Skip to main content

Showing 1–15 of 15 results for author: Küpper, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11356  [pdf, other

    cs.CR cs.NI

    DIDChain: Advancing Supply Chain Data Management with Decentralized Identifiers and Blockchain

    Authors: Patrick Herbke, Sid Lamichhane, Kaustabh Barman, Sanjeet Raj Pandey, Axel Küpper, Andreas Abraham, Markus Sabadello

    Abstract: Supply chain data management faces challenges in traceability, transparency, and trust. These issues stem from data silos and communication barriers. This research introduces DIDChain, a framework leveraging blockchain technology, Decentralized Identifiers, and the InterPlanetary File System. DIDChain improves supply chain data management. To address privacy concerns, DIDChain employs a hybrid blo… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: Accepted to be published at the 18th IEEE International Conference on Service-Oriented System Engineering 2024

  2. arXiv:2405.07533  [pdf, other

    cs.CR cs.NI

    DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable Credentials

    Authors: Sandro Rodriguez Garzon, Dennis Natusch, Artur Philipp, Axel Küpper, Hans Joachim Einsiedler, Daniela Schneider

    Abstract: Authentication in TLS is predominately carried out with X.509 digital certificates issued by certificate authorities (CA). The centralized nature of current public key infrastructures, however, comes along with severe risks, such as single points of failure and susceptibility to cyber-attacks, potentially undermining the security and trustworthiness of the entire system. With Decentralized Identif… ▽ More

    Submitted 14 May, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  3. arXiv:2310.19366  [pdf, other

    cs.NI

    Beyond Certificates: 6G-ready Access Control for the Service-Based Architecture with Decentralized Identifiers and Verifiable Credentials

    Authors: Sandro Rodriguez Garzon, Hai Dinh Tuan, Maria Mora Martinez, Axel Küpper, Hans Joachim Einsiedler, Daniela Schneider

    Abstract: Next generation mobile networks are poised to transition from monolithic structures owned and operated by single mobile network operators into multi-stakeholder networks where various parties contribute with infrastructure, resources, and services. However, a federation of networks and services brings along a crucial challenge: Guaranteeing secure and trustworthy access control among network entit… ▽ More

    Submitted 23 February, 2024; v1 submitted 30 October, 2023; originally announced October 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  4. arXiv:2307.06919  [pdf, other

    cs.CR cs.NI

    DAXiot: A Decentralized Authentication and Authorization Scheme for Dynamic IoT Networks

    Authors: Artur Philipp, Axel Küpper

    Abstract: Federated and decentralized networks supporting frequently changing system participants are a requirement for future Internet of Things (IoT) use cases. IoT devices and networks often lack adequate authentication and authorization mechanisms, resulting in insufficient privacy for entities in such systems. In this work we address both issues by designing a privacy preserving challenge-response styl… ▽ More

    Submitted 15 July, 2023; v1 submitted 13 July, 2023; originally announced July 2023.

    Comments: 6 pages, 2 figures, 3 listings, 1 table. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  5. arXiv:2208.04692  [pdf, other

    cs.SE cs.CR

    A Tutorial on the Interoperability of Self-sovereign Identities

    Authors: Hakan Yildiz, Axel Küpper, Dirk Thatmann, Sebastian Göndör, Patrick Herbke

    Abstract: Self-sovereign identity is the latest digital identity paradigm that allows users, organizations, and things to manage identity in a decentralized fashion without any central authority controlling the process of issuing identities and verifying assertions. Following this paradigm, implementations have emerged in recent years, with some having different underlying technologies. These technological… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

    Comments: Submitted to IEEE Communications Surveys & Tutorials

  6. arXiv:2207.14577  [pdf

    cs.DC

    Blade: A Blockchain-supported Architecture for Decentralized Services

    Authors: Sebastian Göndör, Hakan Yildiz, Martin Westerkamp, Axel Küpper

    Abstract: Decentralized services and applications provide a multitude of advantages for their users, such as improved privacy, control, and independence from third parties. Anyhow, decentralization comes at the cost of certain disadvantages, such as increased application complexity or communication overhead. This aggravates the development and deployment of decentralized services and applications. In this p… ▽ More

    Submitted 29 July, 2022; originally announced July 2022.

    Comments: 12 pages

  7. Towards Decentralized Identity Management in Multi-stakeholder 6G Networks

    Authors: Sandro Rodriguez Garzon, Hakan Yildiz, Axel Küpper

    Abstract: Trust-building mechanisms among network entities of different administrative domains will gain significant importance in 6G because a future mobile network will be operated cooperatively by a variety of different stakeholders rather than by a single mobile network operator. The use of trusted third party issued certificates for initial trust establishment in multi-stakeholder 6G networks is only a… ▽ More

    Submitted 11 July, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

    Comments: Published at the 1st International Conference on 6G Networking (6GNet 2022) in Paris, France

    Journal ref: 1st Int. Conf. on 6G Networking (2022) 1-8

  8. SmartSync: Cross-Blockchain Smart Contract Interaction and Synchronization

    Authors: Martin Westerkamp, Axel Küpper

    Abstract: Cross-Blockchain communication has gained traction due to the increasing fragmentation of blockchain networks and scalability solutions such as side-chaining and sharding. With SmartSync, we propose a novel concept for cross-blockchain smart contract interactions that creates client contracts on arbitrary blockchain networks supporting the same execution environment. Client contracts mirror the lo… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

    Comments: 9 pages, 4 figures

    Journal ref: 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)

  9. Decentralized Identifiers and Self-sovereign Identity in 6G

    Authors: Sandro Rodriguez Garzon, Hakan Yildiz, Axel Küpper

    Abstract: A key challenge for mobile network operators in 6G is to bring together and orchestrate a variety of new emerging players of today's mobile ecosystems in order to provide economically viable and seamless mobile connectivity in form of a multi-stakeholder service. With each new player, be it a cloud, edge or hardware provider, the need for interfaces with secure authentication and authorization mec… ▽ More

    Submitted 4 August, 2022; v1 submitted 17 December, 2021; originally announced December 2021.

    Comments: Preprint submitted to special issue Trust, Security and Privacy of 6G of IEEE Networks on the 15th of December 2021

    Journal ref: IEEE Network, Volume: 36, Issue: 4, July/August 2022

  10. arXiv:1906.06134  [pdf, other

    cs.LG stat.ML

    Anomaly Detection with HMM Gauge Likelihood Analysis

    Authors: Boris Lorbeer, Tanja Deutsch, Peter Ruppel, Axel Küpper

    Abstract: This paper describes a new method, HMM gauge likelihood analysis, or GLA, of detecting anomalies in discrete time series using Hidden Markov Models and clustering. At the center of the method lies the comparison of subsequences. To achieve this, they first get assigned to their Hidden Markov Models using the Baum-Welch algorithm. Next, those models are described by an approximating representation… ▽ More

    Submitted 19 September, 2020; v1 submitted 14 June, 2019; originally announced June 2019.

    Comments: published in proceedings: 2019 IEEE Fifth International Conference on Big Data Computing Service and Applications (BigDataService)

  11. arXiv:1810.09843  [pdf, other

    cs.CY cs.NI

    Blockchain-based Supply Chain Traceability: Token Recipes model Manufacturing Processes

    Authors: Martin Westerkamp, Friedhelm Victor, Axel Küpper

    Abstract: Growing consumer awareness as well as manufacturers' internal quality requirements lead to novel demands on supply chain traceability. Existing centralized solutions suffer from isolated data storage and lacking trust when multiple parties are involved. Decentralized blockchain-based approaches attempt to overcome these shortcomings by creating digital representations of physical goods to facilita… ▽ More

    Submitted 15 October, 2018; originally announced October 2018.

  12. Cross-Domain Discovery of Communication Peers. Identity Map** and Discovery Services (IMaDS)

    Authors: Ingo Friese, Rebecca Copeland, Sebastian Göndör, Felix Beierle, Axel Küpper, Ricardo Lopes Pereira, Jean-Michel Crom

    Abstract: The upcoming WebRTC-based browser-to-browser communication services present new challenges for user discovery in peer-to-peer mode. Even more so, if we wish to enable different web communication services to interact. This paper presents Identity Map** and Discovery Service (IMaDS), a global, scalable, service independent discovery service that enables users of web-based peer-to-peer applications… ▽ More

    Submitted 17 November, 2017; v1 submitted 28 April, 2017; originally announced April 2017.

    Comments: Accepted for publication at the 2017 European Conference on Networks and Communications (EuCNC)

    ACM Class: C.2.1; C.2.4

  13. Cloud Service Matchmaking Approaches: A Systematic Literature Survey

    Authors: Begüm İlke Zilci, Mathias Slawik, Axel Küpper

    Abstract: Service matching concerns finding suitable services according to the service requester's requirements, which is a complex task due to the increasing number and diversity of cloud services available. Service matching is discussed in web services composition and user oriented service marketplaces contexts. The suggested approaches have different problem definitions and have to be examined closer in… ▽ More

    Submitted 22 July, 2016; originally announced July 2016.

  14. Cloud Service Matchmaking using Constraint Programming

    Authors: Begüm İlke Zilci, Mathias Slawik, Axel Küpper

    Abstract: Service requesters with limited technical knowledge should be able to compare services based on their quality of service (QoS) requirements in cloud service marketplaces. Existing service matching approaches focus on QoS requirements as discrete numeric values and intervals. The analysis of existing research on non-functional properties reveals two improvement opportunities: list-typed QoS propert… ▽ More

    Submitted 22 July, 2016; originally announced July 2016.

  15. arXiv:1508.06119  [pdf, other

    cs.SE cs.CY cs.DC

    The Open Service Compendium. Business-pertinent Cloud Service Discovery, Assessment, and Selection

    Authors: Mathias Slawik, Begüm İlke Zilci, Fabian Knaack, Axel Küpper

    Abstract: When trying to discover, assess, and select cloud services, companies face many challenges, such as fast-moving markets, vast numbers of offerings, and highly ambiguous selection criteria. This publication presents the Open Service Compendium (OSC), an information system which supports businesses in their discovery, assessment and cloud service selection by offering a simple dynamic service descri… ▽ More

    Submitted 25 August, 2015; originally announced August 2015.

    Comments: 14 pages, to be presented at GECON 2015