default search action
11th ISSE 2009: The Hague, The Netherlands
- Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider:
ISSE 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009. Vieweg+Teubner 2010, ISBN 978-3-8348-0958-2 - Vittorio Bertocci:
Claims and Identity: On-Premise and Cloud Solutions. 1-13 - Eberhard von Faber:
Measuring Information Security: Guidelines to Build Metrics. 17-26 - Marc Sel, Kristof Van Der Auwera:
Demystifying SAP security. 27-36 - Rolf von Roessing:
The ISACA Business Model for Information Security: An Integrative and Innovative Approach. 37-47 - Fabien Cavenne:
ICT Systems Contributing to European Secure-by-Design Critical Infrastructures. 48-62 - Philip Hoyer:
ROI, Pitfalls and Best Practices with an Enterprise Smart Card Deployment. 63-71 - Jon Ølnes, Leif Buene, Anette Andresen, Håvard Grindheim, Jörg Apitzsch, Adriano Rossi:
A General Quality Classification System for eIDs and e-Signatures. 72-86 - Detlef Houdeau:
Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals. 87-93 - Jos Dumortier, Frank Robben:
User and Access Management in Belgian e-Government. 97-107 - Phil D'Angio, Panos Vassilliadas, Phaidon Kaklamanis:
PKI - Crawling Out of the Grave & Into the Arms of Government. 108-115 - Gerry Gebel, Alice Wang:
Entitlement Management: Ready to Enter the IdM Mainstream. 116-124 - Markus Wichmann, Guido von der Heidt, Carsten Hille, Gunnar Jacobson:
Secure E-Mail Communication across Company Boundaries Experiences and Architectures. 125-136 - Bernd Hohgräfe, Sebastian Jacobi:
Voice Biometrics as a Way to Self-service Password Reset. 137-144 - Michael Menzel, Ivonne Thomas, Benjamin Schüler, Maxim Schnjakin, Christoph Meinel:
Security Requirements Specification in Process-aware Information Systems. 145-154 - Reinder Wolthuis, Gerben Broenink, Frank Fransen, Sven Schultz, Arnout de Vries:
Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home. 157-168 - Werner Degenhardt, Johannes Wiele:
Social Engineering hits Social Commerce. 169-176 - Anja Beyer, Christiane Westendorf:
How to Establish Security Awareness in Schools. 177-186 - Walter Peissl:
Privacy and Security - a Way to Manage the Dilemma. 187-196 - Claire Vishik, Giusella Finocchiaro:
Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing Environment. 197-205 - Dave Singelée, Stefaan Seys:
User Privacy in RFID Networks. 206-215 - Manuel García-Cervigón Gutiérrez, Juan Vázquez Pongilupi, Manel Medina Llinàs:
Web Sessions Anomaly Detection in Dynamic Environments. 216-220 - Martin Oczko:
KryptoNAS: Open source based NAS encryption. 223-229 - Peter Kai Wimmer:
Secure Network Zones. 230-241 - Franco Ruggieri:
ETSI Specifications for Registered E-Mail REM. 242-254 - Arno Fiedler, Selma Gralher:
Acceptance of Trust Domains in IT-Infrastructures. 255-261 - Mathias Neuhaus, Jörg Wolff, Norbert Zisky:
Proposal for an IT Security Standard for Preventing Tax Fraud in Cash Registers. 262-269 - Wendy Goucher:
The Operational Manager - Enemy or Hero of Secure Business Practice? 270-278 - Ton van Opstal:
A Structured Approach to Software Security. 281-290 - Endre Bangerter, Manuel Barbosa, Daniel J. Bernstein, Ivan Damgård, Daniel Page, Jakob Illeborg Pagter, Ahmad-Reza Sadeghi, Sampo Sovio:
Using Compilers to Enhance Cryptographic Product Development. 291-301 - John Colley:
Why Secure Coding is not Enough: Professionals' Perspective. 302-311 - Ari Takanen:
Proactive Security Testing and Fuzzing. 312-319 - Nick Pope:
Protecting Long Term Validity of PDF documents with PAdES-LTV. 320-327 - Brecht Wyseur:
RE-TRUST: Trustworthy Execution of SW on Remote Untrusted Platforms. 328-338 - Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Claire Vishik:
Future of Assurance: Ensuring that a System is Trustworthy. 339-348 - Klaus Schmeh:
A Taxonomy of Cryptographic Techniques for Securing Electronic Identity Documents. 349-356
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.