Customer Comments & Projects

Industry – Reference Projects in the Area of Security


Deutsche Telekom AG - Support for Large-Scale Router Checking Campaigns


Testo AG - Measurement Data Systems that are Compliant with 21 CFR Part 11

Research – Reference Projects in the Area of Security


IUNO - National Reference Project for IT Security in Industry 4.0


SECCRIT - SEcure Cloud computing for CRitical infrastructure IT


BMWi project regarding research and evaluation of Big Data solutions for companies aimed at optimizing production while complying with data security aspects


Industrial Data Space - Digital Sovereignty over Data and Services


EMERGENT is a consortium project in the context of the Software-Cluster. In EMERGENT, Fraunhofer IESE is performing research on cross-organizational deployment of data usage control. Fundamental methods, techniques, algorithms, and data structures for emergent software are being examined and developed.

  • more information

ATTRACT – Security for Distributed Data

SINNODIUM — Adaptive and Understandable Security for Mobile Devices

In the consortium project SINNODIUM (“SoftwareINNOvationen für das DIgitale UnternehMen”, i.e., Software Innovations for the Digital Company), small and medium-sized as well as large software companies are collaborating with research partners to develop integrated usage scenarios for emergent business software in the areas Smart Retail (trade), Smart Production (industry), and Smart Services (services and logistics). The project is an undertaking in the context of the Software-Cluster, a consortium of 32 partners from industry and research that aims to create an infrastructure for the market launch of business software services that can be combined with each other in a simple and easy manner. In the context of this project, the research performed by Fraunhofer IESE focuses, among other things, on methods and techniques for securely integrating mobile devices into business software, addressing primarily the aspects context awareness and usability by the user. The adaptation of security policies on the basis of context information (e.g., “in the office”, “traveling”, “at the customer”, or “privately at home”) is being examined in order to be able to prevent unintentional or malicious disregard of security policies more effectively. A mobile device could, for example, automatically detect that the company premises are being left and then block all data that are only intended for internal use within the company. In addition, ways and means are being studied to improve the understandability and usability of security requirements for mobile devices particularly for non-IT experts, starting with intuitive metaphors for the available security options via catchy wording of security policies to tools that facilitate the creation and evaluation of security policies and allow even the casual user to use these comfortably.

  • more information

MASTER Project

MASTER is a joint project that was funded in the context of the European Union’s 7th Research Framework. In the MASTER project, methodologies and infrastructures were developed that simplify the monitoring, enforcement, and verification of compliance with security policies. This is particularly applicable in highly dynamic service-oriented architectures where the issue is to implement business processes in individual, cross-domain and iterative contexts. In MASTER, the focus was on security requirements with regard to IT support for the application of security policies to a company’s business processes. From the perspective of compliance with security policies, MASTER adds value primarily regarding two aspects. First, it offers an approach for the implementation and maintenance of verifiable security mechanisms in order to achieve and assure compliance with a set of security requirements. Second, it offers concrete implementation of this approach, particularly for service-oriented systems.