Information Security Research Group

Research

The group is performing research in the fields of information system security risk management, personal data management, and privacy leakage management. The main research areas include (but not limited to) secure business process management, model-driven security, the security risk management in the blockchain applications, privacy management in the intelligent transportation systems and blockchain-based applications, secure and private data analysis and visualisation for the privacy and security by design systems.


RESEARCH PRESENTATIONS


DEFENDED PhD THESIS


PhD RESEARCH

  • Business Process Privacy Analysis
    • PhD student: Jake Tom
      • Matulevičius R., Tom J., Kala K., Sing E. (2020) A Method for Managing GDPR Compliance in Business Processes. In: Herbaut N., La Rosa M. (eds) Advanced Information Systems Engineering. CAiSE 2020. Lecture Notes in Business Information Processing, vol 386. Springer, Cham. https://doi.org/10.1007/978-3-030-58135-0_9
      • Pullonen P.; Tom J.; Matulevičius, R.; Toots, A. (2019). Privacy-Enhanced BPMN: Enabling Data Privacy in Business Process Models. International Journal on Software and Systems Modeling (SoSyM), 18(6): 3235-3264
      • Toots, A., Tuuling, R., Yerokhin, M., Dumas M., García-Bañuelos L., Laud P., Matulevičius R., Pankova A., Pettai M., Pullonen P., Tom J.: Business Process Privacy Analysis in Pleak. Informatik Spektrum 42, 354–355 (2019). https://doi.org/10.1007/s00287-019-01204-y
      • Toots, A., Tuuling, R., Yerokhin, M., Dumas M., García-Bañuelos L., Laud P., Matulevičius R., Pankova A., Pettai M., Pullonen P., Tom J.: (2019) Business Process Privacy Analysis in Pleak. In: Hähnle R., van der Aalst W. (eds) Fundamental Approaches to Software Engineering. FASE 2019. Lecture Notes in Computer Science, vol 11424. Springer, Cham. https://doi.org/10.1007/978-3-030-16722-6_18
      • Tom J., Assessing and Improving Compliance to Privacy Regulations in Business Processes. CAiSE 2018 Doctoral Consortium, 55-63
      • Tom J., Sing E., Matulevičius R. (2018) Conceptual Representation of the GDPR: Model and Application Directions. In: Zdravkovic J., Grabis J., Nurcan S., Stirna J. (eds) Perspectives in Business Informatics Research. BIR 2018. Lecture Notes in Business Information Processing, vol 330. Springer, Cham. https://doi.org/10.1007/978-3-319-99951-7_2
  • A Reference Model for Security Risk Management of the Blockchain-based Applications
    • PhD student: Mubashar Iqbal
      • Düdder B, Fomin V, Gürpinar T, Henke M, Iqbal M, Janavičienė V, Matulevičius R, Straub N and Wu H (2021) Interdisciplinary Blockchain Education: Utilizing Blockchain Technology From Various Perspectives. Front. Blockchain 3:578022. https://doi.org/10.3389/fbloc.2020.578022
      • Iqbal, M.; Matulevičius, R. (2020). Corda Security Ontology: Example of Post-Trade Matching and Confirmation. Baltic Journal of Modern Computing, 8 (4), 638−674. https://doi.org/10.22364/bjmc.2020.8.4.11.
      • Iqbal M., Matulevičius R. (2020) Managing Security Risks in Post-Trade Matching and Confirmation Using CorDapp. In: Robal T., Haav HM., Penjam J., Matulevičius R. (eds) Databases and Information Systems. DB&IS 2020. Communications in Computer and Information Science, vol 1243. Springer, Cham. https://doi.org/10.1007/978-3-030-57672-1_24
      • Iqbal M., A Reference Model for Security Risk Management of the Blockchain-based Applications. CAiSE (Doctoral Consortium) 2020: 44-52
      • Mammadzada K., Iqbal M., Milani F., García-Bañuelos L., Matulevičius R. (2020) Blockchain Oracles: A Framework for Blockchain-Based Applications. In: Asatiani A. et al. (eds) Business Process Management: Blockchain and Robotic Process Automation Forum. BPM 2020. Lecture Notes in Business Information Processing, vol 393. Springer, Cham. https://doi.org/10.1007/978-3-030-58779-6_2
      • Iqbal M; Matulevičius R. (2019). Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk. In: Business Process Management: Blockchain and Central and Eastern Europe Forum (13−28). Springer, Cham. (Lecture Notes in Business Information Processing).10.1007/978-3-030-30429-4_2.
      • Iqbal M.; Matulevičius R. (2019). Blockchain-Based Application Security Risks: A Systematic Literature Review. In: Proper H., Stirna J. (Ed.). Advanced Information Systems Engineering Workshops (176−188). Springer, Cham. (Lecture Notes in Business Information Processing).
  • An Approach for Continuous Research and Innovation of Security Risk Management in the IoT Systems
    • PhD student: Abasi-amefon Affia
      • Malina L., Dzurenda P., Ricci S., Hajny J., Srivastava G., Matulevicius R., Affia A.-A. O., Laurent M., Sultan N. H., Tang Q. (2021): Post-Quantum Era Privacy Protection for Intelligent Infrastructures. IEEE Access 9: 36038-36077
      • Affia A.-a. O., Matulevičius R., Nolte A. (2020), Security Risk Management in E-commerce Systems: A Threat-driven Approach. Baltic Journal of Modern Computing, Vol. 8 (2020), No. 2, pp. 213-240
      • Affia A.O., Nolte A., Matulevičius R. (2020) Developing and Evaluating a Hackathon Approach to Foster Cyber Security Learning. In: Nolte A., Alvarez C., Hishiyama R., Chounta IA., Rodríguez-Triana M., Inoue T. (eds) Collaboration Technologies and Social Computing. CollabTech 2020. Lecture Notes in Computer Science, vol 12324. Springer, Cham. https://doi.org/10.1007/978-3-030-58157-2_1
      • Affia AA.O., Matulevičius R., Nolte A. (2019) Security Risk Management in Cooperative Intelligent Transportation Systems: A Systematic Literature Review. In: Panetto H., Debruyne C., Hepp M., Lewis D., Ardagna C., Meersman R. (eds) On the Move to Meaningful Internet Systems: OTM 2019 Conferences. OTM 2019. Lecture Notes in Computer Science, vol 11877. Springer, Cham. https://doi.org/10.1007/978-3-030-33246-4_18
  • National Information Security Management System Development
    • PhD student (external): Mari Seeba