default search action
14th ISSE 2012: Brussels, Belgium
- Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider:
ISSE 2012 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Belgium, October 23-24, 2012. Springer 2012, ISBN 978-3-658-00332-6 - Thorsten Scharmatinat:
Data Loss Prevention in Real Life. 1-8 - Lenka Fibíková, Roland Müller:
Threats, Risks and the Derived Information Security Strategy. 11-20 - Werner Wüpper, Iryna Windhorst:
Information Security Management - Best Practice Guidelines for Managers. 21-36 - Mechthild Stöwer, Reiner Kraft:
IT Security Investment and Costing Emphasizing Benefits in Times of Limited Budgets. 37-47 - Frederik Humpert-Vrielink, Nina Vrielink:
A Modern Approach on Information Security Measurement. 48-53 - Marc Sel:
e-Identity - Monetization and Interoperability. 54-63 - Cataldo Basile, Antonio Lioy, Stefano Paraboschi:
The PoSecCo Security Decision Support System. 64-74 - Patrick Michaelis:
Enterprise Mobility - A Balancing Act between Security and Usability. 75-79 - Eberhard von Faber, Wolfgang Behnsen:
A Systematic Holistic Approach for Providers to Deliver Secure ICT Services. 80-88 - Ulrich Lang, Rudolf Schreiner:
Implementing Least Privilege for Interconnected, Agile SOAs/Clouds. 89-102 - Alfredo Rial, George Danezis:
Privacy-Preserving Smart Metering. 105-115 - Markus Bartsch:
Smart Metering, Common Criteria and European Privacy Needs. 116-127 - Dieter Bong, Andreas Philipp:
Securing the Smart Grid with Hardware Security Modules. 128-136 - Elham Rajabian Noghondar, Konrad Marfurt, Bernhard M. Hämmerli:
The Human Aspect in Data Leakage Prevention in Academia. 137-146 - Daniel Borleteau, Nicolas Bousquet, Thierry Crespo, Xavier Dubarry, Jan Eichholz, Virginie Galindo:
Security of Mobile Devices, Applications and Transactions. 149-160 - Philip Hoyer:
Management and Use of ID Credentials on NFC Enabled Phones: Use Cases, Challenges, Technologies and Standards. 161-170 - Manuel García-Cervigón, Roberto Morales:
Malware Detection in Ubiquitous Environments. 171-179 - Thomas Esbach, Walter Fumy, Olga Kulikovska, Dominik Merli, Dieter Schuster, Frederic Stumpf:
A New Security Architecture for Smartcards Utilizing PUFs. 180-194 - Libor Neumann, Tomás Halman, Pavel Rotek, Alexander Boettcher, Julian Stecklina, Michal Sojka, David Nuñez, Isaac Agudo:
Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity. 195-206 - Muhammad Asim, R. Paul Koster, Milan Petkovic, Martin Rosner:
eConsent Management and Enforcement in Personal Telehealth. 209-216 - Florian Skopik, Thomas Bleier, Roman Fiedler:
Information Management and Sharing for National Cyber Situational Awareness. 217-227 - Sebastian Feld, Norbert Pohlmann, Michael Sparenberg, Bastian C. Wichmann:
Analyzing G-20's Key Autonomus Systems and their Intermeshing using As-Analyzer. 228-242 - Claire Vishik, David Ott, David Grawrock:
Intention Semantics and Trust Evidence. 243-251 - Michael Gröne, Marcel Winandy:
Applying a Security Kernel Framework to Smart Meter Gateways. 252-259 - Ammar Alkassar, Steffen Schulz, Christian Stüble, Sven Wohlgemuth:
Securing Smartphone Compartments: Approaches and Solutions. 260-268 - Juan Carlos Cruellas, Andrea Caccia, Konrad Lanz, Giulana Marzola, Luigi Rizzo, Laurent Velez:
ETSI STF 428 - Accelerating Deployment of Interoperable Electronic Signatures in Europe. 271-281 - Jon Ølnes:
PEPPOL - Experience from Four Years Work on eSignature Interoperability. 282-295 - Enno Rey, Pascal Turbing, Daniel Mende, Matthias Luft:
Exploiting Virtual File Formats for Fun and Profit. 296-305 - Václav Jirovský:
Anonymous, a new Civil Disobedience Phenomenon. 306-315 - Claire Vishik, Ruby B. Lee, Fred Chong:
Building Technologies that Help Cyber-Defense: Hardware-enabled Trust. 316-325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.