Table of Contents, vol 17, no 1&2, year 2024

pages: 1 - 10
Pixels versus Privacy: Leveraging Vision-Language Models for Sensitive Information Extraction
Sergej Schultenkämper, Bielefeld University of Applied Sciences and Arts, Germany
Frederik Simon Bäumer, Bielefeld University of Applied Sciences and Arts, Germany

pages: 11 - 28
Securing Confidential Data for Distributed Software Development Teams: Encrypted Container File
Tobias J. Bauer, Fraunhofer Institute for Applied and Integrated Security, Germany
Andreas Aßmuth, Ostbayerische Technische Hochschule Amberg-Weiden, Germany

pages: 29 - 43
Joining of Data-driven Forensics and Multimedia Forensics - Practical Application on DeepFake Image and Video Data
Dennis Siegel, Otto-von-Guericke-University Magdeburg, Germany
Christian Kraetzer, Otto-von-Guericke-University Magdeburg, Germany
Stefan Seidlitz, Otto-von-Guericke-University Magdeburg, Germany
Jana Dittmann, Otto-von-Guericke-University Magdeburg, Germany

pages: 44 - 52
Monitoring Physical-World Access of Virtual Automation Functions
Rainer Falk, Siemens AG, Germany
Steffen Fries, Siemens AG, Germany

pages: 53 - 71
Can Secure Software be Developed in Rust? On Vulnerabilities and Secure Coding Guidelines
Tiago Espinha Gasiba, Siemens AG, Germany
Sathwik Amburi, Siemens AG, Germany
Andrei-Cristian Iosif, Siemens AG, Germany

pages: 72 - 81
ChatIDS: Advancing Explainable Cybersecurity Using Generative AI
Victor Jüttner, Center for Scalable Data Analytics and Artificial Intelligence (ScaDS.AI) Dresden/Leipzig, Germany
Martin Grimmer, Center for Scalable Data Analytics and Artificial Intelligence (ScaDS.AI) Dresden/Leipzig, Germany
Erik Buchmann, Center for Scalable Data Analytics and Artificial Intelligence (ScaDS.AI) Dresden/Leipzig, Germany

pages: 82 - 91
A Set of Social Requirements for Self-adaptive Privacy Management Based on Social Groups' Belonging
Angeliki Kitsiou, Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, Greece
Maria Sideri, Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, Greece
Aikaterini – Georgia Mavroeidi, Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, Greece
Katerina Vgena, Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, Greece
Eleni Tzortzaki, Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, Greece
Michail Pantelelis, Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, Greece
Stavros Simou, Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, Greece
Christos Kalloniatis, Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, Greece

pages: 92 - 98
Supporting Cryptographic Algorithm Agility with Attribute Certificates
Steffen Fries, Siemens, Germany
Rainer Falk, Siemens, Germany

pages: 99 - 114
Redesign and Feasibility Verification of Access Control System Based on Correlation Among Files
Yuki Kodaka, The Graduate University for Advanced Studies, Japan
Hirokazu Hasegawa, National Institute of Informatics, Japan
Hiroki Takakura, National Institute of Informatics, Japan

download vol 17, no 1&2, year 2024

 
Copyright (c) 2008-2010. IARIA, All rights reserved.