Advertisement

ISSE 2004 — Securing Electronic Business Processes

Highlights of the Information Security Solutions Europe 2004 Conference

  • Authors
  • Sachar Paulus
  • Norbert Pohlmann
  • Helmut Reimer

Table of contents

  1. Front Matter
    Pages i-x
  2. Strategy

  3. Technology

    1. Front Matter
      Pages 87-87
    2. Burt Kaliski
      Pages 108-116
    3. Ulrich Lang, Rudolf Schreiner
      Pages 138-147
    4. Thomas Obert
      Pages 148-159
    5. Darko Kirovski, Nebojša Jojić, Gavin Jancke
      Pages 160-175
  4. Application

    1. Front Matter
      Pages 177-177
    2. Andreas Mitrakas
      Pages 179-185
    3. Paul Meadowcroft
      Pages 186-197
    4. Marco Casassa Mont
      Pages 198-208
    5. Georg Lindsberger, Gerold Pinter, Alexander Egger
      Pages 228-236
    6. Tobias Straub, Matthias Fleck, Ralf Grewe, Oliver Lenze
      Pages 237-249
    7. Daniel Baer, Andreas Philipp, Norbert Pohlmann
      Pages 250-258
    8. José Pina Miranda, João Melo
      Pages 259-267
  5. Practice

    1. Front Matter
      Pages 269-269
    2. Werner Freystätter, Samu Konttinen
      Pages 290-298
    3. Aysegul Ibrisim, Rasim Yilmaz
      Pages 299-308
    4. InKyung Jeun, Jaeil Lee, SangHwan Park
      Pages 309-320
    5. Milan Marković
      Pages 321-332
    6. Paolo Balboni
      Pages 333-345
    7. Oliver Altmeyer, Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble
      Pages 346-361
  6. Back Matter
    Pages 363-370

About this book

Introduction

This book presents the most interesting talks given at ISSE 2004 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information.
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2004.

Keywords

Biometrics Corporate Governance Critical Infrastructure Cryptography Data Protection Information Security PKI Privacy Risk Management SPAM Smart Cards Trust Computing biometrics business process Datenschutz distributed systems information privacy information security Information Technology (IT) IT security management privacy risk management security simulation technology web service

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-322-84984-7
  • Copyright Information Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH, Wiesbaden 2004
  • Publisher Name Vieweg+Teubner Verlag
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-528-05910-1
  • Online ISBN 978-3-322-84984-7
  • Buy this book on publisher's site