The digital preservation problem is well-understood for query-centric information scenarios but has been less explored for scenarios where the important digital information to be preserved is the execution context within which data is processed, analysed, transformed and rendered. Furthermore, preservation is often considered as a set of activities carried out… Read More
Digital preservation (DP) offers the economic and social benefits associated with the long-term preservation of information, knowledge and know-how for re-use by current as well as later generations. However, digital preservation has a great problem, namely that preservation support structures are built on projects which are short lived and is… Read More
The tremendous power and speed of current search engines to respond, almost instantaneously to millions of user queries on a daily basis is one of the greatest successes of the past decade. While this technology empowers users need to extract relevant information from the hundreds of thousands of terabytes of… Read More
Andreas Rauber has been very successful. He brought several new EU projects to the center: APARSEN, TIMBUS and Mumia. Moreover, we will start with INMOTOS and we hope to attract one or two ERCIM fellows. …more information will be posted soon…… Read More
Elsevier Advanced Technologies publishes 8 issues of Computers & Security (COSE) annually; the journal began publication in 1981, and is concluding publication of volume 29. It is the oldest journal in print in the area of computing and information security and privacy. Beginning in 1983, COSE became the official… Read More
The six papers in this special issue focus on availability, reliability, and security. Some of the topics covered include prevention of identity theft, biometric technology and authentication, and security considerations for RF identification. Guest editors: Ravi Sandhu, A Min Tjoa, Edgar Weippl. (more…)… Read More
Our article “Verification, Validation, and Evaluation in Information Security Risk Management” (Authors: Stefan Fenz and Andreas Ekelhart) got accepted at IEEE Security & Privacy. Check out the preprint at the IEEE Digital Library. Abstract: Over the last four decades, various information security risk management (ISRM) approaches have emerged. However,… Read More
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.