ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference

This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Sma...

Full description

Main Authors: Pohlmann, Norbert, Reimer, Helmut (Author), Schneider, Wolfgang (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: Wiesbaden Vieweg+Teubner Verlag 2007, 2007
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • New Security Challenges and Applications
  • ID Cards in Practice
  • Large Scale Fingerprint Applications: Which Technology Should be Used?
  • From the eCard-API-Framework Towards a Comprehensive eID-Framework for Europe
  • Making Digital Signatures Work across National Borders
  • Financial Fraud Information Sharing
  • Enterprise Key Management Infrastructure
  • Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays
  • Security Evaluation and Testing — Past, Present and Future
  • Economics of Security and PKI Applications
  • Managing Information Security in Small and Medium Sized Enterprises: A Holistic Approach
  • EKIAS — Success Criteria of PKI Implementations
  • Embedded PKI in Industrial Facilities
  • SIM-enabled Open Mobile Payment System Based on Nation-wide PKI
  • A Good Choice for Securing Electronic Health Records?
  • Case Studies from Fuzzing Bluetooth, WiFi and WiMAX
  • Evaluation of the Possible Utilization of anti-spam Mechanisms Against spit
  • Modeling Trust Management and Security of Information
  • Smart Tokens, eID Cards, Infrastructure Solutions and Interoperability
  • Infrastructure for Trusted Environment: In Search of a Solution
  • Integrity Check of Remote Computer Systems Trusted Network Connect
  • Evidence Record Syntax — a new International Standard for Long-Term Archiving of Electronic Documents and Signed Data
  • PKI and Entitlement — Key Information Security Management Solutions for Business and IT Compliance
  • Future Diffusion of PK1-Technology — A German Delphi Study
  • The Introduction of Health Telematics in Germany
  • The German Identity Card — Concepts and Applications
  • Infrastructures for Identification and Identity Documents
  • The Security Infrastructure of the German Core Application in Public Transportation
  • Applications of Citizen Portals
  • Virtual Post Office in Practice
  • A Matter of Principle?
  • ISTPA Operational Analysis of International Privacy Requirements
  • The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet
  • Data Encryption on File Servers
  • Setting up an Effective Information Security Awareness Programme
  • Saferinternet.pl Project — Educational Activities for Internet Safety in Poland
  • Is Cyber Tribalism Winning Online Information Warfare?
  • Phishing Across Interaction Channels: Methods, Experience and Best Practice
  • IT-Security Beyond Borders — an Assessment of Trust Levels Across Europe
  • Analyzing and Improving the Security of Internet Elections
  • Remote Access Mechanics as a Source of Threats to Enterprise Network Infrastructure
  • “Private Investigation” in the Computer Environment: Legal Aspects
  • Identity, Information Security and Rights Management