default search action
ISSE 2006: Rome, Italy
- Sachar Paulus, Norbert Pohlmann, Helmut Reimer:
ISSE 2006 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2006 Conference, 10-12 October 2006, Rome, Italy. Vieweg 2006, ISBN 978-3-8348-0213-2
RFID, e-ID Cards, Trusted Computing, Interoperability
- Zoi Talidou:
Radio Frequency Identification (RFID) and Data Protection Legal Issues. 3-16 - Graham Williamson:
e-ID and Smartcards - Current Status, Hopeful Developments and Best Practices. 17-24 - Detlef Houdeau:
European Citizen Card Combined with Travel Document Function, Convergence or Divergence? 25-29 - Pim Tuyls, Boris Skoric:
Physical Unclonable Functions for enhanced security of tokens and tags. 30-37 - Helena Handschuh, Elena Trichina:
Hardware Security Features for Secure Embedded Devices. 38-44 - Tom Kan, Tim Kerins, Klaus Kursawe:
Security in Next Generation Consumer Electronic Devices. 45-53 - Ammar Alkassar, Michael Scheibel, Michael Stübel, Ahmad-Reza Sadeghi, Marcel Winandy:
Security Architecture for Device Encryption and VPN. 54-63 - Bernhard Weiss:
TPM Enterprise Key Management requires centralized Hardware-based Security. 64-71 - Pius Alexander Benczek:
Implementation of DRM Systems under the EU Legal Framework. 72-94 - Angelika Jaschob, Lydia Tsintsifa:
IT-Grundschutz: Two-Tier Risk Assessment for a Higher Efficiency in IT Security Management. 95-101 - Stephan Spitz, Jens Urmann, Gisela Meister:
ISOIIEC 24727 - A Future Standard for Smart Card Middleware. 102-107 - Charles Brookson, Dionisio Zumerle:
Information Security Standardization - the ETSI Perspective. 108-118 - Nick Pope, Juan Carlos Cruellas:
Digital Signatures without the Headaches. 119-128 - Andreas M. Wolf:
Could Test Standards Help on the Way to Achieve Global e-Passport Interoperability? 129-138 - Philip Hoyer:
A New Standard Based Road to Interoperable Strong Authentication. 139-147
Identity Management, Biometrics, PKI-Solutions, Network Security
- Heather M. Hinton, Mark Vandenwauver:
Identifying Patterns of Federation Adoption. 151-160 - Manel Medina, Miquel Colomer, Sandra Garcia Polo, Antoine de Poorter:
Fidelity: Federated Identity Management Security based on Liberty Alliance on European Ambit. 161-167 - Jan De Ciercq:
Deflecting Active Directory Attacks. 168-175 - Marko Vogel:
Implementing role based access control - How we can do it better! 176-185 - Marc Sel, Bart Van Rompay:
Identity and Access Control - Demonstrating Compliance. 186-195 - Tom A. M. Kevenaar, Geert Jan Schrijen, Anton H. M. Akkermans, Marijn Damstra, Pim Tuyls, Michiel van der Veen:
Robust and Secure Biometrics: Some Application Examples. 196-203 - Gunter Bitz:
Selecting the Optimal Biometric 2-factor Authentication Method - a User's Viewpoint. 204-210 - Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandro:
A Face Recognition System for Mobile Phones. 211-217 - Antonio Ruiz-Martínez, Daniel Sánchez-Martínez, C. Inmaculada Marín-López, Antonio Fernandez Gómez-Skarmeta:
Advanced certificate validation service for secure Service-Oriented Architectures. 218-227 - Robert Dulude, David Engberg, Seth Hitchings:
An Introduction to Validation for Federated PKIs. 228-240 - Jean-Christophe R. Pazzaglia, Stefano Crosta:
MADSig: Enhancing Digital Signature to Capture Secure Document Processing Requirements. 241-248 - Milan Markovic, Milos Kilibarda, Aleksandar Milosevic:
PKi Consolidation Project and Multiapplicative Smart Payment Cards. 249-258 - Antonio Lioy:
Security Analysis and Configuration of Large Networks. 259-265 - Simone Ferraresi, Stefano Pesic, Livia Trazza, Andrea Baiocchi:
S-VPN Policy: Access List Conflict Automatic Analysis and Resolution. 266-274 - Feng Cheng, Christoph Meinel:
Lock-Keeper: A New Implementation of Physical Separation Technology. 275-286 - Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis, Fabio Petagna, Umberto Ferraro Petrillo:
SPEECH: Secure Personal End-to-End Communication with Handheld. 287-297 - Fabio Ricciato, Maura Turolla, Antonio Varriale:
Finding the Mobile Trusted Element. 298-307
Security Management, Applications
- Kevin Foltz, Coimbatore Chandersekaran:
Centrally Administered COIs Using Cross-Organizational Trust. 311-317 - Michael D. Barwise:
Improving Assurance of Information Security Rol. 318-325 - Anas Tawileh, Jeremy Hilton, Steve McIntosh:
Modelling the Economics of Free and Open Source Software Security. 326-335 - Anthony J. Nadalin, Nataraj Nagaratnam, Maryann Hondo:
Securing service-oriented applications. 336-343 - Helena Rifà, Francisco Jordan:
A Service Oriented Trust Development Platform. 344-355 - Geert Somers, Jos Dumortier:
A Trust Label for Secure and Compliant e-ID Applications: The Belgian Experience. 356-362 - Giovanni Manca:
Electronic signature in Italy after ten years of "running in". 363-373
Awareness Raising, Compliance, Data Protection, Cyberspace Regulation
- Norbert Pohlmann, Marcus Proest:
Internet Early Warning System: The Global View. 377-386 - Wim Hafkamp:
IT Security Vulnerability and Incident Response Management. 387-395 - Yves Le Roux:
Blending Corporate Governance with Information Security. 396-404 - Marco Casassa Mont:
On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context. 405-414 - Murdoch Watney:
Regulation of State Surveillance of the Internet. 415-425 - Rytis Rainys:
How Can NRA Contribute to the Improvement of IT Security? 426-432 - Andreas Mitrakas:
Information Security Regulation: Tomorrow Never Dies? 433-438 - Shahbaz Ali, Jon G. Hall:
Introducing Regulatory Compliance Requirements Engineering. 439-447 - Irene Kafeza, Eleanna Kafeza, Felix Wai-Hon Chan:
Legal Issues in Secure Grid Computing Environments. 448-454 - Pieter Kleve, Richard V. de Mulder, Kees van Noortwijk:
The Impact of Monitoring Technology on the Law. 455-466
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.