SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies. Within a network of more than 70 companies, 15 Austrian and international universities and research institutions, and many additional international research partners we jointly work on research challenges ranging from organizational to technical security to strengthen Europe’s Cybersecurity capabilities.
ISIS @ TU Wien IAIK @ TU Graz DKE @ Uni Wien NM @ WU Wien FH St. Pölten AIT

SBA Research moved to a new location!

Our new address: Floragasse 7, 1040 Vienna, Austria Effective since: June 25, 2019 More at:


Database Forensic at the Security Forum in Hagenberg

Edgar Weippl gives a talk on Database Forensic at the Security Forum in Hagenberg.

Abstract: Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) timeline and restore deleted data. While this fact is well known for computer forensic and multiple tools to forensically analyze data exit, the systematic analysis of database systems has only recently begun.

Clearly, database system are bound to leave more extensive traces since they not only store a file but, in addition, need indexes, rollback segments and log files. In this tutorial we will cover the basics of forensic analysis particularly focusing on database systems.

AARIT and ERCIM Membership

Secure Business Austria is now member of AARIT ( and ERCIM (

Guest Lecture – Günter Müller

Günter Müller gave an excellent talk on compliance and risk management.

Springer Studies in Computational Intelligence

Our paper “An Evaluation of Technologies for the Pseudonymization of Medical Data” was accepted for publication.

International Journal of Business Process Management

Our paper “An Empirical Study about the Status of Business Process Management” was accepted for publication.

IEEE International Conference on Systems

We are attending the IEEE International Conference on Systems and present our latest research results regarding pseudonymization. We received the best paper award for the paper “Technologies for the Pseudonymization of Medical Data: A Legal Evaluation”.

Secure 2.0 – FIT-IT Award

We took the second place with the project Secure 2.0 (FIT-IT) in this year’s FIT-IT awards.

Secure 2.0
Secure 2.0 project aims to secure the Information Sharing on social
networks for individuals by proposing an innovative machine learning
technique for analysis of big social data. Web 2.0 has changed the
technological landscape of the Internet computing world today. The shift
from traditional web which is also known as Web 1.0 is forced by the
growing need for more efficient information sharing, collaboration and
business processes. This technological transition to Web 2.0 paradigm
also brings in new security and privacy concerns into existence, which
should protect the whole Rich Internet Application (RIA) components.

The Secure 2.0 project provides foundation components for information
extraction, analysis and visualization of Web 2.0 contents in order to
address the new security and privacy concerns of Web 2.0.

The project was funded by FIT-IT research program, which is an
initiative of the Austrian Federal Ministry of Transport, Innovation,
and Technology that focuses on high-quality research in the area of
information and communication technology.

Research lead : Dr. Amin Anjomshoaa

Guest Lecture – Ludwig Fuchs

Ludwig Fuchs ( gave an excellent talk on combining role mining and role engineering.

Guest Lecture – Stefan Sackmann

Stefan Sackmann gave a talk on risk management. We will start a collaboration with his group. Stefan Fenz will manage the joint research efforts.

Secure 2.0

Today, the FIT-IT project Secure 2.0 – Securing the Information Sharing on Web 2.0 has been officially launched at Secure Business Austria.

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.