


default search action
17th ISSE 2015: Berlin, Germany
- Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider:

ISSE 2015 - Highlights of the Information Security Solutions Europe 2015 Conference, Berlin, Germany, November 1-2, 2015. Springer 2015, ISBN 978-3-658-10933-2 - Giovanni Buttarelli, Wojciech Wiewiórowski, Christopher Docksey:

The EDPS Strategy - Leading by Example. 1-11 - Malte Kahrs, Kim Nguyen:

Future Ecosystems for Secure Authentication and Identification. 12-21 - Gunnar Jacobson:

The Public Key Muddle - How to Manage Transparent End-to-end Encryption in Organizations. 25-35 - Mechthild Stöwer, Tatjana Rubinstein:

Overcoming Obstacles: Encryption for Everyone! 36-45 - Burkhard Wiegel:

Securing Enterprise Email Communication on both Sides of the Firewall. 46-57 - Bernhard Doll, Dirk Emmerich, Ralph Herkenhöner, Ramona Kühn, Hermann de Meer:

On Location-determined Cloud Management for Legally Compliant Outsourcing. 61-73 - David Frith:

Cloud Deployments: Is this the End of N-Tier Architectures? 74-86 - Ammar Alkassar, Michael Gröne, Norbert Schirmer:

Secure Partitioning of Application Logic In a Trustworthy Cloud. 87-97 - Antonio González Robles, Norbert Pohlmann, Christoph Engling, Hubert A. Jäger, Edmund Ernst:

Doubtless Identification and Privacy Preserving of User in Cloud Systems. 98-108 - Christian Thiel, Christoph Thiel:

Industry 4.0 - Challenges in Anti-Counterfeiting. 111-120 - David Ott, Claire Vishik, David Grawrock, Anand Rajan:

Trust Evidence for IoT: Trust Establishment from Servers to Sensors. 121-131 - Claire Vishik, Marcello Balduccini:

Making Sense of Future Cybersecurity Technologies: Using Ontologies for Multidisciplinary Domain Analysis. 135-145 - Roger Bollhalder, Christian Thiel

, Thomas Punz:
How the God Particle will Help You Securing Your Assets. 146-156 - Ulrich Lang, Rudolf Schreiner:

Proximity-Based Access Control (PBAC) using Model-Driven Security. 157-170 - Olivier Delos, Tine Debusschere, Marijke De Soete, Jos Dumortier, Riccardo Genghini, Hans Graux, Sylvie Lacroix, Gianluca Ramunno, Marc Sel, Patrick Van Eecke:

A pan-European Framework on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market. 173-195 - Peter Lipp:

Signature Validation - a Dark Art? 196-205 - Marc Sel:

A Comparison of Trust Models. 206-215 - Mihai Togan, Ionut Florea:

A Reference Model for a Trusted Service Guaranteeing Web-content. 216-224 - Libor Neumann:

Architectural Elements of a Multidimensional Authentication. 227-239 - Norbert Pohlmann, Markus Hertlein, Pascal Manaras:

Bring Your Own Device For Authentication (BYOD4A) - The Xign-System. 240-250 - Wanpeng Li

, Chris J. Mitchell:
Addressing Threats to Real-World Identity Management Systems. 251-259 - Alessandro Guarino:

Information Security Standards in Critical Infrastructure Protection. 263-269 - Maarten Truyens:

Data Protection Tensions in Recent Software Development Trends. 270-285 - Eberhard von Faber:

Changing the Security Mode of Operation in a Global IT Organization with 20000+ Technical Staff. 286-304

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














