Reimer, Helmut
ISSE 2013 Securing Electronic Business Processes
1. Draft of a Dynamic Malware Detection System on Trustworthy Endpoints
Andreas Speier, Christofer Fein, David Bothe, Eric Reich, Norbert Pohlmann
2. The Evolution of Authentication
Rolf Lindemann
3. Security Challenges of Current Federated eID Architectures
Libor Neumann
4. Worldbank’s Secure eID Toolkit for Africa
Marc Sel, Tomas Clemente Sanchez
5. The INDI Ecosystem of privacy-aware, user-centric Identity
Lefteris Leontaridis, Thomas Andersson, Herbert Leitold, Bernd Zwattendorfer, Shuzhe Yang, Pasi Lindholm
6. Enhancing Transparency with Distributed Privacy-Preserving Logging
Roel Peeters, Karel Wouters, Tobias Pulls
7. Data Protection and Data Security by Design Applied to Financial Intelligence
Paolo Balboni, Milda Macenaite, Udo Kroon
8. A security Taxonomy that facilitates Protecting an industrial ICT Production and how it really provides Transparency
Eberhard Faber, Wolfgang Behnsen
9. A Practical Signature Policy Framework
Jon Ølnes
10. Facing the Upheaval: Changing Dynamics for Security Governance in the EU
Yves Roux
11. Alternative Authentication – What does it really Provide?
Steve Pannifer
12. Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment
Claire Vishik, David Ott, Frederick Sheldon
13. Executive Career Paths in Information Security Management
Peter Berlich
14. Positioning Information Security Roles, Processes and Interactions
Dimitrios Papadopoulos, Bernhard M. Hämmerli
15. Safe Browsing
Norbert Schirmer
16. Security Compliance Monitoring – The next Evolution of Information Security Management?!
Marko Vogel, Vinzent Broer
17. Digital Forensics as a Big Data Challenge
Alessandro Guarino
18. Security in Critical Infrastructures – Future Precondition for Operating License?
Willi Kafitz, Volker Burgers
19. A Practical Approach for an IT Security Risk Analysis in Hospitals
Levona Eckstein, Reiner Kraft
20. When does Abuse of Social Media constitute a Crime? – A South African Legal Perspective within a Global Context
Murdoch Watney
21. Protected Software Module Architectures
Raoul Strackx, Job Noorman, Ingrid Verbauwhede, Bart Preneel, Frank Piessens
22. Securing Communication Devices via Physical Unclonable Functions (PUFs)
Nicolas Sklavos
23. Secure Mobile Government and Mobile Banking Systems Based on Android Clients
Milan Marković, Goran Đorđević
Nyckelord: Computer Science, Systems and Data Security, Computer Science, general
- Författare
- Reimer, Helmut
- Pohlmann, Norbert
- Schneider, Wolfgang
- Utgivare
- Springer
- Utgivningsår
- 2013
- Språk
- en
- Utgåva
- 2013
- Sidantal
- 15 sidor
- Kategori
- Datateknik, Datakommunikation
- Format
- E-bok
- eISBN (PDF)
- 9783658033712