did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783834800114

Isse 2005 -Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference

by ; ;
  • ISBN13:

    9783834800114

  • ISBN10:

    3834800112

  • Format: Paperback
  • Copyright: 2005-11-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00

Summary

This book presents the most interesting talks given at ISSE 2005 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state of the art: best papers of the Conference ISSE 2005.

Table of Contents

Preface xi
About this Book xiii
Microsoft and its European Initiatives xv
Technology
1(134)
Federated Identity: A Progress Report
3(7)
Gerry Gebel
Identity Federation -- Introduction, Value & Evolution
10(11)
J. Matthew Gardiner
Pseudonymous Authentication and Authorization enhancing ubiquitous Identity Management
21(9)
Thomas Hildmann
Thomas J. Wilke
Identity Federation within the Telecommunications Industry: Case Study
30(9)
Heather Hinton
Mark Vandenwauver
Emerging Trends in strong Authentication: OATH, OTPS and EMV/CAP
39(13)
Philip Hoyer
Security Scheme for ad-hoc Networks
52(10)
Harry Kalligeros
Stathes Hadjiefthymiades
Dimitris Frantzeskakis
An electronic Signature Infrastructure for mobile Devices
62(12)
Ma Dolores Barnes
Daniel S. Gomez
Antonio F. Gomez-Skarmeta
Maria Martinez
Antonio Ruiz
Daniel Sanchez
Co-sourcing Remote Management of Mobile Security -- The Missing Link
74(9)
Frank Jorissen
Aspect-Oriented Security for Web-Applications
83(9)
Nicolai Kuntze
Thomas Rauch
Andreas U. Schmidt
Combined Trusted Platform Modules and Smart Card Solutions
92(6)
Dr. Florian Gawlas
Dr. Ulrich Stutenbaumer
Understanding and Leveraging the Trusted Platform Module
98(9)
Jan De Clercq
The Regulatory Framework for Trusted Time Services in Europe
107(13)
Jos Dumortier
Hannelore Dekeyser
Sharing Resources through Communities of Interest
120(15)
Kevin Foltz
Coimbatore Chandersekaran
Applications
135(176)
Privacy Policy Enforcement in Enterprises: Addressing Regulatory Compliance and Governance Needs
137(12)
Marco Casassa Mont
Robert Thyne Pete Bramhall
Kwok-Nga Chan
Legal and Business Implications of Data Protection: A Transatlantic Discussion
149(12)
Demetrios Eleftheriou
Attacks against Information Systems: The EU legal Framework
161(8)
Peter Van de Velde
RFID and Privacy: A difficult Marriage?
169(10)
Dr. Patrick Van Eecke
Georgia Skouma
Legal Aspects of Security in e-Contracting with Electronic Agents
179(10)
Irene Kafeza
Eleanna Kafeza
Dickson K.W. Chiu
Managing the Legal Risk in Providing Online Quality Certification Services in EU
189(12)
Paolo Balboni
ROBIN, a Biometrics-based Security Environment at the Dutch Court Organization
201(9)
Dieter Bong
Jeen de Swaart
ePassports and Biometrics: Experiences and Lessons Learned
210(10)
Andreas Wolf
Multimodal Biometric Authentication: an Example
220(9)
Madalina Baltatu
Rosalia D'Alessandro
Roberta D'Amico
The Italian Innovative Approach to ICT Security Certification (ISO 15408)
229(5)
Luisa Franchina
Franco Guida
Daniele Perucchini
Secure USB Media Considerations for a Common Criteria Protection Profile
234(8)
Henning Arendt
Marcel Weinand
How to dematerialize tendering to RFPs and tenders opening Processes?
242(9)
Sylvie Lacroix
Olivier Delos
Integrated IT Security: Air-Traffic Management Case Study
251(9)
Dr. Ulrich Lang
Rudolf Schreiner
DECWEB - Internet fiscal Statement Submission
260(8)
Mihai Ianciu
Costin Burdun
Ionut Florea
Concept of supporting advanced Patient Rights by the German Health Card
268(6)
Bruno Struif
Report on the European Research Project Inspired: The Future of Smart Cards
274(8)
Andreas Linke
Laurent Manteau
The European Digital Passport -- Assessing the Technological Impact on Border Management Process
282(7)
Alfred Gottwald
Dr. Detlef Houdeau
Online Banking: Spoofing Scams exposes Security Loopholes
289(12)
Johnnes Arreymbi
Standards and Projects for enabling secure eHealth Interoperability in Europe
301(10)
Bernd Blobel
Security Management
311(130)
Using ISO 17799, COBIT & ITIL for solving Compliance Issue
313(11)
Yves Le Roux
Using GIS Tools to assess the Vulnerability of the Internet
324(11)
Neil E. Robinson
Collaboration and the Extended Workplace: Real-Time Productivity Gains, Real-Time Risk Management
335(10)
Jack Nagle
Integration of Management Systems
345(5)
Aysegul Ibrisim
Dilek Ozeren
A Return on Security Investment Model for large Enterprises
350(10)
Gunter Bitz
Assessing the Economics of Electronic Security
360(10)
Johnnes Arreymbi
Godfried Williams
Strategic Research Agenda for Security and Dependability in R&D
370(11)
James J. Clarke
William M. Fitzgerald
Cross-border Recognition of Electronic Certificates: Results of the IDABC Bridge/Gateway Certification Authority Pilot Project
381(8)
Gzim Ocakoglu
Path Validation Conformance Testing
389(12)
Sharon Boeyen
The Virtual MailOpening: Usable Cryptography in German e-Government
401(11)
Christian Mrugalla
Modelling and Securing European Justice Workflows
412(10)
Stefano Crosta
Jean-Christophe Pazzaglia
Hendrik Schottle
Secure Virtual Organisations: Protocols and Requirements
422(10)
Omer Rana
Jeremy Hilton
Liviu Joita
Pete Burnap
Jaspreet Singh Pahwa
John Miles
W. Alex Gray
A Usable Security Paradigm for Information Asset Protection
432(9)
Corrado Ronchi
S. Zakhidov
Index 441

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program