Sachar Paulus / Norbert Pohlmann / Helmut Reimer (Hgg.)Highlights of the Information Security Solutions Europe 2006 Conference
ISSE 2006 Securing Electronic Business Processes
Highlights of the Information Security Solutions Europe 2006 Conference
Herausgegeben:Paulus, Sachar; Pohlmann, Norbert; Reimer, Helmut
Sachar Paulus / Norbert Pohlmann / Helmut Reimer (Hgg.)Highlights of the Information Security Solutions Europe 2006 Conference
ISSE 2006 Securing Electronic Business Processes
Highlights of the Information Security Solutions Europe 2006 Conference
Herausgegeben:Paulus, Sachar; Pohlmann, Norbert; Reimer, Helmut
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that…mehr
Andere Kunden interessierten sich auch für
- ISSE 2011 Securing Electronic Business Processes53,49 €
- ISSE 2012 Securing Electronic Business Processes41,99 €
- E-Business and Telecommunications41,99 €
- Kurt Bauknecht / Sanjay Kumar Madria / Günther Pernul (eds.)Electronic Commerce and Web Technologies83,99 €
- Smart Grid and Innovative Frontiers in Telecommunications41,99 €
- Sokratis Katsikas / Javier Lopez / Günther Pernul (eds.)Trust and Privacy in Digital Business42,99 €
- Weidong Kou / Yelena Yesha / Chung J. Tan (eds.)Topics in Electronic Commerce42,99 €
-
-
-
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes.
The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information.
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2006.
The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information.
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2006.
Produktdetails
- Produktdetails
- Verlag: Vieweg+Teubner / Vieweg+Teubner Verlag
- Artikelnr. des Verlages: 85030009, 978-3-8348-0213-2
- 2006
- Seitenzahl: 496
- Erscheinungstermin: 10. Oktober 2006
- Englisch
- Abmessung: 244mm x 170mm x 27mm
- Gewicht: 848g
- ISBN-13: 9783834802132
- ISBN-10: 3834802131
- Artikelnr.: 21874719
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Verlag: Vieweg+Teubner / Vieweg+Teubner Verlag
- Artikelnr. des Verlages: 85030009, 978-3-8348-0213-2
- 2006
- Seitenzahl: 496
- Erscheinungstermin: 10. Oktober 2006
- Englisch
- Abmessung: 244mm x 170mm x 27mm
- Gewicht: 848g
- ISBN-13: 9783834802132
- ISBN-10: 3834802131
- Artikelnr.: 21874719
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Prof. Dr. Sachar Paulus is Chief Security Officer of SAP, Walldorf, Germany. Prof. Dr. Norbert Pohlmann is Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen, Germany. Prof. Dr. Helmut Reimer is Chief Executive Officer of TeleTrusT, Germany.
RFID, e-ID Cards, Trusted Computing, Interoperability.- Radio Frequency Identification (RFID) and Data Protection Legal Issues.- e-ID and Smartcards - Current Status, Hopeful Developments and Best Practices.- European Citizen Card Combined with Travel Document Function, Convergence or Divergence?.- Physical Unclonable Functions for enhanced security of tokens and tags.- Hardware Security Features for Secure Embedded Devices.- Security in Next Generation Consumer Electronic Devices.- Security Architecture for Device Encryption and VPN.- TPM Enterprise Key Management requires centralized Hardware-based Security.- Implementation of DRM Systems under the EU Legal Framework.- IT-Grundschutz: Two-Tier Risk Assessment for a Higher Efficiency in IT Security Management.- ISOIIEC 24727 - A Future Standard for Smart Card Middleware.- Information Security Standardization - the ETSI Perspective.- Digital Signatures without the Headaches.- Could Test Standards Help on the Way to Achieve Global e-Passport Interoperability?.- A New Standard Based Road to Interoperable Strong Authentication.- Identity Management, Biometrics, PKI-Solutions, Network Security.- Identifying Patterns of Federation Adoption.- Fidelity: Federated Identity Management Security based on Liberty Alliance on European Ambit.- Deflecting Active Directory Attacks.- Implementing role based access control - How we can do it better!.- Identity and Access Control - Demonstrating Compliance.- Robust and Secure Biometrics: Some Application Examples.- Selecting the Optimal Biometric 2-factor Authentication Method - a User's Viewpoint.- A Face Recognition System for Mobile Phones.- Advanced certificate validation service for secure Service-Oriented Architectures.- An Introduction to Validation for FederatedPKIs.- MADSig: Enhancing Digital Signature to Capture Secure Document Processing Requirements.- PKi Consolidation Project and Multiapplicative Smart Payment Cards.- Security Analysis and Configuration of Large Networks.- S-VPN Policy: Access List Conflict Automatic Analysis and Resolution.- Lock-Keeper: A New Implementation of Physical Separation Technology.- SPEECH: Secure Personal End-to-End Communication with Handheld.- Finding the Mobile Trusted Element.- Security Management, Applications.- Centrally Administered COIs Using Cross-Organizational Trust.- Improving Assurance of Information Security Rol.- Modelling the Economics of Free and Open Source Software Security.- Securing service-oriented applications.- A Service Oriented Trust Development Platform.- A Trust Label for Secure and Compliant e-ID Applications: The Belgian Experience.- Electronic signature in Italy after ten years of "running in".- Awareness Raising, Compliance, Data Protection, Cyberspace Regulation.- Internet Early Warning System: The Global View.- IT Security Vulnerability and Incident Response Management.- Blending Corporate Governance with Information Security.- On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context.- Regulation of State Surveillance of the Internet.- How Can NRA Contribute to the Improvement of IT Security?.- Information Security Regulation: Tomorrow Never Dies?.- Introducing Regulatory Compliance Requirements Engineering.- Legal Issues in Secure Grid Computing Environments.- The Impact of Monitoring Technology on the Law.
RFID, e-ID Cards, Trusted Computing, Interoperability.- Radio Frequency Identification (RFID) and Data Protection Legal Issues.- e-ID and Smartcards - Current Status, Hopeful Developments and Best Practices.- European Citizen Card Combined with Travel Document Function, Convergence or Divergence?.- Physical Unclonable Functions for enhanced security of tokens and tags.- Hardware Security Features for Secure Embedded Devices.- Security in Next Generation Consumer Electronic Devices.- Security Architecture for Device Encryption and VPN.- TPM Enterprise Key Management requires centralized Hardware-based Security.- Implementation of DRM Systems under the EU Legal Framework.- IT-Grundschutz: Two-Tier Risk Assessment for a Higher Efficiency in IT Security Management.- ISOIIEC 24727 - A Future Standard for Smart Card Middleware.- Information Security Standardization - the ETSI Perspective.- Digital Signatures without the Headaches.- Could Test Standards Help on the Way to Achieve Global e-Passport Interoperability?.- A New Standard Based Road to Interoperable Strong Authentication.- Identity Management, Biometrics, PKI-Solutions, Network Security.- Identifying Patterns of Federation Adoption.- Fidelity: Federated Identity Management Security based on Liberty Alliance on European Ambit.- Deflecting Active Directory Attacks.- Implementing role based access control - How we can do it better!.- Identity and Access Control - Demonstrating Compliance.- Robust and Secure Biometrics: Some Application Examples.- Selecting the Optimal Biometric 2-factor Authentication Method - a User's Viewpoint.- A Face Recognition System for Mobile Phones.- Advanced certificate validation service for secure Service-Oriented Architectures.- An Introduction to Validation for FederatedPKIs.- MADSig: Enhancing Digital Signature to Capture Secure Document Processing Requirements.- PKi Consolidation Project and Multiapplicative Smart Payment Cards.- Security Analysis and Configuration of Large Networks.- S-VPN Policy: Access List Conflict Automatic Analysis and Resolution.- Lock-Keeper: A New Implementation of Physical Separation Technology.- SPEECH: Secure Personal End-to-End Communication with Handheld.- Finding the Mobile Trusted Element.- Security Management, Applications.- Centrally Administered COIs Using Cross-Organizational Trust.- Improving Assurance of Information Security Rol.- Modelling the Economics of Free and Open Source Software Security.- Securing service-oriented applications.- A Service Oriented Trust Development Platform.- A Trust Label for Secure and Compliant e-ID Applications: The Belgian Experience.- Electronic signature in Italy after ten years of "running in".- Awareness Raising, Compliance, Data Protection, Cyberspace Regulation.- Internet Early Warning System: The Global View.- IT Security Vulnerability and Incident Response Management.- Blending Corporate Governance with Information Security.- On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context.- Regulation of State Surveillance of the Internet.- How Can NRA Contribute to the Improvement of IT Security?.- Information Security Regulation: Tomorrow Never Dies?.- Introducing Regulatory Compliance Requirements Engineering.- Legal Issues in Secure Grid Computing Environments.- The Impact of Monitoring Technology on the Law.