SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
From 18th to 19th June 2009 Aad van Moorsel and Simon E. Parkin from Newcastle University will visit our research center. Our goal is to identify and initialize joint research projects between Newcastle University and Secure Business Austria in the field of economically justified security solutions. On 18th June… Read More
Stefan Fenz will hold a four week IT security course at the 2009 Konkuk University International Summer Program. Konkuk University, is one of the leading private universities in Korea, generally regarded as one of the top 10 universities in Korea out of over 370 universities and colleges.
Our paper “Business Process-based Resource Importance Determination” has been accepted at the 7th International Conference on Business Process Management (BPM’2009). Traditionally, the BPM conference attracts the outstanding researchers in the field and abides to the highest academic standards. BPM solicits original research papers that break new ground in or… Read More
Prof. Maria Damiani gave a talk on “Spatio-temporal access control: state-of-the-art and open issues”. Abstract In the last few years, a number of spatial and spatio-temporal access control models have been developed in the framework of pervasive computing and location-based services. The distinguishing feature of those models is… Read More
Prof. Daniel S. Yeung gave a talk on “Sensitivity Based Generalization Error for Supervised Learning Problem with Applications in Model Selection and Feature Selection”. Abstract Generalization error model provides a theoretical support for a classifier’s performance in terms of prediction accuracy. However, existing models give very loose error bounds. Read More
Edgar Weippl gives a talk on Database Forensic at the Security Forum in Hagenberg. Abstract: Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) timeline and restore deleted data. While this fact… Read More