


default search action
9th ISSE/SECURE 2007: Warsaw, Poland
- Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider:
ISSE/SECURE 2007 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe/SECURE 2007 Conference, Warsaw, Poland, September 25-27, 2007. Vieweg+Teubner 2007, ISBN 978-3-8348-0346-7 - Andreas Mitrakas, Silvia Portesi:
Regulating Information Security: A Matter of Principle? 3-17 - John T. Sabo:
ISTPA Operational Analysis of International Privacy Requirements. 18-25 - Murdoch Watney
:
The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet. 26-37 - Janusz Gebusia:
Data Encryption on File Servers. 38-48 - Dirk De Maeyer:
Setting up an Effective Information Security Awareness Programme. 49-58 - Anna Rywczynska, Agnieszka Wrzesien:
Saferinternet.pl Project - Educational Activities for Internet Safety in Poland. 59-64 - Godfried Williams, Johnnes Arreymbi:
Is Cyber Tribalism Winning Online Information Warfare? 65-72 - Philip Hoyer:
Phishing Across Interaction Channels: Methods, Experience and Best Practice. 73-81 - Christian Wernberg-Tougaard:
IT-Security Beyond Borders - an Assessment of Trust Levels Across Europe. 82-92 - Adam Wierzbicki
, Krzystof Pietrzak:
Analyzing and Improving the Security of Internet Elections. 93-101 - Paulina Januszkiewicz, Marek Pyka:
Remote Access Mechanics as a Source of Threats to Enterprise Network Infrastructure. 102-109 - Arkadiusz Lach:
"Private Investigation" in the Computer Environment: Legal Aspects. 110-113 - Kim Cameron, Michael B. Jones:
Design Rationale behind the Identity Metasystem Architecture. 117-129 - Marc Speltens, Patrick Patterson:
Federated ID Management - Tackling Risk and Credentialing Users. 130-135 - Yves Le Roux:
Information Security Governance for Executive Management. 136-146 - Ulrich Lang, Rudolf Schreiner:
Model Driven Security for Agile SOA-Style Environments. 147-156 - Marc Sel:
The Business Perspective on Roles Including Root Causes of Implementation Problems and Proven Ways to Overcome them. 157-165 - Ammar Alkassar, Rani Husseiki, Christian Stüble, Michael Hartmann:
A Security Architecture for Enterprise Rights Management. 166-177 - Milan Petkovic, Stefan Katzenbeisser, Klaus Kursawe:
Rights Management Technologies: A Good Choice for Securing Electronic Health Records? 178-187 - Sami Petäjäsoja, Ari Takanen, Mikko Varpiola, Heikki Kortti:
Case Studies from Fuzzing Bluetooth, WiFi and WiMAX. 188-195 - Christian Dietrich, Malte Hesse:
Evaluation of the Possible Utilization of anti-spam Mechanisms Against spit. 196-206 - Anna Felkner
, Tomasz Jordan Kruk:
Modeling Trust Management and Security of Information. 207-216 - Claire Vishik, Simon Johnson, David Hoffman:
Infrastructure for Trusted Environment: In Search of a Solution. 219-227 - Marian Jungbauer, Norbert Pohlmann:
Integrity Check of Remote Computer Systems Trusted Network Connect. 228-237 - Cord Bartels, Harald Kelter:
Technical Guidelines for Implementation and Utilization of RFID-based Systems. 238-250 - Helena Handschuh, Elena Trichina:
High Density Smart Cards: New Security Challenges and Applications. 251-259 - Detlef Houdeau:
ID Cards in Practice. 260-265 - Andreas M. Wolf:
Large Scale Fingerprint Applications: Which Technology Should be Used? 266-275 - Detlef Hühnlein, Manuel Bach:
From the eCard-API-Framework Towards a Comprehensive eID-Framework for Europe. 276-286 - Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim:
Making Digital Signatures Work across National Borders. 287-296 - Sharon Boeyen:
Financial Fraud Information Sharing. 297-305 - Arshad Noor:
Enterprise Key Management Infrastructure. 306-312 - Jorge Guajardo, Sandeep S. Kumar, Klaus Kursawe, Geert Jan Schrijen
, Pim Tuyls:
Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays. 313-321 - Peter Fischer:
Security Evaluation and Testing - Past, Present and Future. 322-328 - Anas Tawileh, Jeremy Hilton
, Stephen McIntosh:
Managing Information Security in Small and Medium Sized Enterprises: A Holistic Approach. 331-339 - Anja Beyer, Sophie Hellmann, Malte Hesse, Friedrich Holl, Peter Morcinek, Sachar Paulus, Helmut Reimer:
EKIAS - Success Criteria of PKI Implementations. 340-346 - Marcus Hanke:
Embedded PKI in Industrial Facilities. 347-354 - Elena Trichina, Konstantin Hyppönen, Marko Hassinen:
SIM-enabled Open Mobile Payment System Based on Nation-wide PKI. 355-366 - Tobias Gondrom:
Evidence Record Syntax - a new International Standard for Long-Term Archiving of Electronic Documents and Signed Data. 367-375 - Guido von der Heidt, Reinhard Schoepf:
PKI and Entitlement - Key Information Security Management Solutions for Business and IT Compliance. 376-385 - Michael Gaude:
Future Diffusion of PK1-Technology - A German Delphi Study. 386-395 - Dirk Drees:
The Introduction of Health Telematics in Germany. 396-400 - Andreas Reisen:
The German Identity Card - Concepts and Applications. 401-404 - Walter Landvogt:
Infrastructures for Identification and Identity Documents. 405-410 - Joseph Lutgen:
The Security Infrastructure of the German Core Application in Public Transportation. 411-418 - Hannes Ziegler:
Applications of Citizen Portals. 419-426 - Wilhelm Weisweber, Frank Planitzer:
Virtual Post Office in Practice. 427-436

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.