


Остановите войну!
for scientists:


default search action
17th ISSE 2015: Berlin, Germany
- Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider:
ISSE 2015 - Highlights of the Information Security Solutions Europe 2015 Conference, Berlin, Germany, November 1-2, 2015. Springer 2015, ISBN 978-3-658-10933-2 - Giovanni Buttarelli, Wojciech Wiewiórowski, Christopher Docksey:
The EDPS Strategy - Leading by Example. 1-11 - Malte Kahrs, Kim Nguyen:
Future Ecosystems for Secure Authentication and Identification. 12-21 - Gunnar Jacobson:
The Public Key Muddle - How to Manage Transparent End-to-end Encryption in Organizations. 25-35 - Mechthild Stöwer, Tatjana Rubinstein:
Overcoming Obstacles: Encryption for Everyone! 36-45 - Burkhard Wiegel:
Securing Enterprise Email Communication on both Sides of the Firewall. 46-57 - Bernhard Doll, Dirk Emmerich, Ralph Herkenhöner, Ramona Kühn, Hermann de Meer:
On Location-determined Cloud Management for Legally Compliant Outsourcing. 61-73 - David Frith:
Cloud Deployments: Is this the End of N-Tier Architectures? 74-86 - Ammar Alkassar, Michael Gröne, Norbert Schirmer:
Secure Partitioning of Application Logic In a Trustworthy Cloud. 87-97 - Antonio González Robles, Norbert Pohlmann, Christoph Engling, Hubert A. Jäger, Edmund Ernst:
Doubtless Identification and Privacy Preserving of User in Cloud Systems. 98-108 - Christian Thiel, Christoph Thiel:
Industry 4.0 - Challenges in Anti-Counterfeiting. 111-120 - David Ott, Claire Vishik, David Grawrock, Anand Rajan:
Trust Evidence for IoT: Trust Establishment from Servers to Sensors. 121-131 - Claire Vishik, Marcello Balduccini:
Making Sense of Future Cybersecurity Technologies: Using Ontologies for Multidisciplinary Domain Analysis. 135-145 - Roger Bollhalder, Christian Thiel
, Thomas Punz:
How the God Particle will Help You Securing Your Assets. 146-156 - Ulrich Lang, Rudolf Schreiner:
Proximity-Based Access Control (PBAC) using Model-Driven Security. 157-170 - Olivier Delos, Tine Debusschere, Marijke De Soete, Jos Dumortier, Riccardo Genghini, Hans Graux, Sylvie Lacroix, Gianluca Ramunno, Marc Sel, Patrick Van Eecke:
A pan-European Framework on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market. 173-195 - Peter Lipp:
Signature Validation - a Dark Art? 196-205 - Marc Sel:
A Comparison of Trust Models. 206-215 - Mihai Togan, Ionut Florea:
A Reference Model for a Trusted Service Guaranteeing Web-content. 216-224 - Libor Neumann:
Architectural Elements of a Multidimensional Authentication. 227-239 - Norbert Pohlmann, Markus Hertlein, Pascal Manaras:
Bring Your Own Device For Authentication (BYOD4A) - The Xign-System. 240-250 - Wanpeng Li, Chris J. Mitchell:
Addressing Threats to Real-World Identity Management Systems. 251-259 - Alessandro Guarino:
Information Security Standards in Critical Infrastructure Protection. 263-269 - Maarten Truyens:
Data Protection Tensions in Recent Software Development Trends. 270-285 - Eberhard von Faber:
Changing the Security Mode of Operation in a Global IT Organization with 20000+ Technical Staff. 286-304

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.