Book 2009

ISSE 2008 Securing Electronic Business Processes

Highlights of the Information Security Solutions Europe 2008 Conference

Editors:

ISBN: 978-3-8348-0660-4 (Print) 978-3-8348-9283-6 (Online)

Table of contents (44 chapters)

previous Page of 3
  1. Front Matter

    Pages i-xv

  2. Security Management and Economics of Security

    1. Front Matter

      Pages 1-1

    2. No Access

      Chapter

      Pages 3-19

      The Information Security Framework for Daimler Financial Services and its Implementation

    3. No Access

      Chapter

      Pages 20-29

      Information Security Status in Organisations 2008

    4. No Access

      Chapter

      Pages 30-38

      Quantified Trust Levels for Authentication

    5. No Access

      Chapter

      Pages 39-44

      Identity Management in Open Environments

    6. No Access

      Chapter

      Pages 45-56

      Identity management and privacy languages technologies: Improving user control of data privacy

    7. No Access

      Chapter

      Pages 57-76

      Security Economics and European Policy

    8. No Access

      Chapter

      Pages 77-83

      How Economy and Society affect Enterprise Security Management

    9. No Access

      Chapter

      Pages 84-89

      Information Security Industry: State of the Art

  3. Privacy, Data Protection and Awareness

    1. Front Matter

      Pages 91-91

    2. No Access

      Chapter

      Pages 93-98

      Freedom and Security — Responses to the Threat of International Terrorism

    3. No Access

      Chapter

      Pages 99-107

      The Anonymity vs. Utility Dilemma

    4. No Access

      Chapter

      Pages 108-118

      Governmental Control of the Internet in addressing Law Enforcement and National Security

    5. No Access

      Chapter

      Pages 119-127

      Theft of Virtual Property — Towards Security Requirements for Virtual Worlds

  4. Trusted Computing and Biometrics

    1. Front Matter

      Pages 129-129

    2. No Access

      Chapter

      Pages 131-138

      Trusted Storage: Putting Security and Data Together

    3. No Access

      Chapter

      Pages 139-143

      Trust in Consumer Electronics

    4. No Access

      Chapter

      Pages 144-151

      NAC 2.0 — Unifying Network Security

    5. No Access

      Chapter

      Pages 152-162

      Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect

    6. No Access

      Chapter

      Pages 163-171

      Empirical research of IP blacklists

    7. No Access

      Chapter

      Pages 172-180

      GIDRE: Grid-based Detection Intrusion and Response Environment

    8. No Access

      Chapter

      Pages 181-185

      Biometrics and ID Cards — Enablers for Personal Security

    9. No Access

      Chapter

      Pages 186-193

      Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases

previous Page of 3