ISSE 2006 — Securing Electronic Busines Processes Highlights of the Information Security Solutions Europe 2006 Conference /
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the...
Κύριοι συγγραφείς: | , , |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Wiesbaden :
Vieweg,
2006.
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- RFID, e-ID Cards, Trusted Computing, Interoperability
- Radio Frequency Identification (RFID) and Data Protection Legal Issues
- e-ID and Smartcards — Current Status, Hopeful Developments and Best Practices
- European Citizen Card Combined with Travel Document Function, Convergence or Divergence?
- Physical Unclonable Functions for enhanced security of tokens and tags
- Hardware Security Features for Secure Embedded Devices
- Security in Next Generation Consumer Electronic Devices
- Security Architecture for Device Encryption and VPN
- TPM Enterprise Key Management requires centralized Hardware-based Security
- Implementation of DRM Systems under the EU Legal Framework
- IT-Grundschutz: Two-Tier Risk Assessment for a Higher Efficiency in IT Security Management
- ISOIIEC 24727 — A Future Standard for Smart Card Middleware
- Information Security Standardization — the ETSI Perspective
- Digital Signatures without the Headaches
- Could Test Standards Help on the Way to Achieve Global e-Passport Interoperability?
- A New Standard Based Road to Interoperable Strong Authentication
- Identity Management, Biometrics, PKI-Solutions, Network Security
- Identifying Patterns of Federation Adoption
- Fidelity: Federated Identity Management Security based on Liberty Alliance on European Ambit
- Deflecting Active Directory Attacks
- Implementing role based access control — How we can do it better!
- Identity and Access Control — Demonstrating Compliance
- Robust and Secure Biometrics: Some Application Examples
- Selecting the Optimal Biometric 2-factor Authentication Method — a User’s Viewpoint
- A Face Recognition System for Mobile Phones
- Advanced certificate validation service for secure Service-Oriented Architectures
- An Introduction to Validation for Federated PKIs
- MADSig: Enhancing Digital Signature to Capture Secure Document Processing Requirements
- PKi Consolidation Project and Multiapplicative Smart Payment Cards
- Security Analysis and Configuration of Large Networks
- S-VPN Policy: Access List Conflict Automatic Analysis and Resolution
- Lock-Keeper: A New Implementation of Physical Separation Technology
- SPEECH: Secure Personal End-to-End Communication with Handheld
- Finding the Mobile Trusted Element
- Security Management, Applications
- Centrally Administered COIs Using Cross-Organizational Trust
- Improving Assurance of Information Security Rol
- Modelling the Economics of Free and Open Source Software Security
- Securing service-oriented applications
- A Service Oriented Trust Development Platform
- A Trust Label for Secure and Compliant e-ID Applications: The Belgian Experience
- Electronic signature in Italy after ten years of “running in”
- Awareness Raising, Compliance, Data Protection, Cyberspace Regulation
- Internet Early Warning System: The Global View
- IT Security Vulnerability and Incident Response Management
- Blending Corporate Governance with Information Security
- On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context
- Regulation of State Surveillance of the Internet
- How Can NRA Contribute to the Improvement of IT Security?
- Information Security Regulation: Tomorrow Never Dies?
- Introducing Regulatory Compliance Requirements Engineering
- Legal Issues in Secure Grid Computing Environments
- The Impact of Monitoring Technology on the Law.