SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies. Within a network of more than 70 companies, 15 Austrian and international universities and research institutions, and many additional international research partners we jointly work on research challenges ranging from organizational to technical security to strengthen Europe’s Cybersecurity capabilities.
ISIS @ TU Wien IAIK @ TU Graz DKE @ Uni Wien NM @ WU Wien FH St. Pölten AIT



We are attending CCS 2010 in Chicago and present a poster and a paper at the AISec Workshop.

Japan‐Austria Joint Workshop on ‘ICT’

Edgar Weippl gives a talk on information security at the joint workshop organized by FWF and JST in Tokyo.

ISecLab Blog

The researchers of ISecLab, among them Engin Kirda, just launched a nice blog;

D-A-CH Security

On Sep 21 and 22, SBA and the Vienna University of Technology host the D-A-CH Security conference. The proceedings have been edited by Peter Schartner and Edgar Weippl (more…)

Edgar Weippl joined the editorial board of Computers & Security (COSE)

Elsevier Advanced Technologies publishes 8 issues of Computers & Security (COSE) annually; the journal began publication in 1981, and is concluding publication of volume 29.  It is the oldest journal in print in the area of computing and information security and privacy.   Beginning in 1983, COSE became the official journal of the International Federation for Information Processing,  Technical Committee 11 on Security and Protection in Information Processing Systems (IFIP TC-11). Gene Spafford is the new editor in chief and he made some updates of the editorial board.

Security in Social Networks

Sep 14, Edgar Weippl presents a summary of SBA’s research on social networks in Zurich (Der Standard)

Wiener Forschungsfest

SBA is part of the Wiener Forschungsfest, an outreach program to make research results accessible to the general public (more…)

IEEE Transactions SMC-C: Special Issue on Availability, Reliability, and Security

The six papers in this special issue focus on availability, reliability, and security. Some of the topics covered include prevention of identity theft, biometric technology and authentication, and security considerations for RF identification. Guest editors: Ravi Sandhu, A Min Tjoa, Edgar Weippl. (more…)

Verification, Validation, and Evaluation in Information Security Risk Management

Our article “Verification, Validation, and Evaluation in Information Security Risk Management” (Authors: Stefan Fenz and Andreas Ekelhart) got accepted at IEEE Security & Privacy. Check out the preprint at the IEEE Digital Library.

Over the last four decades, various information security risk management (ISRM) approaches have emerged. However, there is a lack of sound verification, validation, and evaluation methods for these approaches. While restrictions, such as the impossibility of measuring exact values for probabilities and follow-up costs, obviously exist, verification, validation, and evaluation of research is essential in any field, and ISRM is no exception. Individual approaches exist, but so far there is no systematic overview of the available methods. In this article we survey verification, validation and evaluation methods referenced in ISRM literature and discuss in which ISRM phases the methods should be applied. The selection of appropriate methods is demonstrated with a potential real-world example. This systematic analysis draws conclusions on the current status of ISRM verification, validation and evaluation and can serve as a reference for researchers and users of ISRM approaches who aim to establish trust in their results.

Markus Huber at CMU

Markus Huber will work this summer on his research in Social Networking Privacy and Security at Carnegie Mellon University with Alessandro Acquisti.

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.