As business processes gain more importance in today's business environments, their unimpeded execution is crucial for a company's success. Corporate decision makers are faced with a wide spectrum of potential risks on the one hand and a plenitude of security safeguards on the other hand. Existing approaches for the evaluation of security measures often neglect the consideration of business needs under multiple objectives. This paper gives an overview of the Atana approach that supports decision makers with the elicitation of security safeguards based on corporate business processes and according to multiple objectives. It focuses on the description of a prototype by means of a case study from the social security sector and, thus, provides decision makers with an instrument for interactively exploring different security investment scenarios, while the system guarantees at the same time that only efficient solutions are considered.
Die Digitalisierung vollzieht sich auch in der Landwirtschaft in rasanter Geschwindigkeit. Die erheblichen Risiken bei der Anwendung von Lösungen, die in ihren Grundlagen und Auswirkungen oft nicht vollständig verstanden werden, bergen jedoch ein hohes Bedrohungspotenzial für die Resilienz und Nachhaltigkeit der Landwirtschaft. Dieser Artikel zeigt den Einsatz von Digitalen Zwillingen anhand von zwei ausgewählten Versuchsfarmen in Österreich. Das Projekt verfolgt das Ziel, durch den Aufbau modernster Versuchsfarmen als „Digitale Zwillinge“ eine zukunftsweisende Versuchsinfrastruktur für interdisziplinäre Forschung und Lehre auf internationalem Niveau zu etablieren. Es beinhaltet zudem ein Framework zur Integration von Anforderungen gemäß verschiedener Kriterien, um ein nachhaltiges Design von Digitalen Zwillingen in der Landwirtschaft zu ermöglichen.
In the last two decades, the biannual ECPPM (European Conference on Product and Process Modelling) conference series has provided a unique platform for the presentation and discussion of the most recent advances with regard to the ICT (Information and Communication Technology) applications in the AEC/FM (Architecture, Engineering, Construction and
Sharing personal information benefits both data providers and data consumers in many ways. Recent advances in sensor networks and personal archives enable users to record personal information including emails, social networking activities, or life events (life logging). These information objects are usually privacy sensitive and thus need to be protected adequately when being shared. In this work, we present a lightweight pseudonymization framework which allows users to benefit from sharing their personal information while still preserving their privacy. Furthermore, this approach increases the data owners' awareness of what information they are sharing, thus rendering data publishing more transparent.
Federated Health Information Systems (FHIS) integrate autonomous information systems of participating health care providers to facilitate the exchange of Electronic Health Records (EHR), which improve the quality and efficiency of patients' care.
Business processes are of major importance in today's business environments, and their unimpeded execution is crucial for a company's success. Since business processes are permanently exposed to a variety of threats, organizations are forced to pay attention to security issues. Although the security of business activities is widely recognized as important, business processes and security aspects are often developed separately and without considering different objectives. This paper proposes a methodology that supports corporate decision makers with the elicitation of security requirements based on business processes, for the analysis of threats and vulnerabilities, and for the selection of appropriate security measures.
This contribution presents a comprehensive summary of the first phase of the research project SEMERGY, aimed towards exploring the potential of Semantic Web Technologies to accommodate and support building performance assessment and optimization. Previous research on the adoption of performance assessment tools by the design community suggested that the extensive amount of time, effort and expertise required to accumulate and provide input information for various performance evaluations, limits the application of such tools for improvement of building design in early stages. Even the most rudimentary performance inquiries require large quantities of data regarding the properties of incorporated building materials and systems, climatic conditions, building codes, etc. Much of this data is available on the internet, yet its use is severely hampered by lack of appropriate structure and format. The SEMERGY research and development project was conceived with the aim of acquiring and utilizing the abundant, yet ill-structured building-related data available on the World Wide Web, through implementation of Semantic Web Technologies. This web-based data is utilized within a flexible, multi-objective design optimization environment, incorporating various performance assessment applications. The present contribution describes some of the major challenges of the project, discusses the adopted approaches, and presents SEMERGY's main features.
The average costs of data leakage are steadily on the rise. As a consequence, several data security and access control mechanisms have been introduced, ranging from data encryption to intrusion detection or role-based access control, doing a great work in protecting sensitive information. However, the majority of these concepts are centrally controlled by administrators, who are one of the major threats to corporate security. This work presents a security protocol for data privacy that is strictly controlled by the data owner. Therefore, we integrate pseudonymization and encryption techniques to create a methodology that uses pseudonyms as access control mechanism, protects secret cryptographic keys by a layer-based security model, and provides privacy-preserving querying.