2012

ISSE 2012 Securing Electronic Business Processes

Highlights of the Information Security Solutions Europe 2012 Conference

Editors:

ISBN: 978-3-658-00332-6 (Print) 978-3-658-00333-3 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages 1-1

  2. About this Book

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 1-8

      Data Loss Prevention in Real Life

  3. Information Security Strategy Enterprise and Cloud Computing Security

    1. Front Matter

      Pages 9-9

    2. No Access

      Book Chapter

      Pages 11-20

      Threats, Risks and the Derived Information Security Strategy

    3. No Access

      Book Chapter

      Pages 21-36

      Information Security Management – Best Practice Guidelines for Managers

    4. No Access

      Book Chapter

      Pages 37-47

      IT Security Investment and Costing Emphasizing Benefits in Times of Limited Budgets

    5. No Access

      Book Chapter

      Pages 48-53

      A Modern Approach on Information Security Measurement

    6. No Access

      Book Chapter

      Pages 54-63

      e-Identity – Monetization and Interoperability

    7. No Access

      Book Chapter

      Pages 64-74

      The PoSecCo Security Decision Support System

    8. No Access

      Book Chapter

      Pages 75-79

      Enterprise Mobility – A Balancing Act between Security and Usability

    9. No Access

      Book Chapter

      Pages 80-88

      A Systematic Holistic Approach for Providers to Deliver Secure ICT Services

    10. No Access

      Book Chapter

      Pages 89-102

      Implementing Least Privilege for Interconnected, Agile SOAs/Clouds

  4. Security and Privacy Impact of Green Energy Human Factors of IT Security

    1. Front Matter

      Pages 103-103

    2. No Access

      Book Chapter

      Pages 105-115

      Privacy-Preserving Smart Metering

    3. No Access

      Book Chapter

      Pages 116-127

      Smart Metering, Common Criteria and European Privacy Needs

    4. No Access

      Book Chapter

      Pages 128-136

      Securing the Smart Grid with Hardware Security Modules

    5. No Access

      Book Chapter

      Pages 137-146

      The Human Aspect in Data Leakage Prevention in Academia

  5. Solutions for Mobile Applications Identity & Access Management

    1. Front Matter

      Pages 147-147

    2. No Access

      Book Chapter

      Pages 149-160

      Security of Mobile Devices, Applications and Transactions

    3. No Access

      Book Chapter

      Pages 161-170

      Management and Use of ID Credentials on NFC Enabled Phones: Use Cases, Challenges, Technologies and Standards

    4. No Access

      Book Chapter

      Pages 171-179

      Malware Detection in Ubiquitous Environments

    5. No Access

      Book Chapter

      Pages 180-194

      A New Security Architecture for Smartcards Utilizing PUFs

    6. No Access

      Book Chapter

      Pages 195-206

      Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity

  6. Trustworthy Infrastructures Separation & Isolation

    1. Front Matter

      Pages 207-207

    2. No Access

      Book Chapter

      Pages 209-216

      eConsent Management and Enforcement in Personal Telehealth

previous Page of 2