default search action
ISSE 2004: Berlin, Germany
- Sachar Paulus, Norbert Pohlmann, Helmut Reimer:
ISSE 2004 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2004 Conference, Berlin, Germany, September 28-30, 2004. Vieweg+Teubner 2004, ISBN 978-3-528-05910-1 - Andrew Oldham:
True Economics of a Security Infrastructure. 3-11 - Philippe Lemaire, Jean-Luc Delvaux:
ROI+ Methodology to Justify Security Investment. 12-22 - Thomas Kohler:
Basel II and Beyond: Implications for e-Security. 23-29 - Avi Corfas:
The Role of Attack Simulation in Risk Management Automation. 30-37 - György Endersz:
Secure ICT Architectures for Efficient Detection and Response. 38-46 - Gerrit Hornung:
Biometric Identity Cards: Technical, Legal, and Policy Issues. 47-57 - Alexander Dix:
New Initiatives and New Needs for Privacy Enhancing Technologies. 58-65 - Alfred Büllesbach:
Data Protection Aspects of the Digital Rights Management. 66-74 - Johannes Wiele:
Big Brother does not Keep your Assets Safe. 75-85 - J. Matthew Gardiner:
Identity Federation: Business Drivers, Use Cases, and Key Business Considerations. 89-98 - Klaus Kursawe:
Trusted Computing and its Applications: An Overview. 99-107 - Burt Kaliski:
RFID Privacy: Challenges and Progress. 108-116 - Malek Bechlaghem:
Light-weight PKI-Enabling through the Service of a Central Signature Server. 117-126 - David Harley:
Massmailers: New Threats Need Novel Anti-Virus Measures. 127-137 - Ulrich Lang, Rudolf Schreiner:
OpenPMF: A Model-Driven Security Framework for Distributed Systems. 138-147 - Thomas Obert:
Is Grid Computing more Secure? 148-159 - Darko Kirovski, Nebojsa Jojic, Gavin Jancke:
Tamper-Resistant Biometric IDs. 160-175 - Andreas Mitrakas:
Spam is Here to Stay. 179-185 - Paul Meadowcroft:
The Key to My On-Line Security. 186-197 - Marco Casassa Mont:
Dealing with Privacy Obligations in Enterprises. 198-208 - Alexander W. Koehler:
Trusted Computing: From Theory to Practice in the Real World. 209-218 - Stefan Hebler:
Electronic Signatures - Key for Effective e-Invoicing Processes. 219-227 - Georg Lindsberger, Gerold Pinter, Alexander Egger:
Legally Binding Cross Boarder Electronic Invoicing. 228-236 - Tobias Straub, Matthias Fleck, Ralf Grewe, Oliver Lenze:
SecMGW - An Open-Source Enterprise Gateway for Secure E-Mail. 237-249 - Daniel Baer, Andreas Philipp, Norbert Pohlmann:
Web Service Security - XKMS (TrustPoint). 250-258 - José Pina Miranda, João Melo:
EPM: Tech, Biz and Postal Services Meeting Point. 259-267 - John T. Sabo:
Managing Trust in Critical Infrastructure Protection Information Sharing Systems. 271-280 - Jos Dumortier:
Legal Status of Qualified Electronic Signatures in Europe. 281-289 - Werner Freystätter, Samu Konttinen:
The Finnish Ecosystem for Mobile Signatures. 290-298 - Aysegul Ibrisim, Rasim Yilmaz:
e-Transformation Turkey Project. 299-308 - InKyung Jeun, Jaeil Lee, Sang Hwan Park:
Asia PKI Interoperability Guideline. 309-320 - Milan Markovic:
Recent PKI Experiences in Serbia. 321-332 - Paolo Balboni:
CCTV and Workplace Privacy - Italy. 333-345 - Oliver Altmeyer, Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble:
Enhancing Security of Computing Platforms with TC-Technology. 346-361
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.