@misc{Yilmaz2019, author = {Yilmaz, Zafer}, title = {The genesis of the 'Exceptional' Republic}, series = {Postprints der Universit{\"a}t Potsdam Wirtschafts- und Sozialwissenschaftliche Reihe}, journal = {Postprints der Universit{\"a}t Potsdam Wirtschafts- und Sozialwissenschaftliche Reihe}, number = {113}, issn = {1867-5808}, doi = {10.25932/publishup-43416}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-434164}, pages = {22}, year = {2019}, abstract = {Almost half of the political life has been experienced under the state of emergency and state of siege policies in the Turkish Republic. In spite of such a striking number and continuity in the deployment of legal emergency powers, there are just a few legal and political studies examining the reasons for such permanency in governing practices. To fill this gap, this paper aims to discuss one of the most important sources of the 'permanent' political crisis in the country: the historical evolution of legal emergency power. In order to highlight how these policies have intensified the highly fragile citizenship regime by weakening the separation of power, repressing the use of political rights and increasing the discretionary power of both the executive and judiciary authori- ties, the paper sheds light on the emergence and production of a specific form of legality based on the idea of emergency and the principle of executive prerogative. In that context, it aims to provide a genealogical explanation of the evolution of the excep- tional form of the nation-state, which is based on the way political society, representation, and legitimacy have been instituted and accompanying failure of the ruling classes in building hegemony in the country.}, language = {en} } @book{NeuhausPolzeChowdhuryy2011, author = {Neuhaus, Christian and Polze, Andreas and Chowdhuryy, Mohammad M. R.}, title = {Survey on healthcare IT systems : standards, regulations and security}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, isbn = {978-3-86956-128-8}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus-51463}, publisher = {Universit{\"a}t Potsdam}, pages = {53}, year = {2011}, abstract = {IT systems for healthcare are a complex and exciting field. One the one hand, there is a vast number of improvements and work alleviations that computers can bring to everyday healthcare. Some ways of treatment, diagnoses and organisational tasks were even made possible by computer usage in the first place. On the other hand, there are many factors that encumber computer usage and make development of IT systems for healthcare a challenging, sometimes even frustrating task. These factors are not solely technology-related, but just as well social or economical conditions. This report describes some of the idiosyncrasies of IT systems in the healthcare domain, with a special focus on legal regulations, standards and security.}, language = {en} } @book{vanderWaltOdunAyoBastianetal.2018, author = {van der Walt, Estee and Odun-Ayo, Isaac and Bastian, Matthias and Eldin Elsaid, Mohamed Esam}, title = {Proceedings of the Fifth HPI Cloud Symposium "Operating the Cloud" 2017}, number = {122}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, isbn = {978-3-86956-432-6}, issn = {1613-5652}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-411330}, publisher = {Universit{\"a}t Potsdam}, pages = {70}, year = {2018}, abstract = {Every year, the Hasso Plattner Institute (HPI) invites guests from industry and academia to a collaborative scientific workshop on the topic Operating the Cloud. Our goal is to provide a forum for the exchange of knowledge and experience between industry and academia. Co-located with the event is the HPI's Future SOC Lab day, which offers an additional attractive and conducive environment for scientific and industry related discussions. Operating the Cloud aims to be a platform for productive interactions of innovative ideas, visions, and upcoming technologies in the field of cloud operation and administration. In these proceedings, the results of the fifth HPI cloud symposium Operating the Cloud 2017 are published. We thank the authors for exciting presentations and insights into their current work and research. Moreover, we look forward to more interesting submissions for the upcoming symposium in 2018.}, language = {en} } @misc{CecenaMotto2005, author = {Cece{\~n}a, Ana Esther and Motto, Carlos Ernesto}, title = {Paraguay : Ausgangspunkt f{\"u}r die Beherrschung des S{\"u}dkegels}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus-48245}, year = {2005}, abstract = {Paraguays vast natural resources, especially water, are a source of geopolitical wealth - and trouble. This articleshows how the interests of the USA in this region put Paraguay in a difficult position and turn the country into a playground for international powers. The need to regain national power and real-life influence by the Paraguayan people is especially emphasized. Even though the article concentrates on Paraguay, it also makes clear that this country is part of an US-masterplan for a new order on the American continent.}, language = {de} } @phdthesis{Mueller2016, author = {M{\"u}ller, Maximilian}, title = {Organisationsmodelle f{\"u}r Beschaffung, Betrieb und Finanzierung von Lufttransportkapazit{\"a}ten in der internationalen Katastrophenhilfe}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-101021}, school = {Universit{\"a}t Potsdam}, pages = {ix, 229}, year = {2016}, abstract = {Die Dissertation befasst sich mit der Organisation von humanit{\"a}ren Lufttransporten bei internationalen Katastrophen. Diese Fl{\"u}ge finden immer dann statt, wenn die eigene Hilfeleistungsf{\"a}higkeit der von Katastrophen betroffenen Regionen {\"u}berfordert ist und Hilfe aus dem Ausland angefordert wird. Bei jedem der darauffolgenden Hilfseins{\"a}tze stehen Hilfsorganisationen und weitere mit der Katastrophenhilfe beteiligte Akteure erneut vor der Herausforderung, in k{\"u}rzester Zeit eine logistische Kette aufzubauen, damit die G{\"u}ter zum richtigen Zeitpunkt in der richtigen Menge am richtigen Ort eintreffen. Humanit{\"a}re Lufttransporte werden in der Regel als Charterfl{\"u}ge organisiert und finden auf langen Strecken zu Zielen statt, die nicht selten abseits der hochfrequentierten Warenstr{\"o}me liegen. Am Markt ist das Angebot f{\"u}r derartige Transportdienstleistungen nicht gesichert verf{\"u}gbar und unter Umst{\"a}nden m{\"u}ssen Hilfsorganisationen warten bis Kapazit{\"a}ten mit geeigneten Flugzeugen zur Verf{\"u}gung stehen. Auch qualitativ sind die Anforderungen von Hilfsorganisationen an die Hilfsg{\"u}tertransporte h{\"o}her als im regul{\"a}ren Linientransport. Im Rahmen der Dissertation wird ein alternatives Organisationsmodell f{\"u}r die Beschaffung und den Betrieb sowie die Finanzierung von humanit{\"a}ren Lufttransporten aufgebaut. Dabei wird die gesicherte Verf{\"u}gbarkeit von besonders flexibel einsetzbaren Flugzeugen in Betracht gezogen, mit deren Hilfe die Qualit{\"a}t und insbesondere die Planbarkeit der Hilfeleistung verbessert werden k{\"o}nnte. Ein idealtypisches Modell wird hier durch die Kopplung der Kollektivg{\"u}tertheorie, die der Finanzwissenschaft zuzuordnen ist, mit der Vertragstheorie als Bestandteil der Neuen Institutionen{\"o}konomik erarbeitet. Empirische Beitr{\"a}ge zur Vertragstheorie bem{\"a}ngeln, dass es bei der Beschaffung von transaktionsspezifischen Investitionsg{\"u}tern, wie etwa Flugzeugen mit besonderen Eigenschaften, aufgrund von Risiken und Umweltunsicherheiten zu ineffizienten L{\"o}sungen zwischen Vertragspartnern kommt. Die vorliegende Dissertation zeigt eine M{\"o}glichkeit auf, wie durch Aufbau einer gemeinsamen Informationsbasis ex-ante, also vor Vertragsschluss, Risiken und Umweltunsicherheiten reduziert werden k{\"o}nnen. Dies geschieht durch eine temporale Erweiterung eines empirischen Modells zur Bestimmung der Organisationsform bei transaktionsspezifischen Investitionsg{\"u}tern aus der Regulierungs{\"o}konomik. Die Arbeitet leistet dar{\"u}ber hinaus einen Beitrag zur Steigerung der Effizienz in der humanit{\"a}ren Logistik durch die fallspezifische Betrachtung von horizontalen Kooperationen und Professionalisierung der Hilfeleistung im Bereich der humanit{\"a}ren Luftfahrt.}, language = {de} } @misc{SahlmannClemensNowaketal.2020, author = {Sahlmann, Kristina and Clemens, Vera and Nowak, Michael and Schnor, Bettina}, title = {MUP}, series = {Postprints der Universit{\"a}t Potsdam : Mathematisch-Naturwissenschaftliche Reihe}, journal = {Postprints der Universit{\"a}t Potsdam : Mathematisch-Naturwissenschaftliche Reihe}, number = {1094}, issn = {1866-8372}, doi = {10.25932/publishup-48901}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-489013}, pages = {23}, year = {2020}, abstract = {Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible. This requires a firmware update procedure. In this paper, we propose a secure update protocol for MQTT-connected devices which ensures the freshness of the firmware, authenticates the new firmware and considers constrained devices. We show that the update protocol is easy to integrate in an MQTT-based IoT network using a semantic approach. The feasibility of our approach is demonstrated by a detailed performance analysis of our prototype implementation on a IoT device with 32 kB RAM. Thereby, we identify design issues in MQTT 5 which can help to improve the support of constrained devices.}, language = {en} } @phdthesis{Sapegin2018, author = {Sapegin, Andrey}, title = {High-Speed Security Log Analytics Using Hybrid Outlier Detection}, doi = {10.25932/publishup-42611}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-426118}, school = {Universit{\"a}t Potsdam}, pages = {162}, year = {2018}, abstract = {The rapid development and integration of Information Technologies over the last decades influenced all areas of our life, including the business world. Yet not only the modern enterprises become digitalised, but also security and criminal threats move into the digital sphere. To withstand these threats, modern companies must be aware of all activities within their computer networks. The keystone for such continuous security monitoring is a Security Information and Event Management (SIEM) system that collects and processes all security-related log messages from the entire enterprise network. However, digital transformations and technologies, such as network virtualisation and widespread usage of mobile communications, lead to a constantly increasing number of monitored devices and systems. As a result, the amount of data that has to be processed by a SIEM system is increasing rapidly. Besides that, in-depth security analysis of the captured data requires the application of rather sophisticated outlier detection algorithms that have a high computational complexity. Existing outlier detection methods often suffer from performance issues and are not directly applicable for high-speed and high-volume analysis of heterogeneous security-related events, which becomes a major challenge for modern SIEM systems nowadays. This thesis provides a number of solutions for the mentioned challenges. First, it proposes a new SIEM system architecture for high-speed processing of security events, implementing parallel, in-memory and in-database processing principles. The proposed architecture also utilises the most efficient log format for high-speed data normalisation. Next, the thesis offers several novel high-speed outlier detection methods, including generic Hybrid Outlier Detection that can efficiently be used for Big Data analysis. Finally, the special User Behaviour Outlier Detection is proposed for better threat detection and analysis of particular user behaviour cases. The proposed architecture and methods were evaluated in terms of both performance and accuracy, as well as compared with classical architecture and existing algorithms. These evaluations were performed on multiple data sets, including simulated data, well-known public intrusion detection data set, and real data from the large multinational enterprise. The evaluation results have proved the high performance and efficacy of the developed methods. All concepts proposed in this thesis were integrated into the prototype of the SIEM system, capable of high-speed analysis of Big Security Data, which makes this integrated SIEM platform highly relevant for modern enterprise security applications.}, language = {en} } @book{BrinkmeierFassbenderGriepetal.2002, author = {Brinkmeier, Friederike and Fassbender, Bardo and Griep, Ekkehard and Sucharipa, Ernst and Wesel, Reinhard and Winkelmann, Ingo}, title = {Die Vereinten Nationen und Regionalorganisationen vor aktuellen Herausforderungen}, series = {Potsdamer UNO-Konferenzen}, journal = {Potsdamer UNO-Konferenzen}, number = {3}, editor = {Klein, Eckart and Volger, Helmut}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-73849}, publisher = {Universit{\"a}t Potsdam}, pages = {115}, year = {2002}, abstract = {Seit 1999 gibt es die Potsdamer UNO-Konferenzen des Forschungskreises Vereinte Nationen. Inzwischen ist es eine gute Tradition geworden, daß sich UN-Forscher, Politiker und Diplomaten im Sommer zur Potsdamer UNO-Konferenz treffen. Die Konferenzen des Forschungskreises Vereinte Nationen stehen im Zeichen des interdisziplin{\"a}ren Dialogs in der UN-Forschung zwischen V{\"o}lkerrechts- und Politikwissenschaft und dienen zugleich der Standortbestimmung der deutschen UN-Forschung im internationalen Kontext. Die vierte Konferenz des Forschungskreises, die am 28. und 29. Juni 2002 wiederum in den R{\"a}umen der Juristischen Fakult{\"a}t der Universit{\"a}t Potsdam stattfand, widmete sich der Zusammenarbeit der Vereinten Nationen mit der Europ{\"a}ischen Union und mit der NATO sowie den Problemen, die sich den Vereinten Nationen bei der Bek{\"a}mpfung des Terrorismus in v{\"o}lkerrechtlicher Hinsicht und beim Schutz der Menschenrechte stellen. Die in dieser Brosch{\"u}re ver{\"o}ffentlichten Referate der vierten Konferenz machen zusammen mit den Diskussionen, die zusammenfassend dargestellt werden, deutlich, daß die Vereinten Nationen bei der Erf{\"u}llung ihrer durch die Charta gestellten Aufgaben auf die Zusammenarbeit mit regionalen politischen und milit{\"a}rischen Organisationen angewiesen sind. Bei der Auseinandersetzung mit politischen Konflikten, internationalen Krisen und aktuellen Herausforderungen wie dem internationalen Terrorismus sind ihnen dabei durch die machtpolitischen Realit{\"a}ten deutliche Grenzen gesetzt und k{\"o}nnen sie oft weniger Akteur als vielmehr Schiedsrichter und Wahrer der Menschenrechte sein.}, language = {de} } @book{OPUS4-6813, title = {Cloud security mechanisms}, number = {87}, editor = {Neuhaus, Christian and Polze, Andreas}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, isbn = {978-3-86956-281-0}, issn = {1613-5652}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus-68168}, publisher = {Universit{\"a}t Potsdam}, pages = {78}, year = {2014}, abstract = {Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud infrastructures. This report provides introductions to a selection of security mechanisms that were part of the "Cloud Security Mechanisms" seminar in summer term 2013 at HPI.}, language = {en} }