Time filter

Source Type

Vienna, Austria

Neubauer T.,Secure Business Austria | Stummer C.,University of Vienna
Information Technology and Management | Year: 2010

The manual composition of efficient combinations of Web services becomes almost impossible as the number of services increases dramatically. When determining an appropriate set of services, managers must take into consideration given business processes, business strategy and multiple Quality of Service (QoS) objectives while ensuring the cost-efficient usage of limited resources. Because the agility with which new business requirements are adapted has a major influence on business success and poor investment decisions may thus entail corporate failure, decision makers are experiencing growing pressure to prove the value of IT investments-but they often lack appropriate multicriteria decision support tools. This paper introduces a new decision support approach that more properly addresses these challenges. We implemented this approach into a tool and evaluated the performance of two popular methods (i.e., the Analytic Hierarchy Process and the Weighted Scoring Method) by means of a real-life case study in the social security sector. It turns out that the decision support system assists decision makers in identifying investments that more precisely target their company's business needs by allowing them to interactively determine and continually optimize service allocation according to the corporate business processes and multiple (strategic) objectives. © Springer Science+Business Media, LLC 2009. Source

Mladenow A.,Secure Business Austria | Novak N.M.,Vienna University of Technology | Strauss C.,University of Vienna
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2015

Search Engine Advertising has grown strongly in recent years and amounted to about USD 60 billion in 2014. Based on real-world data of online campaigns of 28 companies, we analyse the incident of a hacked campaign-account. We describe the occurred damage, i.e. (1) follow-up consequences of unauthorized access to the account of the advertiser, and (2) limited availability of short-term online campaigns. This contribution aims at raising awareness for the threat of hacking incidents during online marketing campaigns, and provides suggestions as well as recommendations for damage prevention, damage detection and damage limitation. © IFIP International Federation for Information Processing 2015. Source

Neubauer T.,Vienna University of Technology | Heurix J.,Secure Business Austria
5th International Conference on Systems, ICONS 2010 | Year: 2010

Digital identities and secure environments are a fundamental precondition for giving life to e-government, ehealth, and e-commerce. Whereas corporations are spending huge amounts on harmonizing identity management, and still fail, the average customer/citizen is left alone drowning in dozens of digital identities. This paper presents a roadmap for personal identity management. It highlights shortcomings of existing solutions, identifies major research challenges and gives an overview of steps that are necessary on the way towards an efficient solution for personal identity management. The benefits of increased usability and manageability are juxtaposed with privacy issues that potentially occur when a considerable quantity of functionality is concentrated in one single device. © 2010 IEEE. Source

Miksa T.,Secure Business Austria | Mayer R.,Secure Business Austria | Rauber A.,Vienna University of Technology
International Journal of Computational Science and Engineering | Year: 2015

High dependence on web services and service-oriented architecture affects not only business solutions, but also scientific research. Web services may be delivered by third parties, and thus are candidates for outsourcing. However, they represent a source of risks, which can jeopardise the robustness of processes. Hence, there is a need for actions which can contribute to the mitigation of possible threats to the continuity of processes. In this paper, risk affecting processes are classified, followed by a discussion about particular changes stemming from web services. Three distinct approaches allowing improvements are described: a newly proposed web services monitoring framework supported by a software solution, the concept of resilient web services, which specifies new design requirements for web services, and digital preservation strategies, which apart from long-term benefits can support sustainability of currently running processes. Copyright © 2015 Inderscience Enterprises Ltd. Source

Boeck B.,Secure Business Austria | Huemer D.,Vienna University of Technology | Tjoa A.M.,Vienna University of Technology
Proceedings - International Conference on Advanced Information Networking and Applications, AINA | Year: 2010

Trustable log data is essential in digital forensic investigations in order to allow reliable reconstruction of events. Existing solutions do not provide adequate protection, exposing the log-producing application to software-based attacks. In this paper we provide a solution based on Trusted Computing using a Trusted Platform Module (TPM) and AMD's Secure Virtual Machine technology (SVM). While current solutions only protect against manipulation of existing logs, we go one step further by establishing hardware-based trust in the log producing application. Our solution ensures confidentiality, integrity and non-repudiation during creation, storage and transmission of log data. © 2010 IEEE. Source

Discover hidden collaborations