E-Book, Englisch, 370 Seiten, eBook
Paulus / Pohlmann / Reimer ISSE 2004 — Securing Electronic Business Processes
2004
ISBN: 978-3-322-84984-7
Verlag: Vieweg & Teubner
Format: PDF
Kopierschutz: 1 - PDF Watermark
Highlights of the Information Security Solutions Europe 2004 Conference
E-Book, Englisch, 370 Seiten, eBook
ISBN: 978-3-322-84984-7
Verlag: Vieweg & Teubner
Format: PDF
Kopierschutz: 1 - PDF Watermark
The Information Security Solutions Europe Conference (ISSE) was started in 1999 by EEMA and TeleTrusT with the support of the European Commission and the German Federal Minis try of Technology and Economics. Today the annual conference is a fixed event in every IT security professional's calendar. The aim of ISSE is to support the development of a Euro pean information security culture and especially a cross-border framework for trustworthy IT applications for citizens, industry and administration. Therefore, it is important to take into consideration both international developments and European regulations and to allow for the interdisciplinary character of the information security field. In the five years of its existence ISSE has thus helped shape the profile of this specialist area. The integration of security in IT applications was initially driven only by the actual security issues considered important by experts in the field; currently, however, the economic aspects of the corresponding solutions are the most important factor in deciding their success. ISSE offers a suitable podium for the discussion of the relationship between these considerations and for the presentation of the practical implementation of concepts with their technical, or ganisational and economic parameters.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Strategy.- True Economics of a Security Infrastructure.- ROI+ Methodology to Justify Security Investment.- Basel II and Beyond: Implications for e-Security.- The Role of Attack Simulation in Risk Management Automation.- Secure ICT Architectures for Efficient Detection and Response.- Biometric Identity Cards: Technical, Legal, and Policy Issues.- New Initiatives and New Needs for Privacy Enhancing Technologies.- Data Protection Aspects of the Digital Rights Management.- Big Brother does not Keep your Assets Safe.- Technology.- Identity Federation: Business Drivers, Use Cases, and Key Business Considerations.- Trusted Computing and its Applications: An Overview.- RFID Privacy: Challenges and Progress.- Light-weight PKI-Enabling through the Service of a Central Signature Server.- Massmailers: New Threats Need Novel Anti-Virus Measures.- OpenPMF: A Model-Driven Security Framework for Distributed Systems.- Is Grid Computing more Secure?.- Tamper-Resistant Biometric IDs.- Application.- Spam is Here to Stay.- The Key to My On-Line Security.- Dealing with Privacy Obligations in Enterprises.- Trusted Computing: From Theory to Practice in the Real World.- Electronic Signatures — Key for Effective e-Invoicing Processes.- Legally Binding Cross Boarder Electronic Invoicing.- SecMGW — An Open-Source Enterprise Gateway for Secure E-Mail.- Web Service Security — XKMS (TrustPoint).- EPM: Tech, Biz and Postal Services Meeting Point.- Practice.- Managing Trust in Critical Infrastructure Protection Information Sharing Systems.- Legal Status of Qualified Electronic Signatures in Europe.- The Finnish Ecosystem for Mobile Signatures.- e-Transformation Turkey Project.- Asia PKI Interoperability Guideline.- Recent PKI Experiences in Serbia.- CCTV and Workplace Privacy — Italy.-Enhancing Security of Computing Platforms with TC-Technology.