and Sven Wohlgemuth. Isolation in Cloud Computing and Privacy-Enhancing Technologies. Special focus Sustainable Cloud Computing of int. journal Business Information Systems Engineering (BISE) 3(3), Gabler, http://dx.doi.org/10.1007/s12599-011-0160-x, 2011.
  13. Hue Pham,  Sven Wohlgemuth,  Isao Echizen, Thuc Nguyen, and Thuy Dong. An Experimental Evaluation for a New Column - Level Access Control Mechanism for Electronic Health Record Systems. Int. Journal of u- and e-Service, Science and Technology, Science & Engineering Research Support soCiety (SERSC), 2012.

 

[Refereed Conference Publications, Workshops, and Published Books] 

 

  1. Sven Wohlgemuth and Tom Beiler. Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung. Informatiktage 1999 Fachwissenschaftlicher Informatik-Kongress, GI Gesellschaft für Informatik e.V., Konradin-Verlag Robert Kohlhammer GmbH, pp. 133-136, 1999.
  2. Günter Müller and Sven Wohlgemuth. Sichere IT-Systeme. In K. Dittrich, W. König, A. Oberweis, K. Rannenberg and W. Wahlster (eds.). INFORMATIK 2003 Innovative Informatikanwendungen, Volume 1, Köllen Druck+Verlag GmbH, pp. 87-90, 2003.
  3. Sven Wohlgemuth, Uwe Jendricke, Daniela Gerd tom Markotten, Felix Dorner, and Günter Müller. Sicherheit und Benutzbarkeit durch Identitätsmanagement. In D. Spath and K. Haasis (eds.). Tagungsband zum doIT Software-Forschungstag 2003, Aktuelle Trends in der Softwareforschung, IRB Verlag, Stuttgart, pp. 241-260, 2004.
  4. Sven Wohlgemuth. iManager - Identity Manager for Partial Identities in Structured Overview on Prototypes and Concepts of Identity Management Systems (D3.1). FIDIS NoE Consortium EC Contract No. 507512. 6th Framework Programme of European Commission. http://www.fidis.net, 2005.
  5. Sven Wohlgemuth. On Privacy with Delegation of Rights by Identity Management in Collection of Topics and Clusters of Mobility and Identity - Towards a Taxonomy of Mobility and Identity (D11.1), FIDIS NoE Consortium EC Contract No. 507512. 6th Framework Programme of European Commission. http://www.fidis.net, 2006.
  6. Daniel Gille, Sven Wohlgemuth, and Jens Strüker. Study: RFID in Germany in A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification (D3.7), FIDIS NoE Consortium EC Contract No. 507512. 6th Framework Programme of European Commission. http://www.fidis.net, 2007.
  7. Sven Wohlgemuth and Günter Müller. Privatheit bei der Delegation von Rechten mit Identitätsmanagement. In: Klaus Haasis, Armin Heinzl and Dieter Klumpp (eds.), Aktuelle Trends in der Softwareforschung, Tagungsband zum doIT Software-Forschungstag 2006, pp. 9-27, 2006.
  8. Sven Wohlgemuth and Günter Müller. Privacy with Delegation of Rights by Identity Management. In Günter Müller (ed.) Emerging Trends in Information and Communication Security (ETRICS) 2006, Freiburg, Germany, June 6-9, 2006. Proceedings, Volume 3995 of Lecture Notes in Computer Science 2006, pp. 175-190, 2006.
  9. Sven Wohlgemuth. Privatsphäre durch die Delegation von Rechten. Vieweg+Teubner, 2008.
  10. Maike Gilliot, Vashek Matyas, and Sven Wohlgemuth (eds.). Chapter Privacy and Identity in Kai Rannenberg, Denis Royer, and André Deuker (eds.) The Future of Identity in the Information Society (FIDIS) - Challenges and Opportunities. Springer, Heidelberg, 2009.
  11. Sven Wohlgemuth, Günter Müller, Noboru Sonehara, and Isao Echizen. On Observable Delegation of Personal Data. In proceedings of 5th IEEE Int. Workshop on Digital Rights Management Impact on Consumer Communications, Las Vegas, Nevada, pp. 1-5, 2009.
  12. Sven Wohlgemuth, Noboru Sonehara, Günter Müller, and Isao Echizen. On Privacy for Observable Delegation of Personal Data by Digital Watermarking. Proceedings of the 45th Conference on Computer Security (CSEC) in Tokyo, Japan, 2009.
  13. Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, and Günter Müller. On Privacy in Business Processes - Observing Delegation of Personal Data by Using Digital Watermarking. Proceedings of Int. Conference on e-Business (ICE-B) 2009, pp. 27-32, 2009.
  14. Sven Wohlgemuth, Noboru Sonehara, Isao Echizen, and Günter Müller. On Privacy-aware Delegation of Personal Data using Digital Watermarking. In Proceedings of 5th IEEE Int. Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP) 2009, IEEE Press, 2009.
  15. Sebastian Haas, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, and Günter Müller. On Privacy in Medical Services with Electronic Health Records. Int. Medical Informatics Association WG4 Security in Health Information Systems (IMIA SiHIS) 2009 workshop of the Collaborative Meetings on Health Informatics (CoMIHI) 2009, Hiroshima, 2009. Awarded with the Gerd Griesser Award for the best paper.
  16. Sven Wohlgemuth, Noboru Sonehara, Isao Echizen, and Günter Müller. A Privacy Aspect on the Disclosure of Personal Data to Third Parties. IEICE - Technical Committee on Social Implications of Technology and Information Ethics (SITE), 2010.
  17. Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, and Günter Müller. Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy. In Kai Rannenberg, Vijay Varadharajan and Christian Weber (eds.): SEC 2010, IFIP AICT 330, IFIP International Federation for Information Processing, pp. 241-252, 2010. Selected by the PC of the IFIP SEC 2010 as one of the best papers.
  18. Jérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller, and Pascal Lafourcade. Privacy by Data Provenance with Digital Watermarking. In proceedings of the 6th IEEE Int. Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP) 2010, IEEE Press, 2010.
  19. Van H. Dang, Sven Wohlgemuth, Hiroshi Yoshiura, Thuc D. Nguyen, and Isao Echizen. Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network based on Linear System and Histogram. In proceedings of the U- and E-Service, Science and Technology (UNESST) 2010, Communications in Computer and Information Science, volume 124, Springer, pp. 17-30, 2010.
  20. Pham Thi Bach Hue, Sven Wohlgemuth, Isao Echizen, Dong Thi Bich Thuy, and Nguyen Dinh Thuc. Fine-grained Access Control for Electronic Health Record Systems. In proceedings of the U- and E-Service, Science and Technology (UNESST) 2010, Communications in Computer and Information Science, volume 124, Springer, pp. 31-38, 2010.
  21. Klaus Rechert, Sven Wohlgemuth, Isao Echizen, and Noboru Sonehara. User Centric Privacy in Mobile Communication Scenarios. In 11th IEEE /IPSJ Int. Symposium on Applications and the Internet (SAINT 2011), IEEE Computer Society Press, 2011.
  22. Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara. Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters. In Int. Workshop on Resilience and IT-Risk in Social Infrastructures (RISI) 2011, ARES 2011, IEEE Computer Society, 2011.
  23. Martin Salfer, Sven Wohlgemuth, Sebastian Schrittwieser, Bernhard Bauer, and Isao Echizen. Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery. In IEEE CPSCom/iThings Workshop on Resilience and ICT for Secure Open Cities (ReISOC) 2011, 2011.
  24. Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, and Noboru Sonehara. An Algorithm for k-anonymity-based Fingerprinting. In 10th International Workshop on Digital-forensics and Watermarking (IWDW) 2011, Atlantic City, New Jersey, USA, LNCS, Springer, 2011

 

[Editorials] 

 

  1. Günter Müller and Sven Wohlgemuth (eds.). Study on Mobile Identity Management (D3.3). FIDIS NoE Consortium EC Contract No. 507512. 6th Framework Programme of European Commission. http://www.fidis.net, 2005.
  2. Best deliverable of the 1st work plan of the FIDIS European Network of Excellence funded within 6th Framework Programme of the European Commission. The reviewers of the European Comission has highlighted this study as the best deliverable of the first work plan.
  3. Günter Müller and Sven Wohlgemuth (eds.). Privacy in Business Processes by Identity Management (D14.2). FIDIS NoE Consortium EC Contract No. 507512. 6th Framework Programme of European Commission. http://www.fidis.net, 2007.
  4. Günter Müller and Sven Wohlgemuth (eds.). Study on the Suitability of Trusted Computing to Support Privacy in Business Processes (D14.3). FIDIS NoE Consortium EC Contract No. 507512. 6th Framework Programme of European Commission. http://www.fidis.net, 2008.
  5. Günter Müller and Sven Wohlgemuth (eds.). From Regulating Access Control on Personal Data to Transparency by Secure Logging (D14.6). FIDIS NoE Consortium EC Contract No. 507512. 6th Framework Programme of European Commission. http://www.fidis.net, 2008.
  6. Noboru Sonehara, Isao Echizen, Sven Wohlgemuth, Günter Müller, and A Min Tjoa (eds.). Proceedings of the Int. Workshop on Information Systems for Social Innovations (ISSI) 2009, http://www.nii.ac.jp/issi, National Center for Sciences, 2009.
  7. Noboru Sonehara, Hiroe Tsubaki, Sumio Kakinuma, Isao Echizen, Sven Wohlgemuth, Yuki Shoji, Hiroshi Ichifuji, and Motoi Okamoto (eds.). Proceedings of the International Workshop on Information Systems for Social Innovations (ISSI) 2010 - Evidence-based decision making by Data-centrc Human and Social Informatics, Institute for Statistical Mathematics and National Institute for Informatics, 2011.
  8. Günter Müller, Noboru Sonehara, Isao Echizen, and Sven Wohlgemuth (eds.). Nachhaltiges Computing in Clouds. Special Issue 3/2011 of the German journal WIRTSCHAFTSINFORMATIK 53(3), Gabler, http://dx.doi.org/10.1007/s11576-011-0273-3, 2011.
  9. Günter Müller, Noboru Sonehara, Isao Echizen, and Sven Wohlgemuth (eds.). Sustainable Cloud Computing. Special focus 3/2011 of the int. journal Business & Information Systems Engineering (BISE) 3(3), Gabler, http://dx.doi.org/10.1007/s12599-011-0159-3, 2011.
  10. Stefan Sackmann and Sven Wohlgemuth (eds.). Int. Workshop on Resilience and IT-Risk in Social Infrastructures (RISI) 2011. ARES 2011, IEEE Computer Society, 2011.
  11. Isao Echizen, Günter Müller, Stefan Sackmann, Noboru Sonehara, A Min Tjoa, and Sven Wohlgemuth (eds.). Int. Workshop on Resilience and ICT for Secure Open Cities (ReISOC) 2011. IEEE CPSCom 2011 - The 4th IEEE International Conference on Cyber, Physical and Social Computing/IEEE iThings 2011 - The 2011 Int. Conference on Internet of Things, IEEE Computer Society, 2011.

 

[Invited Talks] 

 

 

  1. Integriertes Sicherheitssystem für mobile Geräte, lecture series Standort Internet - Sicherheit und Mobilität II of the Albert-Ludwig University Freiburg, Germany, winter term 2002/2003.
  2. Sichere IT-Systeme, annual conference of the German Society of Computer Science (GI) INFORMATIK 2003, Frankfurt/Main, Germany, 2003.
  3. Privatheit bei der Delegation von Rechten mit Identitätsmanagement, lecture series Standort Internet ? Informatikinnovation of the Albert-Ludwig University Freiburg, Germany, winter term 2005/2006.
  4. Privatsphäre trotz Delegation von Kundenprofilen in Geschäftsprozessen, CAST workshop Mobile Security, Darmstadt, Germany, 2008.
  5. Todays Privacy Technologies: Possibilities and Limits, RFID SysTech 2008, 4th European Workshop on RFID Systems and Technologies, Freiburg, Germany, 2008.
  6. Privacy-compliant Disclosure of Personal Data, NII Seminar in Karuizawa, Japan, 2009.
  7. Privacy in eHealth, ISSI 2009, National Center for Sciences, Japan, 2009.
  8. Privacy-compliant Disclosure of Personal Data, Chair of Prof. Dr. Eiji Okamoto, University of Tsukuba, Japan, 2010.
  9. Privacy in Business Processes, Japan-Austria Workshop on ICT, National Center for Sciences, Japan, 2010.
  10. Privatsphäre und die Weitergabe personenbezogener Daten an Dritte am Beispiel der elektronischen Patientenakte, Wissenschaftlicher Gesprächskreis, German Academic Exchange Agency (DAAD) and JSPS German Alumni e.V., Japan, 2010.
  11. Privacy in Business Processes - Disclosure of Personal Data to Third Parties, Hitachi Systems Development Laboratory, Totsuka, Yokohama, Japan, 2010.
  12. Privacy-compliant Disclosure of Personal Data, NII Seminar in Karuizawa, Japan, 2010.
  13. Privacy and the Disclosure of Personal Data to Third Parties, Annual National Convention at Senshu University Ikuta Campus, Kawasaki City, JSSM (Japan Society of Security Management), Japan, 2010.
  14. Privacy in Business Processes, ISSI 2010, National Institute for Statistical Informatics and NII, Tachikawa, Japan, 2011.
  15. Resilience and IT Risks in Social Infrastructures, Research Workshop, Ericsson AB, Ericsson Research, Stockholm, Sweden, 2011.
  16. Resilience and IT Risks in Social Infrastructures, Japan - Austria Research Workshop, SBA Research, Vienna, Austria, 2011.
  17. Towards Resilient ICT - Privacy and Isolation of Data Processing, Int. Workshop ICT Resilience, Karuizawa, Japan, 2011.
  18. On Resilient Computing, Int. Workshop Resilience, SBA Research, Vienna, Austria, 2011.
  19. On Resilient Computing, Int. Workshop Resilience, Goethe University Frankfurt/Main, Frankfurt/Main, Germany, 2011.
  20. On Resilient Computing, To be held at Int. Workshop on Information Systems for Social Innovation 2011 - Resilient Social Infrastructure against Crises, National Center for Sciences, 2012.
  21. Is Privacy Supportive for Correctness of Data Processing in Cloud Computing, To be held at World Congress of Cloud Computing-2012 (CloudCon-2012), Session 3-7: Online Privacy Technology by Cloud Computing, Dalian, China, August 2012.

 

[Competitive Research Funds] 

 

Since 2011: Study on Resilient ICT: IT Risk Model for Resilience and ICT in Social Infrastructures, ROIS Grand Challenge project Transparency for ICT Resilience, NII

 

2009-2011: German Academic Exchange Service (DAAD) Postdoctoral Scholarship

 

2009: Japan Society for the Promotion of Science (JSPS) Postdoctoral Fellowship

 

2008-2010: German Federal Ministry of Education and Research, IKT-2020, inSel - Informationelle Selbstbestimmung in Dienstenetzen

 

2005-2008: European Commission, 6th Framework Programme, Coordination of work package Privacy in Business Processes of the Network of Excellence Future of Identity in the Information Society (FIDIS)