Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Weippl, Edgar
SBA Research
Vienna, Austria
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Edgar R. Weippl holds a MS and a Ph.D. in Computer Science, and an MA in Business Administration. He has taught courses on computer security at the University of Linz (Austria), The Polytechnic University (Hagenberg, Austria), Beloit College (Wisconsin, USA) and the University of Vienna (Austria).

His general areas of interest are security and e-learning. Specifically, his work focuses on security in e-learning (http://www.e-learning-security.org). E-learning can be considered as a special form of e-business. The good involved is digital content that has to be distributed, maintained, and updated. Moreover, the value of this good has to be adequately protected from unauthorized use and modification, without preventing students from using it in a flexible way.

The goal of Weippl's research is to analyze the requirements of using e-learning content, which emerge from both the technical interactions between systems and the social interactions of individual students and faculty. The complexity of such cooperative systems often necessitates new methodological and theoretical directions, encompassing both technically sound solutions and user-centered design.

When trying to increase user acceptance, a standard approach taken by many e-learning researchers and vendors is to incorporate interactivity and to improve multimedia capabilities of the system. Although these features may contribute to the success of e-learning systems, Weippl considers security as the crucial part when it comes to enhancing user acceptance. The reason why security can be seen as an enabling technology in this context is that people often refrain from using systems that they do not trust. When analyzing the requirements of security in complex cooperative systems, he has drawn data from the risk analysis of several previous projects touching this issue. The goal of security in e-learning is to protect authors' e-learning content from copyright infringements, to protect teachers from students who may undermine their evaluation system by cheating, and to protect students from being too closely monitored by their teachers when using the software. Since these intertwined requirements are not met by existing systems, new approaches are needed.

Scholarly activities such as giving tutorials at renowned conferences (for instance, ED-MEDIA) and serving as a reviewer for scientific journals (including IEEE Internet, where he was mentioned as an outstanding reviewer in 2000,) play a major role in Weippl's daily work. He also serves on the editorial board of JISE.

Currently, Weippl is creating a chapter on security in e-learning in a multi-university e-learning project (http://www.planet-et.at). He has presented tutorials at various conferences, and actively participates in the scientific community. Previously, he worked for three years in a non-profit research organization focusing on security.

Weippl spends his leisure time exploring underwater worlds with his scuba diving wife Kathrin, and--like many Austrians-- skiing and snowboarding in the Alps.

 
 
Options:
Date Reviewed  
 
1
- 10 of 81 reviews

   
  Security requirements engineering: designing secure socio-technical systems
Dalpiaz F., Paja E., Giorgini P., The MIT Press, Cambridge, MA, 2016. 224 pp.  Type: Book (978-0-262034-21-0)

Dalpiaz et al. set out to address both students and practitioners with this book....

Oct 27 2016  
   Automatic extraction of indicators of compromise for web applications
Catakoglu O., Balduzzi M., Balzarotti D.  WWW 2016 (Proceedings of the 25th International Conference on the World Wide Web, Montréal, Québec, Canada, Apr 11-15, 2016) 333-343, 2016.  Type: Proceedings

Small, harmless scripts can help identify compromised websites that have remained undetected for years. By analyzing external components used by attackers to make a compromised page run smoothly, for example JavaScript libraries or scr...

Sep 8 2016  
  Obfuscation: a user’s guide for privacy and protest
Brunton F., Nissenbaum H., The MIT Press, Cambridge, MA, 2015. 136 pp.  Type: Book (978-0-262029-73-5)

On its first page, the book makes a strong point about wanting to start a revolution: “not a big revolution--at least, not at first.” Throughout the book, the authors explore how obfuscation has been, is, a...

May 20 2016  
  On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment
Pék G., Lanzi A., Srivastava A., Balzarotti D., Francillon A., Neumann C.  ASIA CCS 2014 (Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, Kyoto, Japan, Jun 4-6, 2014) 305-316, 2014.  Type: Proceedings

In recent years, virtual machines (VMs) have become clearly very important for the computing infrastructure of companies. It is therefore not surprising that attacks on VMs have increased. The paper looks at threats to, and defenses of...

Oct 8 2014  
  Security concepts for the dynamics of autonomous vehicle networks
Xue M., Wang W., Roy S. Automatica (Journal of IFAC) 50(3): 852-857, 2014.  Type: Article

The basic idea of the paper is to look at whether an attacker who measures vehicle motions locally can estimate the full network’s state. In a double-integrator-network (DIN) model there are nodes with sensors that take local...

Sep 25 2014  
   FireDroid: hardening security in almost-stock Android
Russello G., Jimenez A., Naderi H., van der Mark W.  ACSAC 2013 (Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, LA, Dec 9-13, 2013) 319-328, 2013.  Type: Proceedings

This paper proposes a policy-based framework to enforce security policies by intercepting system calls to the Linux kernel beneath the Android operating system (OS). By using this approach it is possible to detect security breaches by ...

May 22 2014  
  Digital forensics processing and procedures: meeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements
Watson D., Jones A., Syngress Publishing, Waltham, MA, 2013. 880 pp.  Type: Book (978-1-597497-42-8)

Digital forensics is a branch of forensic science that focuses on investigating and recovering digital media, often connected with computer crimes. This book is a guide for establishing a digital forensics laboratory that complies with...

Feb 19 2014  
  A model-based approach to self-protection in computing system
Chen Q., Abdelwahed S., Erradi A.  CAC 2013 (Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference, Miami, FL, Aug 5-9, 2013) 1-10, 2013.  Type: Proceedings

An autonomous security management system that aims to detect, analyze, and react to attacks in an automated fashion is the focus of this paper....

Dec 16 2013  
  Protecting grids from cross-domain attacks using security alert sharing mechanisms
Syed R., Syrame M., Bourgeois J. Future Generation Computer Systems 29(2): 536-547, 2013.  Type: Article

The authors of this paper address the problem of security management in multi-administrative grid computing networks. In these grid networks, nodes belonging to different administrative domains have different security policies but can ...

Jun 12 2013  
  Push- and pull-based epidemic spreading in networks: thresholds and deeper insights
Xu S., Lu W., Xu L. ACM Transactions on Autonomous and Adaptive Systems 7(3): 1-26, 2012.  Type: Article

The authors of this paper first analyze recent work on the epidemic spreading of malware in arbitrary networks, noting that all previous studies only considered push-based infection (where infected hosts actively infect neighbors). The...

Mar 14 2013  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy