2020
Trautwein, Sandra; Barisch-Fritz, Bettina; Scharpf, Andrea; Ringhoff, Steffen; Krell-Roesch, Janina; Woll, Alexander
Effects of a 16-Week Multimodal Exercise Program on Gait Performance in Individuals with Dementia: a Multicenter Randomized Controlled Trial Journal Article
In: BMC Geriatrics, vol. 20, no. 245, 2020.
@article{Trautwein2020,
title = {Effects of a 16-Week Multimodal Exercise Program on Gait Performance in Individuals with Dementia: a Multicenter Randomized Controlled Trial},
author = {Sandra Trautwein and Bettina Barisch-Fritz and Andrea Scharpf and Steffen Ringhoff and Janina Krell-Roesch and Alexander Woll},
year = {2020},
date = {2020-01-01},
journal = {BMC Geriatrics},
volume = {20},
number = {245},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2019
Barisch-Fritz, Bettina; Barisch, Marc; Trautwein, Sandra; Scharpf, Andrea; Bezold, Jelena; Woll, Alexander
Designing a Mobile App for Treating Individuals with Dementia: Combining UX Research with Sports Science Proceedings Article
In: 2019.
@inproceedings{Barisch-Fritz2019,
title = {Designing a Mobile App for Treating Individuals with Dementia: Combining UX Research with Sports Science },
author = {Bettina Barisch-Fritz and Marc Barisch and Sandra Trautwein and Andrea Scharpf and Jelena Bezold and Alexander Woll},
year = {2019},
date = {2019-01-01},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2011
Barisch, Marc
Design and Evaluation for Ubiquitous User Authentication based on Identity Management Systems Proceedings Article
In: IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications, 2011.
@inproceedings{Barisch2011,
title = {Design and Evaluation for Ubiquitous User Authentication based on Identity Management Systems},
author = {Marc Barisch},
year = {2011},
date = {2011-01-01},
booktitle = {IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Meier,; Barisch,; Kirstädter,; Schlosser,; Duelli,; Jarschel,; Hoßfeld,; Hoffmann,; Hoffmann,; Kellerer,; Khan,; Jurca,; Kazuyuki,
Provisioning and Operation of Virtual Networks Journal Article
In: Electronic Communications of the EASST, vol. 37, pp. 1–12, 2011.
@article{IKR:040125,
title = {Provisioning and Operation of Virtual Networks},
author = {Meier and Barisch and Kirstädter and Schlosser and Duelli and Jarschel and Hoßfeld and Hoffmann and Hoffmann and Kellerer and Khan and Jurca and Kazuyuki},
year = {2011},
date = {2011-01-01},
journal = {Electronic Communications of the EASST},
volume = {37},
pages = {1--12},
abstract = {In today?s Internet, requirements of services regarding the underlying transport network are very diverse. In the future, this diversity will increase and make it harder to accommodate all services in a single network. A possible approach to keep up with this diversity in future networks is the deployment of isolated, custom tailored networks on top of a single shared physical substrate. The COMCON (COntrol and Monitoring of COexisting Networks) project aims to define a reference architecture for setup, control, and monitoring of virtual networks on a provider- and operator-grade level. In this paper, we present the building blocks and interfaces of our architecture.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Meier, S.; Barisch, M.; Kirstädter, A.; Schlosser, D.; Jarschel, M.; Duelli, M.; Hoßfeld, T.; Hoffmann, M.; Kellerer, W.; Hoffmann, K.; Khan, A.; Jurca, D.; Kazuyuki, K.
Provisioning and Operation of Virtual Networks Proceedings Article
In: Proceedings of KIVS 2011 - Workshop on Challenges and Solutions for Network Virtualization, 2011.
@inproceedings{IKR:040120,
title = {Provisioning and Operation of Virtual Networks},
author = {Meier, S. and Barisch, M. and Kirstädter, A. and Schlosser, D. and Jarschel, M. and Duelli, M. and Hoßfeld, T. and Hoffmann, M. and Kellerer, W. and Hoffmann, K. and Khan, A. and Jurca, D. AND Kazuyuki, K.},
year = {2011},
date = {2011-01-01},
booktitle = {Proceedings of KIVS 2011 - Workshop on Challenges and Solutions for Network Virtualization},
abstract = {In today?s Internet, requirements of services regarding the underlying transport network are very diverse. In the future, this diversity will increase and make it harder to accommodate all services in a single network. A possible approach to keep up with this diversity in future networks is the deployment of isolated, custom tailored networks on top of a single shared physical substrate. The COMCON (COntrol and Monitoring of COexisting Networks) project aims to define a reference architecture for setup, control, and monitoring of virtual networks on a provider- and operator-grade level. In this paper, we present the building blocks and interfaces of our architecture.},
howpublished = {KIVS 2011 Workshop on Challenges and Solutions for Network Virtualization},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2010
Barisch, M.; Berg, S.; Brodt, A.; Geiger, L.; Gerpott, T.; Gutscher, A.; Hubig, C.; Kühlewind, M.; Kühn, P. J.; Siemoneit, O.
Aspekte der Abrechenbarkeit und Bepreisung kontextbezogener Systeme Technical Report
SFB 627 Bericht Nr. 2010/03 2010.
@techreport{Barisch2010,
title = {Aspekte der Abrechenbarkeit und Bepreisung kontextbezogener Systeme},
author = {Barisch, M. and Berg, S. and Brodt, A. and Geiger, L. and Gerpott, T. and Gutscher, A. and Hubig, C. and Kühlewind, M. and Kühn, P.J. and Siemoneit, O.},
year = {2010},
date = {2010-01-01},
institution = {SFB 627 Bericht Nr. 2010/03},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
Barisch, M.; Torroglosa, E.; Lischka, M.; Marques, R.; Marx, R.; Matos, A.; Perez, A.; Scheuermann, D.
Security and Privacy Enablers for Future Identity Management Systems Proceedings Article
In: Future Network & Mobile Summit 2010, 2010.
@inproceedings{Barisch2010b,
title = {Security and Privacy Enablers for Future Identity Management Systems},
author = {Barisch, M. and Torroglosa, E. and Lischka, M. and Marques, R. AND Marx, R. and Matos, A. and Perez, A. and Scheuermann, D.},
year = {2010},
date = {2010-01-01},
booktitle = {Future Network & Mobile Summit 2010},
abstract = {In recent years, Identity Management (IṂ) has gained a lot of attention in industry, standardisation and academia. In particular, a couple of research projects, like Đaidalos or Prime, have invested considerable effort to bring IṂ forward, to take advantage of features like improved usability and security. Nevertheless, there are important issues that have not been addressed so far. Ŧhe SWIFT project leverages IṂ as a key technology of the Future Internet, tackling problems like the integration of the network and application layer from an IṂ perspective as well as the use of electronic identity cards. Moreover, aspects like the integration of several user devices, backward compatibility and a new access control infrastructure are required by future IṂ solutions. We consider all these aspects by extending existing IṂ solutions with six new security and privacy enablers that are part of the overall SWIFT framework. Ŧhese enablers have been partially implemented towards a new IṂ architecture. First evaluation results of the implementation are promising to pave the way towards future IṂ solutions.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Kögel, Jochen; Lutz, David; Barisch, Marc; Liang, Yongzeng
A Framework for Model-Driven Proposal and Evaluation of TABAC Strategies Proceedings Article
In: Future Network & Mobile Summit 2010, 2010.
@inproceedings{IKR:040041,
title = {A Framework for Model-Driven Proposal and Evaluation of TABAC Strategies},
author = {Jochen Kögel and David Lutz and Marc Barisch and Yongzeng Liang},
year = {2010},
date = {2010-01-01},
booktitle = {Future Network & Mobile Summit 2010},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2009
Barisch, Marc
Modelling the Impact of Virtual Identities on Communication Infrastructures Proceedings Article
In: Proceedings of the 5th ACM workshop on Digital Identity Management, pp. 45–52, ACM, Chicago, Illinois, USA, 2009, ISBN: 978-1-60558-786-8.
@inproceedings{Barisch2009,
title = {Modelling the Impact of Virtual Identities on Communication Infrastructures},
author = {Barisch, Marc},
isbn = {978-1-60558-786-8},
year = {2009},
date = {2009-01-01},
booktitle = {Proceedings of the 5th ACM workshop on Digital Identity Management},
pages = {45--52},
publisher = {ACM},
address = {Chicago, Illinois, USA},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Barisch, M.
Identity Centric View on User Devices - The Virtual Device Concept and the Application of Policies Miscellaneous
Project Cluster Event Primelife-Picos-Swift-Tas3 'Identity management and privacy', 2009.
@misc{ IKR:036838,
title = {Identity Centric View on User Devices - The Virtual Device Concept and the Application of Policies},
author = {Barisch, M.},
year = {2009},
date = {2009-01-01},
howpublished = {Project Cluster Event Primelife-Picos-Swift-Tas3 'Identity management and privacy'},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Barisch, M.; Matos, A.
Schichtenübergreifendes Identitätsmanagement zwischen HIP und SAML - Ein Architekturkonzept Miscellaneous
6. Treffen der ITG-Fachgruppe 5.2.2 'Sicherheit in Netzen', Heidelberg, Juni 2009, 2009.
@misc{ IKR:036839,
title = {Schichtenübergreifendes Identitätsmanagement zwischen HIP und SAML - Ein Architekturkonzept},
author = { M. Barisch and A. Matos},
year = {2009},
date = {2009-01-01},
howpublished = {6. Treffen der ITG-Fachgruppe 5.2.2 'Sicherheit in Netzen', Heidelberg, Juni 2009},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Barisch, M.; Matos, A.
Integrating User Identity Management Systems with the Host Identity Protocol Proceedings Article
In: Proceedings of the IEEE Symposium on Computers and Communications (ISCC'09), pp. 830–836, 2009.
@inproceedings{ IKR:036842,
title = {Integrating User Identity Management Systems with the Host Identity Protocol},
author = { M. Barisch and A. Matos},
year = {2009},
date = {2009-01-01},
booktitle = {Proceedings of the IEEE Symposium on Computers and Communications (ISCC'09)},
pages = {830--836},
abstract = {Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning. Unrelated approaches on the network layer introduce identity concepts to solve mobility problems and support multihoming. This paper describes a novel approach to the integration of IdM on the application layer with identity concepts introduced by the Host Identity Protocol (HIP). We propose an integrated architecture combining the advantages of both domains. In this scope, we tackle the mapping between the HIP namespace and user IdM namespace as well as we the management and assignment of user and host identities. The new architecture provides a unified view over user and host identities, enabling the exchange of user and host attributes, while it also provides enhanced security and network features.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Barisch, Marc; others,
SWIFT Đeliverable Đ303 -- Specification of Identity-centric Security Modules and Cross-layer Interfaces Miscellaneous
2009.
@misc{Barisch2009b,
title = {SWIFT Đeliverable Đ303 -- Specification of Identity-centric Security Modules and Cross-layer Interfaces},
author = {Marc Barisch and others},
year = {2009},
date = {2009-01-01},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Barisch, M.; Kögel, J.; Meier, S.
A Flexible Framework for Complete Session Mobility and its Implementation Proceedings Article
In: Proceedings of the 15th Open European Summer School (EUNICE 2009), 2009.
@inproceedings{Barisch2009a,
title = {A Flexible Framework for Complete Session Mobility and its Implementation},
author = {Barisch, M. and Kögel, J. and Meier, S.},
year = {2009},
date = {2009-01-01},
booktitle = {Proceedings of the 15th Open European Summer School (EUNICE 2009)},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2008
Fries, S.; Kögel, J.; Barisch, M.; Rathgeb, E. P.
Kommunikationsdienste im Internet - Möglichkeiten und Risiken Journal Article
In: NTZ - Nachrichtentechnische Zeitung,, vol. 61, pp. 18–21, 2008.
@article{IKR:036777,
title = {Kommunikationsdienste im Internet - Möglichkeiten und Risiken},
author = {Fries, S. and Kögel, J. and Barisch, M. and Rathgeb, E.P.},
year = {2008},
date = {2008-01-01},
journal = {NTZ - Nachrichtentechnische Zeitung,},
volume = {61},
pages = {18--21},
abstract = {Der Markt für Telekommunikationsdienste wandelt sich - und das hat insbesondere Auswirkungen auf die Sicherheit dieser Dienste. Während bei den klassischen Telefonnetzen die Sicherheit für die Nutzer durch die in sich geschlossene Architektur weitestgehend durch das Netz und dessen Betreiber gewährleistet war, sieht es bei den grundsätzlich offenen IP-Netzen (Internet) ganz anders aus. Durch 'All-IP-Netze' werden Themen wie Virenabwehr, Firewalls und Spam-Filter auf Telekommunikationsdienste übertragen und stellen damit Netzbetreiber und Nutzer vor neue Herausforderungen.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Barisch, M.; Sarma, A.; Girao, J.
SWIFT - Integriertes Identitätsmanagement für Netzbetreiber und Dienstanbieter Miscellaneous
Essener Workshop zur Netzsicherheit 2008 (EWNS08), 2008.
@misc{Barisch2008a,
title = {SWIFT - Integriertes Identitätsmanagement für Netzbetreiber und Dienstanbieter},
author = {Barisch, M. and Sarma, A. and Girao, J.},
year = {2008},
date = {2008-01-01},
howpublished = {Essener Workshop zur Netzsicherheit 2008 (EWNS08)},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Barisch, M.; Neubauer, M.; Pagaime, J.; Girao, J.; Aguiar, R.
Privacy and Identity Management in a Layered Pervasive Service Platform Proceedings Article
In: Proceedings of the ICT Mobile and Wireless Communications Summit 2008 (ICT-MobileSummit 2008), 2008.
@inproceedings{Barisch2008,
title = {Privacy and Identity Management in a Layered Pervasive Service Platform},
author = {Barisch, M. and Neubauer, M. and Pagaime, J. and Girao, J. and Aguiar, R.},
year = {2008},
date = {2008-01-01},
booktitle = {Proceedings of the ICT Mobile and Wireless Communications Summit 2008 (ICT-MobileSummit 2008)},
abstract = {Making pervasive computing reality is a challenging task mainly due to the multitude of functional requirements and technological constraints. In parallel to the honourable research progress in specific technologies, the Đaidalos project assessed that in future there will be the need for a pervasive service platform with open interfaces in order to simplify service development and provisioning. Ŧhe success of such a platform depends on the balance of different aspects, e.g. operational costs with revenue potentials, collection of personal data for context-awareness with privacy protection, manual control and transparency with enhanced user experience and simplicity. In this paper we show the Đaidalos approach to privacy protection and identity management for a future pervasive service platform and its architecture. We show how user identities are structured to support dynamic context information while following regulations for privacy protection in Europe. Special focus is put on the trade-off between access control for privacy protection and user experience. Ŧhis is achieved by automated identity selection, automatic derivation of fine-grained access control policies and their deployment. We also present gathered performance data and implementation details of our ID Broker concept.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}