SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Titel === Schutz Privatsphäre bei der Weitergabe von persönlichen Daten in Geschäftsprozessen Abstract ===== Der Schutz der Privatsphäre in Geschäftsprozessen für personalisierte Dienstleistungen basiert momentan auf das Vertrauen der Nutzer in die Diensteanbieter. Diese Geschäftsprozesse erfordern nicht nur eine… Read More
Our paper “A Reference Model for Risk-Aware Business Process Management” has been accepted at the 4th International Conference on Risks and Security of Internet and Systems (CRISIS2009).
Our paper “Towards Automating Social Engineering Using Social Networking Sites” has been accepted at the International Conference on Privacy, Security, Risk and Trust (PASSAT2009).
Two papers are presented at the EDMEDIA conference (“Integrated Approach for the Detection of Learning Styles and Affective States” and “Screen Recording for E-Learning”)
From 18th to 19th June 2009 Aad van Moorsel and Simon E. Parkin from Newcastle University will visit our research center. Our goal is to identify and initialize joint research projects between Newcastle University and Secure Business Austria in the field of economically justified security solutions. On 18th June… Read More
Stefan Fenz will hold a four week IT security course at the 2009 Konkuk University International Summer Program. Konkuk University, is one of the leading private universities in Korea, generally regarded as one of the top 10 universities in Korea out of over 370 universities and colleges.
Our paper “Business Process-based Resource Importance Determination” has been accepted at the 7th International Conference on Business Process Management (BPM’2009). Traditionally, the BPM conference attracts the outstanding researchers in the field and abides to the highest academic standards. BPM solicits original research papers that break new ground in or… Read More
Prof. Maria Damiani gave a talk on “Spatio-temporal access control: state-of-the-art and open issues”. Abstract In the last few years, a number of spatial and spatio-temporal access control models have been developed in the framework of pervasive computing and location-based services. The distinguishing feature of those models is… Read More
The best digitalization projects from business and administration were honoured at the eAward 2024 business prize ceremony and we are proud to announce that Shecurity - Hackerinnen Training won the eAward 2024 in the category "Education and Social"! ... ∞