Reimer, Helmut

ISSE 2013 Securing Electronic Business Processes

Reimer, Helmut - ISSE 2013 Securing Electronic Business Processes, ebook


Ebook, PDF with Adobe DRM
ISBN: 9783658033712
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Draft of a Dynamic Malware Detection System on Trustworthy Endpoints
Andreas Speier, Christofer Fein, David Bothe, Eric Reich, Norbert Pohlmann

2. The Evolution of Authentication
Rolf Lindemann

3. Security Challenges of Current Federated eID Architectures
Libor Neumann

4. Worldbank’s Secure eID Toolkit for Africa
Marc Sel, Tomas Clemente Sanchez

5. The INDI Ecosystem of privacy-aware, user-centric Identity
Lefteris Leontaridis, Thomas Andersson, Herbert Leitold, Bernd Zwattendorfer, Shuzhe Yang, Pasi Lindholm

6. Enhancing Transparency with Distributed Privacy-Preserving Logging
Roel Peeters, Karel Wouters, Tobias Pulls

7. Data Protection and Data Security by Design Applied to Financial Intelligence
Paolo Balboni, Milda Macenaite, Udo Kroon

8. A security Taxonomy that facilitates Protecting an industrial ICT Production and how it really provides Transparency
Eberhard Faber, Wolfgang Behnsen

9. A Practical Signature Policy Framework
Jon Ølnes

10. Facing the Upheaval: Changing Dynamics for Security Governance in the EU
Yves Roux

11. Alternative Authentication – What does it really Provide?
Steve Pannifer

12. Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment
Claire Vishik, David Ott, Frederick Sheldon

13. Executive Career Paths in Information Security Management
Peter Berlich

14. Positioning Information Security Roles, Processes and Interactions
Dimitrios Papadopoulos, Bernhard M. Hämmerli

15. Safe Browsing
Norbert Schirmer

16. Security Compliance Monitoring – The next Evolution of Information Security Management?!
Marko Vogel, Vinzent Broer

17. Digital Forensics as a Big Data Challenge
Alessandro Guarino

18. Security in Critical Infrastructures – Future Precondition for Operating License?
Willi Kafitz, Volker Burgers

19. A Practical Approach for an IT Security Risk Analysis in Hospitals
Levona Eckstein, Reiner Kraft

20. When does Abuse of Social Media constitute a Crime? – A South African Legal Perspective within a Global Context
Murdoch Watney

21. Protected Software Module Architectures
Raoul Strackx, Job Noorman, Ingrid Verbauwhede, Bart Preneel, Frank Piessens

22. Securing Communication Devices via Physical Unclonable Functions (PUFs)
Nicolas Sklavos

23. Secure Mobile Government and Mobile Banking Systems Based on Android Clients
Milan Marković, Goran Đorđević

Keywords: Computer Science, Systems and Data Security, Computer Science, general

Publication year
Information Technology, Telecommunications

Similar titles