SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies. Within a network of more than 70 companies, 15 Austrian and international universities and research institutions, and many additional international research partners we jointly work on research challenges ranging from organizational to technical security to strengthen Europe’s Cybersecurity capabilities.
ISIS @ TU Wien IAIK @ TU Graz DKE @ Uni Wien NM @ WU Wien FH St. Pölten AIT


Business Process Management Conference 2009

Our paper “Business Process-based Resource Importance Determination” has been accepted at the 7th International Conference on Business Process Management (BPM’2009).

Traditionally, the BPM conference attracts the outstanding researchers in the field and abides to the highest academic standards. BPM solicits original research papers that break new ground in or make significant novel contributions to the field. The acceptance rate in previous editions has been around 14%. (cf.

Prof. Maria Damiani visits Secure Business Austria

Prof. Maria Damiani gave a talk on “Spatio-temporal access control: state-of-the-art and open issues”.

In the last few years, a number of spatial and spatio-temporal access control models have been developed in the framework of pervasive computing and location-based services. The distinguishing feature of those models is that the access authorization is subordinated to the satisfaction of contextual conditions, such as spatial proximity or containment in certain spaces. For example, health records can be only accessed by personnel located in the hospital during working hours. In most cases those models extend RBAC to allow for the specification of simple constraints based on location and time which are then enforced upon users’ request. Many issues, however, remain to be investigated, for example the administration of spatio-temporal policies, the specification of usage control in mobile applications, the development of suitable architectures and the protection of privacy. In this talk, I will overview research in spatio-temporal access control and discuss a few open issues.

Prof. Daniel S. Yeung visits Secure Business Austria

Prof. Daniel S. Yeung gave a talk on “Sensitivity Based Generalization Error for Supervised Learning Problem with Applications in Model Selection and Feature Selection”.

Generalization error model provides a theoretical support for a classifier’s performance in terms of prediction accuracy. However, existing models give very loose error bounds. This explains why classification systems generally rely on experimental validation for their claims on prediction accuracy. In this talk we will revisit this problem and explore the idea of developing a new generalization error model based on the assumption that only prediction accuracy on unseen points in a neighborhood of a training point will be considered, since it will be unreasonable to require a classifier to accurately predict unseen points “far away” from training samples. The new error model makes use of the concept of sensitivity measure for an ensemble of multiplayer feedforward neural networks (Multilayer Perceptrons or Radial Basis Function Neural Networks). Two important applications will be demonstrated, model selection and feature reduction for RBFNN classifiers. A number of experimental results using datasets such as the UCI, the 99 KDD Cup, and text categorization, will be presented.

Database Forensic at the Security Forum in Hagenberg

Edgar Weippl gives a talk on Database Forensic at the Security Forum in Hagenberg.

Abstract: Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) timeline and restore deleted data. While this fact is well known for computer forensic and multiple tools to forensically analyze data exit, the systematic analysis of database systems has only recently begun.

Clearly, database system are bound to leave more extensive traces since they not only store a file but, in addition, need indexes, rollback segments and log files. In this tutorial we will cover the basics of forensic analysis particularly focusing on database systems.

AARIT and ERCIM Membership

Secure Business Austria is now member of AARIT ( and ERCIM (

Guest Lecture – Günter Müller

Günter Müller gave an excellent talk on compliance and risk management.

Springer Studies in Computational Intelligence

Our paper “An Evaluation of Technologies for the Pseudonymization of Medical Data” was accepted for publication.

International Journal of Business Process Management

Our paper “An Empirical Study about the Status of Business Process Management” was accepted for publication.

IEEE International Conference on Systems

We are attending the IEEE International Conference on Systems and present our latest research results regarding pseudonymization. We received the best paper award for the paper “Technologies for the Pseudonymization of Medical Data: A Legal Evaluation”.

Secure 2.0 – FIT-IT Award

We took the second place with the project Secure 2.0 (FIT-IT) in this year’s FIT-IT awards.

Guest Lecture – Ludwig Fuchs

Ludwig Fuchs ( gave an excellent talk on combining role mining and role engineering.

Guest Lecture – Stefan Sackmann

Stefan Sackmann gave a talk on risk management. We will start a collaboration with his group. Stefan Fenz will manage the joint research efforts.

Secure 2.0

Today, the FIT-IT project Secure 2.0 – Securing the Information Sharing on Web 2.0 has been officially launched at Secure Business Austria.

12th International Conference on Business Information Systems

Our paper “Ontological mapping of information security best-practice guidelines” has been accepted at the 12th International Conference on Business Information Systems.

4th ETSI Security Workshop

We are attending the 4th ETSI Security Workshop and present our latest information security risk management research results.

Guest Lecture – Robert Willison

15th of January 2009 10:00 at Secure Business Austria: “Understanding the perpetration of employee computer crime in the organizational context”

16th of January 2009 15:00 at Secure Business Austria: “Motivations for employee computer crime in the organizational context”

IEEE HICSS-42 Conference

We are attending the HICSS-42 conference and present our latest information security risk management research results.

ACM Symposium on Information, Computer and Communications Security

Our paper “Formalizing Information Security Knowledge” has been accepted at the ACM Symposium on Information, Computer and Communications Security 2009 (Project Details).

IEEE Sixth International Conference on Information Technology: New Generations

Our paper “Automated Risk and Utility Management” has been accepted at the IEEE International Conference on Information Technology: New Generations 2009.

FIT-IT Pathfinder Review

The FIT-IT Pathfinder project review is scheduled for the 21st of January 2009.

PIPE 2.0

The PIPE project has been extended to the next level. See the PIPE project description for further details.

Secure Business Austria / Security Research am CIO Kongress des LSZ

At the LSZ CIO Congress 2008, SBA Managing Director Markus Klemen will organize the area “Security / Risk” and will moderate the workshop “Change in IT-Security – A lookout”. Managing Partner Andreas Tomek will represent Security Research at the event.

Submission Deadline Oct 15 – ARES Conference

SBA organizes the ARES Conference ( This year’s conference will be held in Japan. In 2010 the conference will move back to Europe, where Vienna is the planned venue.

ARES aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.

ARES will emphasize the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc.

STRAW – Security Technology Active Watch

In October 2008, Edgar Weippl joined the STRAW project as an external expert.

STRAW stands for ‘Security Technology Active Watch‘. STRAW is a support action under the Security Research theme that aims at providing a European Service of Technology Watch on Security Technologies.

The consortium:

  • Atos Origin SAE
  • AeroSpace and Defence Industries Association
  • Thales Services S.AS € Stiftelsen SINTEF
  • Fraunhofer FHG
  • Instituto Nacional de Técnica Aeroespacia
  • Elsag Datamat S.p.A
  • Asociación de Empresas de Electrónica, Tecnologías de la Información y Telecomunicaciones de España (AETIC)
  • Fondazione Rosselli
  • European Organisation for Security (EOS)

The concept of STRAW is to bring together the defence and security research industry by a neutral coordination to ensure the awareness of underpinning technologies that make possible the implementation of civil security applica tions.

The target of STRAW is to stimulate the cooperation of providers and users f or civil security applications.


8.10.08: At the “Impulse08” events of the Austrian Computer Society (OCG) in Vienna, Graz and Salzburg, GM Markus Klemen talks about the challenges to IT-Security due to company employees.