SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies. Within a network of more than 70 companies, 15 Austrian and international universities and research institutions, and many additional international research partners we jointly work on research challenges ranging from organizational to technical security to strengthen Europe’s Cybersecurity capabilities.
ISIS @ TU Wien IAIK @ TU Graz DKE @ Uni Wien NM @ WU Wien FH St. Pölten AIT

News

Stanford University

From January to March 2010, Stefan Fenz will work as a visiting scholar at the Stanford Center for Biomedical Informatics Research at Stanford University. He will develop and implement novel methods for the ontology-based generation of Bayesian networks.

D-A-CH Security

SBA Research co-organizes the conference with the University of Klagenfurt. See www.syssec.at/dachsecurity2010 for more details.

European Security Round Table

Today, Stefan Fenz attends the European Security Round Table in Brussels. The European Security Round Table is a neutral platform between the EU Institutions, NATO and other relevant actors to discuss European security and defence issues.

Talk on Applications Security

Edgar Weippl presents the opening talk at this year’s ADV security event (IT-Sicherheit für Fortgeschrittene).

Lange Nacht der Forschung 2009 – Review

LNF2009

112 People visited our information security-specific program at Lange Nacht der Forschung 2009. The program hosted by Secure Business Austria comprised privacy issues, wireless security, password security, and forensics. EVVA supported our program by presenting the latest lock innovations to our visitors.

COMET Decision: Secure Business Austria extended till 2014

We are happy to announce that our SBA2 proposal has been accepted by the jury. The research grants enable us to continue our research till 2014. German press releases can be found at APA and FFG.

Krems Security Conference – Talk on Database Forensics

Martin Mulazzani & Edgar Weippl, Aktuelle Herausforderungen in der Datenbankforensik (more information)

ACM Symposium on Applied Computing 2010

Our paper “Ontology-based Generation of IT-Security Metrics” has been accepted at the 25th ACM Symposium on Applied Computing (SAC’2010).

Lange Nacht der Forschung 2009

LNF2009

On November 7 2009 16:27 – 00:00 Secure Business Austria hosts an information security-specific program at Lange Nacht der Forschung. The program comprises live demonstrations and awareness training in the fields of

  • wireless security,
  • password security,
  • social engineering,
  • privacy,
  • lockpicking,
  • mobile storage security,
  • credit card fraud, and
  • digital forensics.

We invite everybody to join us at Favoritenstrasse 16 1040 Wien.

8. IKT-Sicherheitsseminar

SBA managing director Markus Klemen presents social engineering cases at this years’ “IKT-Sicherheitsseminar” of the Austrian Armed Forces Security Agency. See the program for further details.

Website Blockers

SBA managing director Markus Klemen was interviewed and cited in Wednesdays’ “Die Presse” concerning the organizational and technical limitations of website blockers. Link to the online version: http://diepresse.com/home/panorama/oesterreich/512034/index.do?from=suche.intern.portal

Presentation: Stoned Bootkit

Peter Kleissner presented his Stoned Bootkit and new research directions to circumvent full disk encryption.

Internet Security: the fight for website blockers

SBA managing director Markus Klemen was interviewed and cited in Sundays’ “Die Presse” concerning the technical difficulties behind DNS-based website blockers. Link to the online version: http://diepresse.com/home/techscience/internet/509459/index.do?from=suche.intern.portal

BPM’09

Today we attend the highly prestigious International Conference on Business Process Management (BPM’2009) and present our paper “Business Process-based Resource Importance Determination” in the main track.

SBA hosts IPICS Summer School

The IPICS academic summer school  is a two weeks course for Master`s students in their final year, PhD students and IT professionals interested in a comprehensive overview and broad coverage of recent developments in “Information and Communication Security”. Speakers include Prof. Preneel, Prof. Lopez, Prof. Samarati and many more.

Guest Lecture: Using security patterns to develop secure systems (Eduardo B. Fernandez)

Using security patterns to develop secure systems

Eduardo B. Fernandez

Florida Atlantic University

Boca Raton, FL, USA

http://www.cse.fau.edu/~ed

A security pattern is a special type of software architectural pattern that describes solutions to security problems. We describe our recent results in methodologies to apply security patterns, where we are now and where we are going. In particular we are working on:

Secure software development methodology—This is a general methodology to build secure systems. We have worked in the methodology itself and we are developing now specific aspects of it.

Modeling and Classification of security patterns—We have tried to provide a precise characterization of security patterns that can be used as a basis for classification. A good classification makes the application of the pattern much easier along the software lifecycle.

Misuse patterns– A misuse pattern describes, from the point of view of the attacker, how a type of attack is performed (what units it uses and how), analyzes the ways of stopping the attack by enumerating possible security patterns that can be applied for this purpose, and describes how to trace the attack once it has happened by appropriate collection and observation of forensics data. They can be used in the lifecycle to prevent the occurrence of known types of attacks.

Eduardo B. Fernandez (Eduardo Fernandez-Buglioni) is a professor in the Department of Computer Science and Engineering at Florida Atlantic University in Boca Raton, Florida. He has published numerous papers on authorization models, object-oriented analysis and design, and security patterns. He has written four books on these subjects, the most recent being a book on security patterns. He has lectured all over the world at both academic and industrial meetings. He has created and taught several graduate and undergraduate courses and industrial tutorials. His current interests include security patterns and web services security and fault tolerance. He holds a MS degree in Electrical Engineering from Purdue University and a Ph.D. in Computer Science from UCLA. He is a Senior Member of the IEEE, and a Member of ACM. He is an active consultant for industry, including assignments with IBM, Allied Signal, Motorola, Lucent, and others. More details can be found at http://www.cse.fau.edu/~ed

Gastvortrag: Schutz Privatsphäre bei der Weitergabe von persönlichen Daten in Geschäftsprozessen

Titel

===

Schutz Privatsphäre bei der Weitergabe von persönlichen Daten in Geschäftsprozessen

Abstract

=====

Der Schutz der Privatsphäre in Geschäftsprozessen für personalisierte Dienstleistungen basiert momentan auf das Vertrauen der Nutzer in die Diensteanbieter. Diese Geschäftsprozesse erfordern nicht nur eine Erhebung sondern auch eine Weitergabe persönlicher Daten ihrer Nutzer. Allerdings können Nutzer die Verarbeitung und Weitergabe ihrer Daten nicht kontrollieren.

Beispiele sind Kundenkartensysteme und medizinische Dienstleistungen mit der elektronischen Patientenakte.

Derzeit delegieren Nutzer ihre Privatsphäre an die Diensteanbieter, indem sie zu deren Datenschutzrichtlinie pauschal einwilligen und ihre Einhaltung jedoch nicht kontrollieren können. Gegenwärtige Mechanismen zum Schutz der Privatsphäre decken den Zugriff auf persönliche Daten bei ihrer Erhebung ab, jedoch nicht ihre Nutzung und damit deren Weitergabe. Der Vortrag stellt ein System mit einer nicht-verkettbaren Delegation von Rechten für den Datenzugriff und einem modifizierten digitalem Watermarkingschema zur nachvollziehbaren Durchsetzung dieser Rechte zur Datenweitergabe vor, so dass Nutzer den Diensteanbietern nicht mehr vertrauen müssen.

Bio

==

Dr. Sven Wohlgemuth promovierte bei Prof. Dr. Günter Müller am Institut für Informatik und Gesellschaft der Albert-Ludwigs-Universität Freiburg im Breisgau. Neben der Promotion war er Koordinator des Schwerpunktprogramms “Sicherheit in der Informations- und Kommunikationstechnik” der Deutschen Forschungsgemeinschaft (DFG) und der Arbeitsgruppe “Privacy in Business Processes” des europäischen Network of Excellence “Future of Identity in the Information Society (FIDIS)” des 6. Rahmenprogramms der Europäischen Union.

Derzeit ist er Gastwissenschaftler am National Institute of Informatics in Tokyo, Japan. Dort beschäftigt er sich mit der Durchsetzung von Obligationen zum Schutz der Privatsphäre bei der Weitergabe persönlicher Daten.

International Conference on Risks and Security of Internet and Systems 2009

Our paper “A Reference Model for Risk-Aware Business Process Management” has been accepted at the 4th International Conference on Risks and Security of Internet and Systems (CRISIS2009).

International Conference on Privacy, Security, Risk and Trust 2009

Our paper “Towards Automating Social Engineering Using Social Networking Sites” has been accepted at the International Conference on Privacy, Security, Risk and Trust (PASSAT2009).

EDMEDIA 2009

Two papers are presented at the EDMEDIA conference (“Integrated Approach for the Detection of Learning Styles and Affective States” and “Screen Recording for E-Learning”)

EDMEDIA tutorial and steering committee meeting

Together with Martin Ebner, Edgar Weippl presents a tutorial on e-learning at the ED-MEDIA conference; Edgar is also member of the steering committee.

New Castle University – Secure Business Austria Workshop

From 18th to 19th June 2009 Aad van Moorsel and Simon E. Parkin from Newcastle University will visit our research center. Our goal is to identify and initialize joint research projects between Newcastle University and Secure Business Austria in the field of economically justified security solutions.

On 18th June 2009 9am Aad van Moorsel and Simon E. Parkin will give a public talk on their Trust Economics project. Trust Economics is a research project, which is conducted jointly by Hewlett-Packard, Merrill-Lynch, Newcastle University, University College London and University of Bath. Its objective is to develop a methodology that allows companies to make decisions about security investments based on costs and benefits for the company. Aad van Moorsel and Simon Parkin will present their recent work on knowledge base support for IT security investment decisions. The distinguishing feature of the Trust Economics knowledge base is the inclusion of the human behavioral aspect in its underlying information security ontology. In addition to their recent research results and technology developments, we will discuss the rationale behind the Trust Economics project.

Secure Business Austria at Konkuk University

Stefan Fenz will hold a four week IT security course at the 2009 Konkuk University International Summer Program. Konkuk University, is one of the leading private universities in Korea, generally regarded as one of the top 10 universities in Korea out of over 370 universities and colleges.

ZIT Roundtable – Halwachs

Edgar Weippl takes part in the round-table discussion on innovation and knowledge transfer organized by ZIT.

Business Process Management Conference 2009

Our paper “Business Process-based Resource Importance Determination” has been accepted at the 7th International Conference on Business Process Management (BPM’2009).

Traditionally, the BPM conference attracts the outstanding researchers in the field and abides to the highest academic standards. BPM solicits original research papers that break new ground in or make significant novel contributions to the field. The acceptance rate in previous editions has been around 14%. (cf. http://www.bpm2009.org/)

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close