Günter Müller gave an excellent talk on compliance and risk management.
Our paper “An Evaluation of Technologies for the Pseudonymization of Medical Data” was accepted for publication.
Our paper “An Empirical Study about the Status of Business Process Management” was accepted for publication.
We are attending the IEEE International Conference on Systems and present our latest research results regarding pseudonymization. We received the best paper award for the paper “Technologies for the Pseudonymization of Medical Data: A Legal Evaluation”.
We took the second place with the project Secure 2.0 (FIT-IT) in this year’s FIT-IT awards.
Secure 2.0 project aims to secure the Information Sharing on social
networks for individuals by proposing an innovative machine learning
technique for analysis of big social data. Web 2.0 has changed the
technological landscape of the Internet computing world today. The shift
from traditional web which is also known as Web 1.0 is forced by the
growing need for more efficient information sharing, collaboration and
business processes. This technological transition to Web 2.0 paradigm
also brings in new security and privacy concerns into existence, which
should protect the whole Rich Internet Application (RIA) components.
The Secure 2.0 project provides foundation components for information
extraction, analysis and visualization of Web 2.0 contents in order to
address the new security and privacy concerns of Web 2.0.
The project was funded by FIT-IT research program, which is an
initiative of the Austrian Federal Ministry of Transport, Innovation,
and Technology that focuses on high-quality research in the area of
information and communication technology.
Research lead : Dr. Amin Anjomshoaa
Ludwig Fuchs (http://www-ifs.uni-regensburg.de/index.php?id=34) gave an excellent talk on combining role mining and role engineering.
Stefan Sackmann gave a talk on risk management. We will start a collaboration with his group. Stefan Fenz will manage the joint research efforts.
Today, the FIT-IT project Secure 2.0 – Securing the Information Sharing on Web 2.0 has been officially launched at Secure Business Austria.
Our paper “Ontological mapping of information security best-practice guidelines” has been accepted at the 12th International Conference on Business Information Systems.
We are attending the 4th ETSI Security Workshop and present our latest information security risk management research results.