IT security is about protecting information and information systems from unauthorized access and use.
Securing an IT infrastructure has many facets. They range from securing networks, cf., firewalls, intrusion detection, to securing computers, cf., antivirus software, and to securing code, cf. security bugs and flaws. IT security is about protecting information and information systems from unauthorized access and use. Confidentiality, integrity and availability of information are core goals. Besides IT security, other security terms that are often used include network security, computer security, web security, mobile security, and software security.
01/ 2009 – up to now
Contact: Johannes Sametinger
M. Biro , A. Mashkoor, J. Sametinger: Safety and security of cyber-physical systems, Journal Software Evolution Process 2022, November 2022, Doi: 10.1002/smr.2522
J. Bräuer, B. Gmeiner, and J. Sametinger, A Risk Assessment of Logical Attacks on a CEN/XFS-based ATM Platform, International Journal on Advances in Security, Vol. 9, No 3&4, pp. 122–132, ISSN 1942-2636, Dec. 2016.
International Journal on Advances in Security
J. Bräuer, B. Gmeiner, J. Sametinger: ATM Security - A Case Study of a Logical Risk Assessment, Proceedings of the Tenth International Conference on Software Engineering Advances (ICSEA 2015), Barcelona, Spain, November 15-20, 2015, (Best Paper Award), icsea_2015_13_40_10219
M. Riegler, J. Sametinger: Embedded Web Device Security, The Eighth International Conference on Emerging Security Information, Systems and Technologies, SECUREWARE, Lisbon, Portugal, November 16 - 20, 2014.
R. Maier, J. Sametinger: Profiles for Convenient Front-end Privacy, SEKE 2013, 25th International Conference on Software Engineering and Knowledge Engineering, Boston USA, June 27-29, 2013.
R. Schlöglhofer, J. Sametinger: Secure and Usable Authentication on Mobile Devices, MoMM2012 - 10th International Conference on Advances in Mobile Computing & Multimedia, Bali, Indonesia, December 22-26, 2012.
M. Kern, J. Sametinger: Permission Tracking in Android, UBICOMM 2012, Sixth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, ISBN: 978-1-61208-236-3, pp. 148-155, Barcelona, Spain, September 23-28, 2012.
A. Wiesauer, E. Artmann, J. Sametinger: Aus allen Wolken fallen - Risiken des Cloud Computings, lex:itec - Fachzeitschrift für Recht und Informationstechnologie, ISSN 1817-9150, Ausgabe 01/11, pp. 22-38, März 2011.
G. Draxler, J. Sametinger, A. Wiesauer: Electronic Payment and Online Gaming, 16th International Conference on Distributed Multimedia Systems, Oak Brook, USA, October 14-16, 2010.
A. Wiesauer, J. Sametinger: A Security Design Pattern Taxonomy based on Attack Patterns, ICETE 2009 - International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009.
M. Meike, J. Sametinger, A. Wiesauer: Security in Open Source Web Content Management Systems, IEEE Security & Privacy, vol. 7, no. 4, pp. 44-51, 2009.
S. Sageder, J. Sametinger, A. Wiesauer: Case Study: Using Digital Signatures for the Archival of Medical Records in Hospitals, CRiSIS 2008, 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008.