ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference /
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Sma...
Κύριοι συγγραφείς: | , , |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Wiesbaden :
Vieweg,
2007.
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Legal, Technical and Social Aspects of Security
- Regulating Information Security: A Matter of Principle?
- ISTPA Operational Analysis of International Privacy Requirements
- The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet
- Data Encryption on File Servers
- Setting up an Effective Information Security Awareness Programme
- Saferinternet.pl Project — Educational Activities for Internet Safety in Poland
- Is Cyber Tribalism Winning Online Information Warfare?
- Phishing Across Interaction Channels: Methods, Experience and Best Practice
- IT-Security Beyond Borders — an Assessment of Trust Levels Across Europe
- Analyzing and Improving the Security of Internet Elections
- Remote Access Mechanics as a Source of Threats to Enterprise Network Infrastructure
- “Private Investigation” in the Computer Environment: Legal Aspects
- Identity, Information Security and Rights Management
- Design Rationale behind the Identity Metasystem Architecture
- Federated ID Management — Tackling Risk and Credentialing Users
- Information Security Governance for Executive Management
- Model Driven Security for Agile SOA-Style Environments
- The Business Perspective on Roles Including Root Causes of Implementation Problems and Proven Ways to Overcome them
- A Security Architecture for Enterprise Rights Management
- Rights Management Technologies: A Good Choice for Securing Electronic Health Records?
- Case Studies from Fuzzing Bluetooth, WiFi and WiMAX
- Evaluation of the Possible Utilization of anti-spam Mechanisms Against spit
- Modeling Trust Management and Security of Information
- Smart Tokens, eID Cards, Infrastructure Solutions and Interoperability
- Infrastructure for Trusted Environment: In Search of a Solution
- Integrity Check of Remote Computer Systems Trusted Network Connect
- Technical Guidelines for Implementation and Utilization of RFID-based Systems
- High Density Smart Cards: New Security Challenges and Applications
- ID Cards in Practice
- Large Scale Fingerprint Applications: Which Technology Should be Used?
- From the eCard-API-Framework Towards a Comprehensive eID-Framework for Europe
- Making Digital Signatures Work across National Borders
- Financial Fraud Information Sharing
- Enterprise Key Management Infrastructure
- Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays
- Security Evaluation and Testing — Past, Present and Future
- Economics of Security and PKI Applications
- Managing Information Security in Small and Medium Sized Enterprises: A Holistic Approach
- EKIAS — Success Criteria of PKI Implementations
- Embedded PKI in Industrial Facilities
- SIM-enabled Open Mobile Payment System Based on Nation-wide PKI
- Evidence Record Syntax — a new International Standard for Long-Term Archiving of Electronic Documents and Signed Data
- PKI and Entitlement — Key Information Security Management Solutions for Business and IT Compliance
- Future Diffusion of PK1-Technology — A German Delphi Study
- The Introduction of Health Telematics in Germany
- The German Identity Card — Concepts and Applications
- Infrastructures for Identification and Identity Documents
- The Security Infrastructure of the German Core Application in Public Transportation
- Applications of Citizen Portals
- Virtual Post Office in Practice.