Hi, I am Jörg Daubert, Professor for Computer Science and Information Management at the Provadis School of International Management and Technology in Frankfurt (Main), Germany.
I studied computer science with a focus on IT management until 2011. In 2016, I obtained my Ph.D. (Dr. rer. nat.) with the thesis on “Anonymous Publish/Subscribe Overlays” at Technische Universität Darmstadt. Since 2014 I worked as acting Area Head of the “Secure Smart Infrastructures” group; since 2016 as a joint PostDoc and Area Head of the “Smart Protection in Infrastructures and Networks” (SPIN) group with 9 researchers within the Telecooperation Lab under Prof. Mühlhäuser in Darmstadt. From 7.2016 till 12.2018, I coordinated the DFG Research Training Group (doctoral college) “Privacy and Trust for Mobile Users” with 11 Ph.D. student positions.
Between 2019 and 2021, I worked as Visiting Associate Professor (dt. Vertretungsprofessor) at the Department of Mathematics and Computer Science at the Philipps-Universität Marburg, Germany.
I also gained experience in industrial research for 4 years as a Junior Researcher (later Researcher) at AGT International, a major industry player in the Internet of Things and data analytics. In addition, I am a freelancing IT consultant since 2011.
Professor an der Provadis Hochschule, 2021
Provadis School of International Management and Technology AG / Hessisches Ministerium für Wissenschaft und Kunst
Ph.D. in Computer Science, Cyber Security, 2016
Technische Universität Darmstadt
M.Sc. in Computer Science, IT-Management, 2011
Technische Universität Darmstadt
B.Sc. in Computer Science, 2008
Technische Universität Darmstadt
Recent and upcoming
Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP’s Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient reasoning, as to its merits.In this work, we investigate the merits of using open distributed ledgers (ODLs), such as the one implemented by blockchain technology, for securing TM systems for authentication. We formally model such systems, and explore how blockchain can help mitigate attacks against them. After formal argumentation, we conclude that in the context of Trust Management for authentication, blockchain technology, and ODLs in general, can offer considerable advantages compared to previous approaches. Our analysis is, to the best of our knowledge, the first to formally model and argue about the security of TM systems for authentication, based on blockchain technology. To achieve this result, we first provide an abstract model for TM systems for authentication. Then, we show how this model can be conceptually encoded in a blockchain, by expressing it as a series of state transitions. As a next step, we examine five prevalent attacks on TM systems, and provide evidence that blockchain-based solutions can be beneficial to the security of such systems, by mitigating, or completely negating such attacks.
This thesis improves the state-of-the-art in anonymous Pub/Sub in several areas. In particular, the thesis addresses the following aspects of constructing anonymous Pub/Sub systems: (i.) Building blocks that reduce the complexity of constructing anonymous Pub/Sub systems are proposed; (ii.) methods for anonymously establishing Pub/Sub overlay networks are presented; (iii.) a method for inter-overlay optimization to distribute load is introduced; (iv.) methods for optimizing overlays regarding anonymity are proposed, and (v.) anonymity attacks and countermeasures are presented. […]
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting scalable and extensible programming, and optimal spatial, temporal, and control-flow decoupling of distributed components. Publish-subscribe middleware and methods were extended towards supporting security, in particular confidentiality, and increased availability, yet a few prior works addressed anonymity of participants. Anonymity of senders and receivers may however be crucial, e.g., for supporting freedom of expression in regimes where political repression and censorship prevail. In this article, we review basic security and privacy requirements and introduce a new attacker model based on statistical disclosure, used to challenge anonymity. We elaborate on design options for privacy-preserving publish-subscribe systems and present a novel system that leverages peer-to-peer networking concepts; this novel approach protects subscriber anonymity by means of Probabilistic Forwarding (PF) and through a novel so-called Shell Game (SG) algorithm. We verify our solution against the requirements and provide a simulation-based analysis of the effectiveness of our approaches in light of our attacker model. The results show that the SG algorithm efficiently protects subscriber anonymity, and that anonymity sets can be adjusted via PF.
Jobs and positions
Responsibilities include:
Responsibilities include:
Responsibilities include:
Responsibilities include:
Responsibilities include:
Responsibilities include:
Responsibilities include:
Responsibilities include:
Responsibilities include:
Services
Doctoral College Privacy and Trust for Mobile Users Barcamp 2019
Summer School Economics of IT Security and Privacy (SISS 2017)
ACM International Conference on Availability, Reliability and Security (ARES 2024)
ACM International Conference on Availability, Reliability and Security (ARES 2023)
ACM International Conference on Availability, Reliability and Security (ARES 2022)
ACM International Conference on Availability, Reliability and Security (ARES 2021)
ACM International Conference on Availability, Reliability and Security (ARES 2020)
ACM International Conference on Availability, Reliability and Security (ARES 2019)
IARIA International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE 2019)
SCS Summer Simulation Conference (SummerSim 2019)
IEEE/IFIP International Symposium on Integrated Network Management (IM 2019)
ACM International Conference on Availability, Reliability and Security (ARES 2018)
ACM International Conference on Availability, Reliability and Security (ARES 2021)
ACM International Conference on Availability, Reliability and Security (ARES 2020)
ACM International Conference on Availability, Reliability and Security (ARES 2019)