default search action
ISSE 2008: Madrid, Spain
- Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider:
ISSE 2008 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2008 Conference, 7-9 October 2008, Madrid, Spain. Vieweg+Teubner 2009, ISBN 978-3-8348-0660-4
Security Management and Economics of Security
- Lenka Fibíková, Roland Müller:
The Information Security Framework for Daimler Financial Services and its Implementation. 3-19 - Anas Tawileh, Jeremy Hilton, Stephen McIntosh:
Information Security Status in Organisations 2008. 20-29 - Ivonne Thomas, Michael Menzel, Christoph Meinel:
Quantified Trust Levels for Authentication. 30-38 - Manel Medina, Estíbaliz Delgado, Diego Fernández:
Identity Management in Open Environments. 39-44 - José Enrique López García, Carlos Alberto Gil García, Álvaro Armenteros Pacheco, Pedro Luis Muñoz Organero:
Identity management and privacy languages technologies: Improving user control of data privacy. 45-56 - Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. 57-76 - Eberhard von Faber:
How Economy and Society affect Enterprise Security Management. 77-83 - José de la Peña Muñoz:
Information Security Industry: State of the Art. 84-89
Privacy, Data Protection and Awareness
- Marie-Theres Tinnefeld:
Freedom and Security - Responses to the Threat of International Terrorism. 93-98 - Michele Bezzi, Jean-Christophe R. Pazzaglia:
The Anonymity vs. Utility Dilemma. 99-107 - Murdoch Watney:
Governmental Control of the Internet in addressing Law Enforcement and National Security. 108-118 - Anja Beyer:
Theft of Virtual Property - Towards Security Requirements for Virtual Worlds. 119-127
Trusted Computing and Biometrics
- Michael Willett, Dave Anderson:
Trusted Storage: Putting Security and Data Together. 131-138 - Klaus Kursawe, Stefan Katzenbeisser:
Trust in Consumer Electronics. 139-143 - Stephen Hanna:
NAC 2.0 - Unifying Network Security. 144-151 - Josef von Helden, Ingo Bente:
Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect. 152-162 - Christian Dietrich, Christian Rossow:
Empirical research of IP blacklists. 163-171 - Olimpia Olguín, Manel Medina:
GIDRE: Grid-based Detection Intrusion and Response Environment. 172-180 - Andreas Reisen:
Biometrics and ID Cards - Enablers for Personal Security. 181-185 - David Hernando, David Gómez, Javier Rodríguez Saeta, Pascual Ejarque, Javier Hernando:
Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases. 186-193
Web 2.0 Security and Large Scale Public Applications
- Guido von der Heidt:
Development and Implementation of an Encryption Strategy for a global Enterprise. 197-207 - Konstantin Hyppönen, Marko Hassinen, Elena Trichina:
Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool. 208-217 - Arshad Noor:
Symmetric Key Services Markup Language (SKSML). 218-230 - Ulrich Lang, Rudolf Schreiner:
Managing business compliance using model-driven security management. 231-241 - Christian Zipfel, Henning Daum, Gisela Meister:
Secure E-Business applications based on the European Citizen Card. 242-250 - Jon Ølnes, Anette Andresen, Stefano Arbia, Markus Ernst, Martin Hagen, Stephan Klein, Giovanni Manca, Adriano Rossi, Frank Schipplick, Daniele Tatti, Gesa Wessolowski, Jan Windheuser:
Electronic Signatures for Public Procurement across Europe. 251-261 - Detlef Houdeau:
Progress through uniformity. 262-267 - Elisa Vivancos:
PPs for applications with the Spanish National Electronic Identity Card. 268-277
Fraud Detection, Prevention and Critical Infrastructures
- Philip Hoyer:
OTP and Challenge/Response algorithms for financial and e-government identity assurance: current landscape and trends. 281-290 - Klaus Schmeh:
NSA Suite B and its significance for non-USA organisations. 291-295 - Stefan Hölzner, Jan Kästle:
Managing vulnerabilities and achieving compliance for Oracle databases in a modern ERP environment. 296-306 - María Luisa García Tallón:
Identity Theft in Electronic Financial Transactions The experience of the Central Bank of Spain. 307-312 - Fernando J. Sánchez Gómez, Miguel Ángel Abad Arranz:
The need for the Protection of Critical National Infrastructures. 313-318 - Bernhard M. Hämmerli, Henning H. Arendt:
Challenges for the Protection of Critical ICT-Based Financial Infrastructures. 319-326
Security for VoIP, Mobility and Web
- Andreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari:
Evaluating Measures and Countermeasures for SPAM over Internet Telephony. 329-340 - Peter Backs, Norbert Pohlmann:
Influence of Security Mechanisms on the Quality of Service of VoIP. 341-346 - Marc Sel, Stefaan Seys, Eric R. Verheul:
The security of mass transport ticketing systems. 347-356 - Walter Hinz:
Authentication for Web Services with the Internet Smart Card. 357-366 - Corrado Ronchi, Shukhrat Zakhidov:
Hardened Client Platforms for Secure Internet Banking. 367-379 - Helena Handschuh, Elena Trichina:
Securing Flash Technology: How Does It Look From Inside? 380-389
German Workshop: European Citizen Cards
- Matthias Büger:
Deployment of German Electronic Citizen Cards in Banking: Opportunities and Challenges. 393-397 - Georg E. Schäfer:
Security Requirements for One Stop Government. 398-405 - Thomas Walloschke:
Infrastructures and Middleware for the Application of eID Cards in eGovernment. 406-417 - Dennis Kügler:
Securing Contactless Chips with PACE. 418-423
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.