Daniela Pöhn

Daniela Pöhn

Dr. rer. nat.
Universität der Bundeswehr München

About

25
Publications
1,934
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
42
Citations
Introduction
Main research focus is on a Framework for Identity Management, including reference architecture, processes, and more. I additionally work on Cyber Security Training.
Additional affiliations
June 2018 - May 2021
Universität der Bundeswehr München
Position
  • PostDoc Position
January 2017 - May 2018
Fraunhofer Institute for Applied and Integrated Security
Position
  • Senior Researcher
September 2012 - December 2016
Leibniz-Rechenzentrum
Position
  • Research Assistant
Education
September 2012 - December 2016
Ludwig-Maximilians-University of Munich
Field of study
  • Computer Science
October 2009 - March 2012
FernUniversität in Hagen
Field of study
  • Computer Science

Publications

Publications (25)
Conference Paper
User authentication is necessary for the majority of online services. If users fail to authenticate due to the loss of an authentication factor, fallback processes allow users to regain access to their accounts. However, most of the proposed and deployed fallback methods have substantial weaknesses that degrade security, e.g., guessable security qu...
Conference Paper
Identity management refers to the technology and policies for the identification, authentication, and authorization of users in computer networks. Identity management is therefore fundamental to today’s IT ecosystem. At the same time, identity management systems, where digital identities are managed, pose an attractive target for attacks. With the...
Article
Full-text available
The COVID-19 pandemic helped countries to increase the use of their mobile eID solutions. These are based on traditional identity management systems, which suffer from weaknesses, such as the reliance on a central entity to provide the identity data and the lack of control of the user over her or his data. The introduction of self-sovereign identit...
Preprint
Full-text available
With the pandemic of COVID-19, people around the world increasingly work from home. Each natural person typically has several digital identities with different associated information. During the last years, various identity and access management approaches have gained attraction, helping for example to access other organization's services within tr...
Chapter
With the pandemic of COVID-19, people around the world increasingly work from home. Each natural person typically has several digital identities with different associated information. During the last years, various identity and access management approaches have gained attraction, helping for example to access other organizations’ services within tr...
Article
Identity and access management (I&AM) plays a crucial role in today’s IT infrastructure. In order to access a service, the user needs to authenticate. I&AM maintains attributes, credentials, roles, and permissions for an identifier, which is, e.g., linked to a human person. The variety of approaches to solve I&AM makes it hard to compare or even co...
Chapter
People around the world stay in contact with their families, friends, and colleagues by exchanging text and multimedia data online. This would not be possible without digital identities, which in turn necessitates Identity and Access Management (I&AM). Each natural person, legal entity, and device can have several digital identities with different...
Preprint
Full-text available
The lack of guided exercises and practical opportunities to learn about cybersecurity in a practical way makes it difficult for security experts to improve their proficiency. Capture the Flag events and Cyber Ranges are ideal for cybersecurity training. Thereby, the participants usually compete in teams against each other, or have to defend themsel...
Chapter
This paper presents a comprehensive classification of identity management approaches. The classification makes use of three axes: topology, type of user, and type of environment. The analysis of existing approaches using the resulting identity management cube (IMC) highlights the trade-off between user control and trust in attributes. A comparative...
Conference Paper
Full-text available
The lack of guided exercises and practical opportunities to learn about cybersecurity in a practical way makes it difficult for security experts to improve their proficiency. Capture the Flag events and Cyber Ranges are ideal for cybersecurity training. Thereby, the participants usually compete in teams against each other, or have to defend themsel...
Conference Paper
Identity and access management (I&AM) is the umbrella term for managing users and their permissions. It is required for users to access different services. These services can either be provided from their home organization, like a company or university, or from external service providers, e. g., cooperation partners. I&AM provides the management of...
Conference Paper
Awareness and knowledge management are key components to achieve a high level of information security in organizations. However, practical evidence suggests that there are significant discrepancies between the typical elements of security awareness campaigns, the decisions made and goals set by top-level management, and routine operations carried o...
Conference Paper
Cooperative behavior of automated traffic participants is one next step towards the goals of reducing the number of traffic fatalities and optimizing traffic flow. The notification of a traffic participant’s intentions and coordination of driving strategies increase the reaction time for safety functions and allow a foresighted maneuver planning. W...
Conference Paper
Full-text available
We present the concept and design of Dynamic Automated Metadata Exchange (DAME) in Security Assertion Markup Language (SAML) based user authentication and authorization infrastructures. This approach solves the real-world limitations in scalability of pre-exchanged metadata in SAML-based federations and inter-federations. The user initiates the met...
Article
Accessing remote IT services through identity federations (IFs) is based on solid technical protocols such as the Security Assertion Markup Language (SAML) and OpenID Connect. However, reliable delegated user authentication and authorization also pose organizational challenges regarding the quality management of user data. Level of Assurance (LoA)...
Conference Paper
Access to remote IT services through identity federations (IFs) has solid technical foundations such as the Security Assertion Markup Language (SAML). However, reliable delegated user authentication and authorization also pose organizational challenges regarding the quality management of user data. Level of Assurance (LoA) concepts have been adapte...
Conference Paper
We present the concept and design of Géant-TrustBroker, a new service to facilitate multi-tenant ICT service user authentication and authorization (AuthNZ) management in large-scale eScience infrastructures that is researched and implemented by the pan-European research and education network, Géant. Géant-TrustBroker complements eduGAIN, a successf...

Network

Cited By

Projects

Projects (2)
Project
As part of the research project DISPUT (Digital Identities with Self-Sovereign Identity Management: Processes and Technologies), the team at the Professorship for IT Security for Software and Data at the Universität der Bundeswehr München deals with the question of how digital identities will be operated and established in eGovernment in the future.
Project
concordia-h2020.eu