ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conference /

This book presents the most interesting talks given at ISSE 2009 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Economics of Security and Identity Management - Security Services and Large Scale Public Applications -...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Pohlmann, Norbert (Επιμελητής έκδοσης), Reimer, Helmut (Επιμελητής έκδοσης), Schneider, Wolfgang (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Wiesbaden : Vieweg+Teubner, 2010.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Microsoft Sponsoring Contribution
  • Claims and Identity: On-Premise and Cloud Solutions
  • Economics of Security and Identity Management
  • Measuring Information Security: Guidelines to Build Metrics
  • Demystifying SAP security
  • The ISACA Business Model for Information Security: An Integrative and Innovative Approach
  • ICT Systems Contributing to European Secure-by-Design Critical Infrastructures
  • ROI, Pitfalls and Best Practices with an Enterprise Smart Card Deployment
  • A General Quality Classification System for eIDs and e-Signatures
  • Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals
  • Security Services and Large Scale Public Applications
  • User and Access Management in Belgian e-Government
  • PKI – Crawling Out of the Grave & Into the Arms of Government
  • Entitlement Management: Ready to Enter the IdM Mainstream
  • Secure E-Mail Communication across Company Boundaries Experiences and Architectures
  • Voice Biometrics as a Way to Self-service Password Reset
  • Security Requirements Specification in Process-aware Information Systems
  • Privacy, Data Protection and Awareness
  • Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home
  • Social Engineering hits Social Commerce
  • How to Establish Security Awareness in Schools
  • Privacy and Security – a Way to Manage the Dilemma
  • Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing Environment
  • User Privacy in RFID Networks
  • Web Sessions Anomaly Detection in Dynamic Environments
  • Standards and technical Solutions
  • KryptoNAS: Open source based NAS encryption
  • Secure Network Zones
  • ETSI Specifications for Registered E-Mail REM
  • Acceptance of Trust Domains in IT-Infrastructures
  • Proposal for an IT Security Standard for Preventing Tax Fraud in Cash Registers
  • The Operational Manager – Enemy or Hero of Secure Business Practice?
  • Secure Software, Trust and Assurance
  • A Structured Approach to Software Security
  • Using Compilers to Enhance Cryptographic Product Development
  • Why Secure Coding is not Enough: Professionals’ Perspective
  • Proactive Security Testing and Fuzzing
  • Protecting Long Term Validity of PDF documents with PAdES-LTV
  • RE-TRUST: Trustworthy Execution of SW on Remote Untrusted Platforms
  • Future of Assurance: Ensuring that a System is Trustworthy
  • A Taxonomy of Cryptographic Techniques for Securing Electronic Identity Documents.