ISSE 2008 securing electronic business processes highlights of the Information Security Solutions Europe 2008 Conference /

This book presents the most interesting talks given at ISSE 2008 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart To...

Full description

Corporate Authors: Information Security Solutions Europe (Conference) Madrid, Spain)
Other Authors: Information Security Solutions Europe (Conference), Pohlmann, Norbert., Reimer, Helmut., Schneider, Wolfgang, 1947-, SpringerLink (Online service)
Format: eBook
Language: English
Published: Wisebaden : Vieweg+Teubner Verlag, ©2009.
Wisebaden : [2009]
Physical Description: 1 online resource.
Subjects:
LEADER 08637cam a2201021 a 4500
001 341652238
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cn|||||||||
008 090522s2009 gw a ob 101 0 eng d
019 |a 567483762  |a 629787457  |a 646806128  |a 756715476  |a 828796886  |a 1014198592  |a 1087470562  |a 1112601857 
020 |a 9783834892836 
020 |a 3834892831 
020 |a 9783834806604 
020 |a 3834806609 
024 7 |a 10.1007/978-3-8348-9283-6.  |2 doi 
035 |a (OCoLC)341652238  |z (OCoLC)567483762  |z (OCoLC)629787457  |z (OCoLC)646806128  |z (OCoLC)756715476  |z (OCoLC)828796886  |z (OCoLC)1014198592  |z (OCoLC)1087470562  |z (OCoLC)1112601857 
037 |a 978-3-8348-0660-4  |b Springer  |n http://www.springerlink.com 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d CLL  |d OCLCQ  |d U3G  |d E7B  |d OCLCO  |d OCLCQ  |d OKU  |d OCLCF  |d BEDGE  |d NLGGC  |d OCLCO  |d IDEBK  |d EBLCP  |d DEBSZ  |d OCL  |d OCLCO  |d OCLCQ  |d MYUML  |d VT2  |d Z5A  |d OCLCQ  |d ESU  |d UAB  |d AUD  |d OCLCQ  |d CEF  |d U3W  |d AU@  |d WYU  |d OCLCQ  |d ERF  |d OCLCQ  |d OCLCO  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
049 |a COM6 
050 4 |a TK5105.59  |b .I54 2009 
072 7 |a UR.  |2 bicssc 
072 7 |a UTN.  |2 bicssc 
072 7 |a COM053000.  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
084 |a 54.62  |2 bcl 
084 |a 83.71  |2 bcl 
111 2 |a Information Security Solutions Europe (Conference)  |d (2008 :  |c Madrid, Spain) 
245 1 0 |a ISSE 2008 securing electronic business processes :  |b highlights of the Information Security Solutions Europe 2008 Conference /  |c Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider (eds.). 
260 |a Wisebaden :  |b Vieweg+Teubner Verlag,  |c ©2009. 
264 1 |a Wisebaden :  |b Vieweg+Teubner Verlag,  |c [2009] 
264 4 |c ©2009. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file. 
347 |b PDF. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
520 |a This book presents the most interesting talks given at ISSE 2008 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008. 
505 0 |a Security Management and Economics of Security -- The Information Security Framework for Daimler Financial Services and its Implementation -- Information Security Status in Organisations 2008 -- Quantified Trust Levels for Authentication -- Identity Management in Open Environments -- Identity management and privacy languages technologies: Improving user control of data privacy -- Security Economics and European Policy -- How Economy and Society affect Enterprise Security Management -- Information Security Industry: State of the Art -- Privacy, Data Protection and Awareness -- Freedom and Security -- Responses to the Threat of International Terrorism -- The Anonymity vs. Utility Dilemma -- Governmental Control of the Internet in addressing Law Enforcement and National Security -- Theft of Virtual Property -- Towards Security Requirements for Virtual Worlds -- Trusted Computing and Biometrics -- Trusted Storage: Putting Security and Data Together -- Trust in Consumer Electronics -- NAC 2.0 -- Unifying Network Security -- Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect -- Empirical research of IP blacklists -- GIDRE: Grid-based Detection Intrusion and Response Environment -- Biometrics and ID Cards -- Enablers for Personal Security -- Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases -- Web 2.0 Security and Large Scale Public Applications -- Development and Implementation of an Encryption Strategy for a global Enterprise -- Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool -- Symmetric Key Services Markup Language (SKSML) -- Managing business compliance using model-driven security management -- Secure E-Business applications based on the European Citizen Card -- Electronic Signatures for Public Procurement across Europe -- Progress through uniformity -- PPs for applications with the Spanish National Electronic Identity Card -- Fraud Detection, Prevention and Critical Infrastructures -- OTP and Challenge/Response algorithms for financial and e-government identity assurance: current landscape and trends -- NSA Suite B and its significance for non-USA organisations -- Managing vulnerabilities and achieving compliance for Oracle databases in a modern ERP environment -- Identity Theft in Electronic Financial Transactions The experience of the Central Bank of Spain -- The need for the Protection of Critical National Infrastructures -- Challenges for the Protection of Critical ICT-Based Financial Infrastructures -- Security for VoIP, Mobility and Web -- Evaluating Measures and Countermeasures for SPAM over Internet Telephony -- Influence of Security Mechanisms on the Quality of Service of VoIP -- The security of mass transport ticketing systems -- Authentication for Web Services with the Internet Smart Card -- Hardened Client Platforms for Secure Internet Banking -- Securing Flash Technology: How Does It Look From Inside? -- German Workshop: European Citizen Cards -- Deployment of German Electronic Citizen Cards in Banking: Opportunities and Challenges -- Security Requirements for One Stop Government -- Infrastructures and Middleware for the Application of eID Cards in eGovernment -- Securing Contactless Chips with PACE. 
650 0 |a Computer networks  |x Security measures  |v Congresses. 
650 0 |a Computer networks  |x Access control  |v Congresses. 
650 0 |a Electronic commerce  |x Security measures  |v Congresses. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Congrès. 
650 6 |a Commerce électronique  |x Sécurité  |x Mesures  |v Congrès. 
650 7 |a Informatique.  |2 eclas. 
650 7 |a Computer networks  |x Access control.  |2 fast. 
650 7 |a Computer networks  |x Security measures.  |2 fast. 
650 7 |a Electronic commerce  |x Security measures.  |2 fast. 
655 2 |a Congress. 
655 7 |a proceedings (reports)  |2 aat. 
655 7 |a Conference papers and proceedings.  |2 fast. 
655 7 |a Conference papers and proceedings.  |2 lcgft. 
655 7 |a Actes de congrès.  |2 rvmgf. 
700 1 |a Pohlmann, Norbert. 
700 1 |a Reimer, Helmut. 
700 1 |a Schneider, Wolfgang,  |d 1947-  |1 https://id.oclc.org/worldcat/entity/E39PCjtWqKkcWwJgWWTK4MrtqP. 
710 2 |a SpringerLink (Online service) 
776 0 8 |i Print version:  |a Pohlmann, Norbert.  |t ISSE 2008 Securing Electronic Business Processes.  |d Wiesbaden : Springer Fachmedien, ©2009  |z 9783834806604. 
907 |a .b29587190  |b multi  |c -  |d 100215  |e 240320 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g gw   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 03/2021 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE Comp, 2017.10 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2021.03 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150224849  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-8348-9283-6  |3 SpringerLink  |z Click here for access