Personal Information
Organization / Workplace
Munich Area, Germany Germany
Occupation
System Architect Identity and Access Management – IT-Security Expert
Industry
Technology / Software / Internet
About
My professional interests concern the analysis of IT-systems with respect to their security as well as the architecture, design, and realization of security for them. In particular, this refers to distributed IT-systems as well as security technologies that are based on cryptographic mechanisms. Security protocols and infrastructure are a key aspect of my work.
In the recent years, I have been focusing on Identity and Access Management (IAM). This topic intersects IT-security with respect to authentication, authorization, and SSO. Moreover, this area is subject to ongoing innovations around identity federation - motivated by new use cases in Internet identity. My projects do address the ...
Tags
oauth
web security
iam
http security
it-security
authentication
openid connect
identity and access management
hypertext transfer protocol
rest
web service
authorization
saml
representational state transfer
soa
json
pki
ws-trust
sts
oidc
identity management
api
xml
claims-based identity management
soap
web api
web
tls
trust
user-centric identity
cardspace
identity 2.0
ws-federation
wtls
wmlscrypt
wim
wpki
jwt
ssl
ace
wsfed
kerberos
claims-based identity
ua4c
internet-of-things
iot
google
sso
security
cloud computing
uma
user-managed access
scim
cloud
identity- and access management
composite applications
mashups
non-repudiation
digital signature
persistent
transient
wap
cryptography
x.509
ca
ra
identity federation
xacml
jax-ws
wsit
openid
federation
health care
web services
electronic case records
ehealth
id-wsf
pkcs#7/11
x509v3
wap security
ssl/tls
pkix
presence
instant messaging
real-time-communications
corporate network
information security
See more
Presentations
(19)Personal Information
Organization / Workplace
Munich Area, Germany Germany
Occupation
System Architect Identity and Access Management – IT-Security Expert
Industry
Technology / Software / Internet
About
My professional interests concern the analysis of IT-systems with respect to their security as well as the architecture, design, and realization of security for them. In particular, this refers to distributed IT-systems as well as security technologies that are based on cryptographic mechanisms. Security protocols and infrastructure are a key aspect of my work.
In the recent years, I have been focusing on Identity and Access Management (IAM). This topic intersects IT-security with respect to authentication, authorization, and SSO. Moreover, this area is subject to ongoing innovations around identity federation - motivated by new use cases in Internet identity. My projects do address the ...
Tags
oauth
web security
iam
http security
it-security
authentication
openid connect
identity and access management
hypertext transfer protocol
rest
web service
authorization
saml
representational state transfer
soa
json
pki
ws-trust
sts
oidc
identity management
api
xml
claims-based identity management
soap
web api
web
tls
trust
user-centric identity
cardspace
identity 2.0
ws-federation
wtls
wmlscrypt
wim
wpki
jwt
ssl
ace
wsfed
kerberos
claims-based identity
ua4c
internet-of-things
iot
google
sso
security
cloud computing
uma
user-managed access
scim
cloud
identity- and access management
composite applications
mashups
non-repudiation
digital signature
persistent
transient
wap
cryptography
x.509
ca
ra
identity federation
xacml
jax-ws
wsit
openid
federation
health care
web services
electronic case records
ehealth
id-wsf
pkcs#7/11
x509v3
wap security
ssl/tls
pkix
presence
instant messaging
real-time-communications
corporate network
information security
See more