Threat detection systems collect and analyze a large amount of security data logs for detecting potential attacks. Since log data from enterprise systems may contain sensitive and personal information access should be limited to the data relevant to the task at hand as mandated by data protection regulations. To this end, data need to be pre-processed (anonymized) to eliminate or obfuscate the sensitive information that is not-strictly necessary for the task. Additional security/accountability measures may be also applied to reduce the privacy risk, such as logging the access to the personal data or imposing deletion obligations. Anonymization reduces the privacy risk, but it should be carefully applied and balanced with utility requirement...
The security and privacy research attempts to expose potential risks of adversaries and to prevent t...
We discuss the challenge of achieving an auditable key management for cryptographic access control t...
The importance of privacy has been growing steadily for over 25 years. Increasingly popularareas (su...
Threat detection systems collect and analyze a large amount of security data logs for detecting pote...
Intrusion and threat detection systems analyze large amount of security-related data logs for detect...
Intrusion and threat detection systems analyze large amount of security-related data logs for detect...
Risk-aware access control systems grant or deny access to resources based on the notion of risk. It ...
Access control systems safeguard the touchy information's from unauthenticated clients. Be that as i...
An immense amount of data is produced every day thus creating a global digital economy that relies p...
An incessant rhythm of data breaches, data leaks, and privacy exposure highlights the need to improv...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
Increasingly, advanced analytics methods – artificial intelligence/machine learning – are being used...
Risk-based authentication (RBA) extends authentication mechanisms to make them more robust against a...
The 2019 7th International Conference in Software Engineering Research and Innovation (CONISOFT), Me...
It seems generally accepted that the major threat for company security occurs from within the organi...
The security and privacy research attempts to expose potential risks of adversaries and to prevent t...
We discuss the challenge of achieving an auditable key management for cryptographic access control t...
The importance of privacy has been growing steadily for over 25 years. Increasingly popularareas (su...
Threat detection systems collect and analyze a large amount of security data logs for detecting pote...
Intrusion and threat detection systems analyze large amount of security-related data logs for detect...
Intrusion and threat detection systems analyze large amount of security-related data logs for detect...
Risk-aware access control systems grant or deny access to resources based on the notion of risk. It ...
Access control systems safeguard the touchy information's from unauthenticated clients. Be that as i...
An immense amount of data is produced every day thus creating a global digital economy that relies p...
An incessant rhythm of data breaches, data leaks, and privacy exposure highlights the need to improv...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
Increasingly, advanced analytics methods – artificial intelligence/machine learning – are being used...
Risk-based authentication (RBA) extends authentication mechanisms to make them more robust against a...
The 2019 7th International Conference in Software Engineering Research and Innovation (CONISOFT), Me...
It seems generally accepted that the major threat for company security occurs from within the organi...
The security and privacy research attempts to expose potential risks of adversaries and to prevent t...
We discuss the challenge of achieving an auditable key management for cryptographic access control t...
The importance of privacy has been growing steadily for over 25 years. Increasingly popularareas (su...