|
|
|
|
| Edgar R. Weippl holds a MS and a Ph.D. in Computer Science, and an MA in Business Administration. He has taught courses on computer security at the University of Linz (Austria), The Polytechnic University (Hagenberg, Austria), Beloit College (Wisconsin, USA) and the University of Vienna (Austria). His general areas of interest are security and e-learning. Specifically, his work focuses on security in e-learning (http://www.e-learning-security.org). E-learning can be considered as a special form of e-business. The good involved is digital content that has to be distributed, maintained, and updated. Moreover, the value of this good has to be adequately protected from unauthorized use and modification, without preventing students from using it in a flexible way. The goal of Weippl's research is to analyze the requirements of using e-learning content, which emerge from both the technical interactions between systems and the social interactions of individual students and faculty. The complexity of such cooperative systems often necessitates new methodological and theoretical directions, encompassing both technically sound solutions and user-centered design. When trying to increase user acceptance, a standard approach taken by many e-learning researchers and vendors is to incorporate interactivity and to improve multimedia capabilities of the system. Although these features may contribute to the success of e-learning systems, Weippl considers security as the crucial part when it comes to enhancing user acceptance. The reason why security can be seen as an enabling technology in this context is that people often refrain from using systems that they do not trust. When analyzing the requirements of security in complex cooperative systems, he has drawn data from the risk analysis of several previous projects touching this issue. The goal of security in e-learning is to protect authors' e-learning content from copyright infringements, to protect teachers from students who may undermine their evaluation system by cheating, and to protect students from being too closely monitored by their teachers when using the software. Since these intertwined requirements are not met by existing systems, new approaches are needed. Scholarly activities such as giving tutorials at renowned conferences (for instance, ED-MEDIA) and serving as a reviewer for scientific journals (including IEEE Internet, where he was mentioned as an outstanding reviewer in 2000,) play a major role in Weippl's daily work. He also serves on the editorial board of JISE. Currently, Weippl is creating a chapter on security in e-learning in a multi-university e-learning project (http://www.planet-et.at). He has presented tutorials at various conferences, and actively participates in the scientific community. Previously, he worked for three years in a non-profit research organization focusing on security. Weippl spends his leisure time exploring underwater worlds with his scuba diving wife Kathrin, and--like many Austrians-- skiing and snowboarding in the Alps. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 10
reviews
|
|
|
|
|
|
|
|
Automatic extraction of indicators of compromise for web applications Catakoglu O., Balduzzi M., Balzarotti D. WWW 2016 (Proceedings of the 25th International Conference on the World Wide Web, Montréal, Québec, Canada, Apr 11-15, 2016) 333-343, 2016. Type: Proceedings
Small, harmless scripts can help identify compromised websites that have remained undetected for years. By analyzing external components used by attackers to make a compromised page run smoothly, for example JavaScript libraries or scr...
|
Sep 8 2016 |
|
|
|
|
|
|
FireDroid: hardening security in almost-stock Android Russello G., Jimenez A., Naderi H., van der Mark W. ACSAC 2013 (Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, LA, Dec 9-13, 2013) 319-328, 2013. Type: Proceedings
This paper proposes a policy-based framework to enforce security policies by intercepting system calls to the Linux kernel beneath the Android operating system (OS). By using this approach it is possible to detect security breaches by ...
|
May 22 2014 |
|
|
|
|
|
|
Popular and/or prestigious? Measures of scholarly esteem Ding Y., Cronin B. Information Processing and Management: an International Journal 47(1): 80-96, 2011. Type: Article
In the research community, an author’s popularity may be different from his or her prestige, according to Ding and Cronin. They distinguish between popularity--how often an author is cited--and prestige&...
|
Jan 3 2011 |
|
|
|
|
|
|
On lightweight mobile phone application certification Enck W., Ongtang M., McDaniel P. CCS 2009 (Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, Nov 9-13, 2009) 235-245, 2009. Type: Proceedings
Enck, Ongtang, and McDaniel present a methodology for certifying mobile phone applications during the installation process. During the installation process, the application is classified according to its behavior and possibly suspiciou...
|
Jun 4 2010 |
|
|
|
|
|
|
Compact and anonymous role-based authorization chain Yao D., Tamassia R. ACM Transactions on Information and System Security 12(3): 1-27, 2009. Type: Article
Yao and Tamassia argue that role-based delegation raises privacy concerns because the identity of users may be sensitive information, especially in e-commerce, e-medicine, and peer-to-peer (P2P) file sharing. They propose an anonymous-...
|
Jul 27 2009 |
|
|
|
|
|
|
Software security: building security in McGraw G., Addison-Wesley Professional, Boston, MA, 2006. 448 pp. Type: Book (9780321356703), Reviews: (4 of 4)
Software errors are the most prominent source of security flaws. In both the design and implementation phases, there are typical errors that software engineers make. This book’s goal is to teach readers how these errors c...
|
Jan 24 2008 |
|
|
|
|
|
|
Detecting unusual email communication Keila P., Skillicorn D. Collaborative research (Proceedings of the 2005 Conference of the Centre for Advanced Studies on Collaborative Research, Toronto, Ontario, Canada, Oct 17-20, 2005) 117-125, 2005. Type: Proceedings
Keila and Skillicorn present an interesting study in which they analyze 500,000 emails of Enron employees. This large corpus of emails is freely available for download at http://www.cs.cmu.edu/~enron/. Building on previous research, th...
|
Jun 21 2006 |
|
|
|
|
|
|
An approach to cooperative updates of XML documents in distributed systems Bertino E., Ferrari E., Mella G. Journal of Computer Security 13(2): 191-242, 2005. Type: Article
Today, people collaborate around the world, and they cooperatively write documents. When many people work on a document, an access control model that supports a fine level of granularity is essential. Moreover, some steps in the workfl...
|
Sep 28 2005 |
|
|
|
|
|
|
Traducement: a model for record security Walcott T., Bishop M. ACM Transactions on Information and System Security 7(4): 576-590, 2004. Type: Article
Walcott and Bishop describe a security model that addresses the need for the digital signing of government documents, so that document authors and the people who sign the document can be clearly established. The authors summarize other...
|
May 24 2005 |
|
|
|
|
|
|
The art and science of computer security Bishop M., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002. 1120 pp. Type: Book (9780201440997), Reviews: (1 of 2)
Bishop has long worked in computer security research, and has profited from collaborating with other well-known researchers. The book is a truly comprehensive work on this topic. Written as a textbook, it can be read in various ways ac...
|
Apr 21 2003 |
|
|
|
|
|
|
|
|
|
|
|