


default search action
ISSE 2008: Madrid, Spain
- Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider:

ISSE 2008 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2008 Conference, 7-9 October 2008, Madrid, Spain. Vieweg+Teubner 2009, ISBN 978-3-8348-0660-4
Security Management and Economics of Security
- Lenka Fibíková, Roland Müller:

The Information Security Framework for Daimler Financial Services and its Implementation. 3-19 - Anas Tawileh, Jeremy Hilton

, Stephen McIntosh:
Information Security Status in Organisations 2008. 20-29 - Ivonne Thomas, Michael Menzel, Christoph Meinel:

Quantified Trust Levels for Authentication. 30-38 - Manel Medina

, Estíbaliz Delgado, Diego Fernández:
Identity Management in Open Environments. 39-44 - José Enrique López García, Carlos Alberto Gil García, Álvaro Armenteros Pacheco, Pedro Luis Muñoz Organero:

Identity management and privacy languages technologies: Improving user control of data privacy. 45-56 - Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore

:
Security Economics and European Policy. 57-76 - Eberhard von Faber:

How Economy and Society affect Enterprise Security Management. 77-83 - José de la Peña Muñoz:

Information Security Industry: State of the Art. 84-89
Privacy, Data Protection and Awareness
- Marie-Theres Tinnefeld:

Freedom and Security - Responses to the Threat of International Terrorism. 93-98 - Michele Bezzi, Jean-Christophe R. Pazzaglia:

The Anonymity vs. Utility Dilemma. 99-107 - Murdoch Watney

:
Governmental Control of the Internet in addressing Law Enforcement and National Security. 108-118 - Anja Beyer:

Theft of Virtual Property - Towards Security Requirements for Virtual Worlds. 119-127
Trusted Computing and Biometrics
- Michael Willett, Dave Anderson:

Trusted Storage: Putting Security and Data Together. 131-138 - Klaus Kursawe, Stefan Katzenbeisser:

Trust in Consumer Electronics. 139-143 - Stephen Hanna:

NAC 2.0 - Unifying Network Security. 144-151 - Josef von Helden, Ingo Bente:

Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect. 152-162 - Christian Dietrich, Christian Rossow:

Empirical research of IP blacklists. 163-171 - Olimpia Olguín, Manel Medina

:
GIDRE: Grid-based Detection Intrusion and Response Environment. 172-180 - Andreas Reisen:

Biometrics and ID Cards - Enablers for Personal Security. 181-185 - David Hernando, David Gómez, Javier Rodríguez Saeta, Pascual Ejarque, Javier Hernando:

Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases. 186-193
Web 2.0 Security and Large Scale Public Applications
- Guido von der Heidt:

Development and Implementation of an Encryption Strategy for a global Enterprise. 197-207 - Konstantin Hyppönen, Marko Hassinen, Elena Trichina:

Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool. 208-217 - Arshad Noor:

Symmetric Key Services Markup Language (SKSML). 218-230 - Ulrich Lang, Rudolf Schreiner:

Managing business compliance using model-driven security management. 231-241 - Christian Zipfel, Henning Daum, Gisela Meister:

Secure E-Business applications based on the European Citizen Card. 242-250 - Jon Ølnes, Anette Andresen, Stefano Arbia, Markus Ernst, Martin Hagen, Stephan Klein, Giovanni Manca, Adriano Rossi, Frank Schipplick, Daniele Tatti, Gesa Wessolowski, Jan Windheuser:

Electronic Signatures for Public Procurement across Europe. 251-261 - Detlef Houdeau:

Progress through uniformity. 262-267 - Elisa Vivancos:

PPs for applications with the Spanish National Electronic Identity Card. 268-277
Fraud Detection, Prevention and Critical Infrastructures
- Philip Hoyer:

OTP and Challenge/Response algorithms for financial and e-government identity assurance: current landscape and trends. 281-290 - Klaus Schmeh:

NSA Suite B and its significance for non-USA organisations. 291-295 - Stefan Hölzner, Jan Kästle:

Managing vulnerabilities and achieving compliance for Oracle databases in a modern ERP environment. 296-306 - María Luisa García Tallón:

Identity Theft in Electronic Financial Transactions The experience of the Central Bank of Spain. 307-312 - Fernando J. Sánchez Gómez, Miguel Ángel Abad Arranz:

The need for the Protection of Critical National Infrastructures. 313-318 - Bernhard M. Hämmerli, Henning H. Arendt:

Challenges for the Protection of Critical ICT-Based Financial Infrastructures. 319-326
Security for VoIP, Mobility and Web
- Andreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari:

Evaluating Measures and Countermeasures for SPAM over Internet Telephony. 329-340 - Peter Backs, Norbert Pohlmann:

Influence of Security Mechanisms on the Quality of Service of VoIP. 341-346 - Marc Sel, Stefaan Seys, Eric R. Verheul:

The security of mass transport ticketing systems. 347-356 - Walter Hinz:

Authentication for Web Services with the Internet Smart Card. 357-366 - Corrado Ronchi, Shukhrat Zakhidov:

Hardened Client Platforms for Secure Internet Banking. 367-379 - Helena Handschuh, Elena Trichina:

Securing Flash Technology: How Does It Look From Inside? 380-389
German Workshop: European Citizen Cards
- Matthias Büger:

Deployment of German Electronic Citizen Cards in Banking: Opportunities and Challenges. 393-397 - Georg E. Schäfer:

Security Requirements for One Stop Government. 398-405 - Thomas Walloschke:

Infrastructures and Middleware for the Application of eID Cards in eGovernment. 406-417 - Dennis Kügler:

Securing Contactless Chips with PACE. 418-423

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














