Personal Information
Organization / Workplace
Munich Area, Germany Germany
Occupation
System Architect Identity and Access Management – IT-Security Expert
Industry
Technology / Software / Internet
About
My professional interests concern the analysis of IT-systems with respect to their security as well as the architecture, design, and realization of security for them. In particular, this refers to distributed IT-systems as well as security technologies that are based on cryptographic mechanisms. Security protocols and infrastructure are a key aspect of my work.
In the recent years, I have been focusing on Identity and Access Management (IAM). This topic intersects IT-security with respect to authentication, authorization, and SSO. Moreover, this area is subject to ongoing innovations around identity federation - motivated by new use cases in Internet identity. My projects do address the ...
Tags
web security
oauth
iam
authentication
http security
it-security
rest
saml
hypertext transfer protocol
identity and access management
openid connect
web service
authorization
representational state transfer
soa
ws-trust
sts
pki
json
web api
trust
ws-federation
identity 2.0
tls
soap
web
claims-based identity management
xml
api
wtls
identity management
wmlscrypt
wim
wpki
oidc
cardspace
user-centric identity
health care
federation
web services
openid
wsit
electronic case records
ehealth
id-wsf
pkcs#7/11
x509v3
wap security
ssl/tls
pkix
presence
instant messaging
real-time-communications
corporate network
cloud
scim
user-managed access
uma
cloud computing
security
sso
google
iot
internet-of-things
ua4c
claims-based identity
kerberos
wsfed
ace
ssl
information security
jax-ws
xacml
identity federation
ra
ca
x.509
cryptography
wap
transient
persistent
digital signature
non-repudiation
mashups
composite applications
identity- and access management
jwt
See more
Presentations
(19)Personal Information
Organization / Workplace
Munich Area, Germany Germany
Occupation
System Architect Identity and Access Management – IT-Security Expert
Industry
Technology / Software / Internet
About
My professional interests concern the analysis of IT-systems with respect to their security as well as the architecture, design, and realization of security for them. In particular, this refers to distributed IT-systems as well as security technologies that are based on cryptographic mechanisms. Security protocols and infrastructure are a key aspect of my work.
In the recent years, I have been focusing on Identity and Access Management (IAM). This topic intersects IT-security with respect to authentication, authorization, and SSO. Moreover, this area is subject to ongoing innovations around identity federation - motivated by new use cases in Internet identity. My projects do address the ...
Tags
web security
oauth
iam
authentication
http security
it-security
rest
saml
hypertext transfer protocol
identity and access management
openid connect
web service
authorization
representational state transfer
soa
ws-trust
sts
pki
json
web api
trust
ws-federation
identity 2.0
tls
soap
web
claims-based identity management
xml
api
wtls
identity management
wmlscrypt
wim
wpki
oidc
cardspace
user-centric identity
health care
federation
web services
openid
wsit
electronic case records
ehealth
id-wsf
pkcs#7/11
x509v3
wap security
ssl/tls
pkix
presence
instant messaging
real-time-communications
corporate network
cloud
scim
user-managed access
uma
cloud computing
security
sso
google
iot
internet-of-things
ua4c
claims-based identity
kerberos
wsfed
ace
ssl
information security
jax-ws
xacml
identity federation
ra
ca
x.509
cryptography
wap
transient
persistent
digital signature
non-repudiation
mashups
composite applications
identity- and access management
jwt
See more