Refine
Year of publication
- 2017 (75) (remove)
Document Type
- Public lecture (35)
- Article (21)
- Part of a Book (6)
- Conference Proceeding (5)
- Book (2)
- Contribution to online periodical (2)
- Lecture (2)
- Other (1)
- Working Paper (1)
Language
- English (75) (remove)
Is part of the Bibliography
- no (75)
Keywords
- Europäische Union (2)
- Europäischen Union (2)
- Zollunion (2)
- Administrative Styles (1)
- Artt. 290 & 291 AEUV (1)
- Asyl (1)
- Binnenmarkt (1)
- Deportation (1)
- Europarat (1)
- European Directives (1)
Institute
- Lehrstuhl für Öffentliches Recht, insbesondere deutsches und europäisches Verwaltungsrecht (Univ.-Prof. Dr. Ulrich Stelkens) (16)
- Lehrstuhl für Volkswirtschaftslehre, insbesondere Wirtschafts- und Verkehrspolitik (Univ.-Prof. Dr. Dr. h.c. Andreas Knorr) (14)
- Lehrstuhl für Politikwissenschaft (Univ.-Prof. Dr. Stephan Grohs) (6)
- Lehrstuhl für Öffentliches Recht, insbesondere Europarecht und Völkerrecht (Univ.-Prof. Dr. Wolfgang Weiß) (6)
- Lehrstuhl für Öffentliches Recht, Staatslehre und Rechtsvergleichung (Univ.-Prof. Dr. Dr. h.c. Karl-Peter Sommermann) (5)
- Lehrstuhl für Hochschul- und Wissenschaftsmanagement (Univ.-Prof. Dr. Michael Hölscher) (3)
- Lehrstuhl für öffentliches Recht, insbesondere allgemeines und besonderes Verwaltungsrecht (Univ.-Prof. Dr. Jan Ziekow) (2)
- Lehrstuhl für Sozialrecht und Verwaltungswissenschaft (Univ.-Prof. Dr. Constanze Janda) (1)
- Lehrstuhl für vergleichende Verwaltungswissenschaft und Policy-Analyse (Univ.-Prof. Dr. Michael Bauer) (1)
Economic Effects of Brexit
(2017)
Administrative and Security Challenges of Germany's Refugee Crisis: an Explorative Assessment
(2017)
Globally, there are challenges and threats that cannot be targeted by a single actor, even if it may be a national state, legitimized and willing to act. Hence, new collaboration regimes were created: international organizations, but also – formal or informal – cooperations with the private sector. Our paper discusses organization forms of these cooperations or ‘global public private partnerships’ (GPPP) theoretically and outlines framework conditions for the use of these global partnerships. Additionally, the health sector will be tackled exemplarily to delineate in how far GPPP are largely depending on the nature of the good provided.
Higher education in both Germany and the UK has undergone numerous changes in the last two decades. It seems worthwhile to examine how varying forms of HE governance and pan-European influences have played out upon these two national systems. Of note in particular are Bologna, European Standards and Guidelines in Quality Assurance, and various accreditation regulations. In this article we postulate to what extent these two systems may or may not be able to move forward in the imminent future. Is German higher education, for example, becoming more autonomous if it can display its own systems of quality control are working well (system-accreditation)? Has British higher education relinquished autonomy, as both research and teaching domains are subject to external review (REF/TEF)? What can we learn about the transformational impact any of these mechanisms are having? This chapter adresses these issues and asks which benefits or disadvantages are to be gained by different systems in article.
Technologies for the IoT have reached a high level of maturity, and a largescale deployment will soon be possible. For the IoT to become an economic success, easy access to all kinds of real-world information must be enabled. Assuming that not all services will be available for free, an IoT infrastructure should support access control, accounting, and billing. We analyze available access control and payment schemes for their potential as payment schemes in the IoT. In addition to security and privacy, we discuss suitability for direct client to sensor communication and efficiency.
We show shortcomings of existing protocols that need to be addressed by future research.
The importance of frequent backups is uncontroversial. Their creation is simpler than ever today thanks to widespread availability of cheap cloud storage. Common backup solutions, however, tend to be either insecure, inflexible or inefficient in typical backup scenarios.
In this paper, we present triviback, a lightweight and almost trivial, yet powerful solution for outsourcing backups to untrusted cloud storage. Based on recent research results on secure data deduplication, triviback combines strong confidentiality, authenticity and availability guarantees with flexibility and efficiency in terms of low storage and communication costs: Triviback supports efficient preservation of many backup states with storage costs comparable to state-of-the-art version control systems-while supporting full storage reclamation on deletion of arbitrary backup states.
We discuss its security, publish an implementation and perform an extensive evaluation of storage and communication costs.
We present sec-cs, a hash-table-like data structure for contents on untrusted storage that is provably secure and storage-efficient. We achieve authenticity and confidentiality with zero storage overhead using deterministic authenticated encryption. State-of-the-art data deduplication approaches prevent redundant storage of shared parts of different contents irrespective of whether relationships between contents are known a priori.
Instead of just adapting existing approaches, we introduce novel (multi-level) chunking strategies, ML-SC and ML-CDC, which are significantly more storage-efficient than existing approaches in presence of high redundancy.
We prove sec-cs's security, publish an implementation, and present evaluation results indicating suitability for, e.g., future backup systems that should preserve many versions of files on little available storage.
With Home Automation Systems steadily gaining popularity and affordability, the threat of attacks on these installations is increasing.
Previous research has shown that passive adversaries can obtain considerable amounts of information about the users' habits and about how they interact with their system. Although encryption and other measures to ensure condentiality in communication are becoming a standard, traffic analysis remains an unsolved problem. In this paper, we take a look at different research areas and show that existing solutions cannot be easily applied to this scenario. However, we establish a model for traffic analysis in Home Automation Systems which leverages existing research on Private Information Retrieval. Using this model, both attacks and countermeasures can be analysed and their effectiveness can be measured to yield comparable results. We also take a look at legal aspects, highlighting problem areas and recent developments in the interaction between technology such as Home Automation and legislature.
Reputation systems are useful to assess the trustworthiness of potential transaction partners, but also a potential threat to privacy since rating profiles reveal users’ preferences. Anonymous reputation systems resolve this issue, but make it difficult to assess the trustworthiness of a rating. We introduce a privacy-preserving reputation system that enables anonymous ratings while making sure that only authorized users can issue ratings. In addition, ratings can be endorsed by other users. A user who has received a pre-defined number of endorsements can prove this fact, and be rewarded e.g. by receiving a “Premium member” status. The system is based on advanced cryptographic primitives such as Chaum-Pedersen blind signatures, verifiable secret sharing and oblivious transfer.
Der Vortrag auf der ICON Konferenz 2017 in Glasgow untersuchte wie vor dem EuGH verweise auf Vertrauensschutz benutzt wurden, um Weitergabe von Dokumenten anch Verordnung 1049/2001 zu bewilligen oder zu verweigern.
The function and role of legal expert at ministry level of European states is very different. The following considerations focus on two major states of central European administration style, France and Germany.
Vortrag gehalten auf der CES Konferenz 2017 in Glasgow zum e-government in der europäischen Zollunion.
Inuit and Subjects in EU law
(2017)
Vortrag auf der ICON Konferenz 2017 in Kopenhagen zur Konstruktion des EU Rechtssubjekts anhand der Inuit Rechtsprechung des EuGH
UK report
(2017)
UK report in XL Table ronde organised by Aix-en-provence Centre de recherches administratives on 3rd-4th November 2017 on Citizens-administration: 40 years of evolution (summary available here: https://europeancommonwealth.org/2017/11/21/account-citizens-administration-40-years-of-administrative-reforms-aix-en-provence/). Paper to be submitted in April 2018 – for publication in Annuaire européen d’administration publique.
I-CONN Conference, 5th July, Copenhagen, Panel coordinated by C. Colombo and M. Eliantonio (“The Changing nature of the public administration; what role of judicial review?”). Paper from this presentation to be published with S Van Garsse under the title ‘Revisiting judicial review in the face of the changing nature of public administration – A case study drawn from European infrastructure projects’, submitted to European Public Law (special issue) (guest editors: Dr C Colombo and Dr M Eliantonio) (second stage of proof-reading).
Transparency in France
(2017)
European Conference Public Administration (EGPA), Milan, 30th August-1st September, panel on Law and Administration (organised by D Drago, B Marseille and P Kovac). Paper from this presentation to be published with E Slautsky, ‘Freedom of Information in France’, in D Drago, B Marseille and P Kovac (eds), The Laws of Transparency in Action: A European Perspective (Palgrave) (ca. 17,000 words, submitted), a significantly longer version of this paper is available on ResearchGate and SSRN (ca. 22,000 words). The SSRN paper was included in the Top Ten List for “PSN: Public Administration (Institutions)” on 04.10.2017 and in the Top Ten List for “International Administrative Law eJournal” on 19.10.2017.
.