Cargando…

ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference /

This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Sma...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Pohlmann, Norbert (Editor ), Reimer, Helmut (Editor ), Schneider, Wolfgang (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Wiesbaden : Vieweg+Teubner Verlag : Imprint: Vieweg+Teubner Verlag, 2007.
Edición:1st ed. 2007.
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Legal, Technical and Social Aspects of Security
  • Regulating Information Security: A Matter of Principle?
  • ISTPA Operational Analysis of International Privacy Requirements
  • The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet
  • Data Encryption on File Servers
  • Setting up an Effective Information Security Awareness Programme
  • Saferinternet.pl Project - Educational Activities for Internet Safety in Poland
  • Is Cyber Tribalism Winning Online Information Warfare?
  • Phishing Across Interaction Channels: Methods, Experience and Best Practice
  • IT-Security Beyond Borders - an Assessment of Trust Levels Across Europe
  • Analyzing and Improving the Security of Internet Elections
  • Remote Access Mechanics as a Source of Threats to Enterprise Network Infrastructure
  • "Private Investigation" in the Computer Environment: Legal Aspects
  • Identity, Information Security and Rights Management
  • Design Rationale behind the Identity Metasystem Architecture
  • Federated ID Management - Tackling Risk and Credentialing Users
  • Information Security Governance for Executive Management
  • Model Driven Security for Agile SOA-Style Environments
  • The Business Perspective on Roles Including Root Causes of Implementation Problems and Proven Ways to Overcome them
  • A Security Architecture for Enterprise Rights Management
  • Rights Management Technologies: A Good Choice for Securing Electronic Health Records?
  • Case Studies from Fuzzing Bluetooth, WiFi and WiMAX
  • Evaluation of the Possible Utilization of anti-spam Mechanisms Against spit
  • Modeling Trust Management and Security of Information
  • Smart Tokens, eID Cards, Infrastructure Solutions and Interoperability
  • Infrastructure for Trusted Environment: In Search of a Solution
  • Integrity Check of Remote Computer Systems Trusted Network Connect
  • Technical Guidelines for Implementation and Utilization of RFID-based Systems
  • High Density Smart Cards: New Security Challenges and Applications
  • ID Cards in Practice
  • Large Scale Fingerprint Applications: Which Technology Should be Used?
  • From the eCard-API-Framework Towards a Comprehensive eID-Framework for Europe
  • Making Digital Signatures Work across National Borders
  • Financial Fraud Information Sharing
  • Enterprise Key Management Infrastructure
  • Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays
  • Security Evaluation and Testing - Past, Present and Future
  • Economics of Security and PKI Applications
  • Managing Information Security in Small and Medium Sized Enterprises: A Holistic Approach
  • EKIAS - Success Criteria of PKI Implementations
  • Embedded PKI in Industrial Facilities
  • SIM-enabled Open Mobile Payment System Based on Nation-wide PKI
  • Evidence Record Syntax - a new International Standard for Long-Term Archiving of Electronic Documents and Signed Data
  • PKI and Entitlement - Key Information Security Management Solutions for Business and IT Compliance
  • Future Diffusion of PK1-Technology - A German Delphi Study
  • The Introduction of Health Telematics in Germany
  • The German Identity Card - Concepts and Applications
  • Infrastructures for Identification and Identity Documents
  • The Security Infrastructure of the German Core Application in Public Transportation
  • Applications of Citizen Portals
  • Virtual Post Office in Practice.