


default search action
ISSE 2006: Rome, Italy
- Sachar Paulus, Norbert Pohlmann, Helmut Reimer:

ISSE 2006 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2006 Conference, 10-12 October 2006, Rome, Italy. Vieweg 2006, ISBN 978-3-8348-0213-2
RFID, e-ID Cards, Trusted Computing, Interoperability
- Zoi Talidou:

Radio Frequency Identification (RFID) and Data Protection Legal Issues. 3-16 - Graham Williamson:

e-ID and Smartcards - Current Status, Hopeful Developments and Best Practices. 17-24 - Detlef Houdeau:

European Citizen Card Combined with Travel Document Function, Convergence or Divergence? 25-29 - Pim Tuyls, Boris Skoric:

Physical Unclonable Functions for enhanced security of tokens and tags. 30-37 - Helena Handschuh, Elena Trichina:

Hardware Security Features for Secure Embedded Devices. 38-44 - Tom Kan, Tim Kerins, Klaus Kursawe:

Security in Next Generation Consumer Electronic Devices. 45-53 - Ammar Alkassar, Michael Scheibel, Michael Stübel, Ahmad-Reza Sadeghi, Marcel Winandy:

Security Architecture for Device Encryption and VPN. 54-63 - Bernhard Weiss:

TPM Enterprise Key Management requires centralized Hardware-based Security. 64-71 - Pius Alexander Benczek:

Implementation of DRM Systems under the EU Legal Framework. 72-94 - Angelika Jaschob, Lydia Tsintsifa:

IT-Grundschutz: Two-Tier Risk Assessment for a Higher Efficiency in IT Security Management. 95-101 - Stephan Spitz, Jens Urmann, Gisela Meister:

ISOIIEC 24727 - A Future Standard for Smart Card Middleware. 102-107 - Charles Brookson, Dionisio Zumerle:

Information Security Standardization - the ETSI Perspective. 108-118 - Nick Pope, Juan Carlos Cruellas:

Digital Signatures without the Headaches. 119-128 - Andreas M. Wolf:

Could Test Standards Help on the Way to Achieve Global e-Passport Interoperability? 129-138 - Philip Hoyer:

A New Standard Based Road to Interoperable Strong Authentication. 139-147
Identity Management, Biometrics, PKI-Solutions, Network Security
- Heather M. Hinton, Mark Vandenwauver:

Identifying Patterns of Federation Adoption. 151-160 - Manel Medina

, Miquel Colomer, Sandra Garcia Polo, Antoine de Poorter:
Fidelity: Federated Identity Management Security based on Liberty Alliance on European Ambit. 161-167 - Jan De Ciercq:

Deflecting Active Directory Attacks. 168-175 - Marko Vogel:

Implementing role based access control - How we can do it better! 176-185 - Marc Sel, Bart Van Rompay:

Identity and Access Control - Demonstrating Compliance. 186-195 - Tom A. M. Kevenaar, Geert Jan Schrijen

, Anton H. M. Akkermans, Marijn Damstra, Pim Tuyls, Michiel van der Veen:
Robust and Secure Biometrics: Some Application Examples. 196-203 - Gunter Bitz:

Selecting the Optimal Biometric 2-factor Authentication Method - a User's Viewpoint. 204-210 - Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandro:

A Face Recognition System for Mobile Phones. 211-217 - Antonio Ruiz-Martínez

, Daniel Sánchez-Martínez, C. Inmaculada Marín-López, Antonio Fernandez Gómez-Skarmeta:
Advanced certificate validation service for secure Service-Oriented Architectures. 218-227 - Robert Dulude, David Engberg, Seth Hitchings:

An Introduction to Validation for Federated PKIs. 228-240 - Jean-Christophe R. Pazzaglia, Stefano Crosta:

MADSig: Enhancing Digital Signature to Capture Secure Document Processing Requirements. 241-248 - Milan Markovic, Milos Kilibarda, Aleksandar Milosevic:

PKi Consolidation Project and Multiapplicative Smart Payment Cards. 249-258 - Antonio Lioy

:
Security Analysis and Configuration of Large Networks. 259-265 - Simone Ferraresi, Stefano Pesic, Livia Trazza, Andrea Baiocchi:

S-VPN Policy: Access List Conflict Automatic Analysis and Resolution. 266-274 - Feng Cheng, Christoph Meinel:

Lock-Keeper: A New Implementation of Physical Separation Technology. 275-286 - Aniello Castiglione

, Giuseppe Cattaneo
, Alfredo De Santis
, Fabio Petagna, Umberto Ferraro Petrillo:
SPEECH: Secure Personal End-to-End Communication with Handheld. 287-297 - Fabio Ricciato, Maura Turolla, Antonio Varriale:

Finding the Mobile Trusted Element. 298-307
Security Management, Applications
- Kevin Foltz, Coimbatore Chandersekaran:

Centrally Administered COIs Using Cross-Organizational Trust. 311-317 - Michael D. Barwise:

Improving Assurance of Information Security Rol. 318-325 - Anas Tawileh, Jeremy Hilton

, Steve McIntosh:
Modelling the Economics of Free and Open Source Software Security. 326-335 - Anthony J. Nadalin, Nataraj Nagaratnam, Maryann Hondo:

Securing service-oriented applications. 336-343 - Helena Rifà

, Francisco Jordan:
A Service Oriented Trust Development Platform. 344-355 - Geert Somers, Jos Dumortier

:
A Trust Label for Secure and Compliant e-ID Applications: The Belgian Experience. 356-362 - Giovanni Manca:

Electronic signature in Italy after ten years of "running in". 363-373
Awareness Raising, Compliance, Data Protection, Cyberspace Regulation
- Norbert Pohlmann, Marcus Proest:

Internet Early Warning System: The Global View. 377-386 - Wim Hafkamp:

IT Security Vulnerability and Incident Response Management. 387-395 - Yves Le Roux:

Blending Corporate Governance with Information Security. 396-404 - Marco Casassa Mont

:
On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context. 405-414 - Murdoch Watney

:
Regulation of State Surveillance of the Internet. 415-425 - Rytis Rainys:

How Can NRA Contribute to the Improvement of IT Security? 426-432 - Andreas Mitrakas:

Information Security Regulation: Tomorrow Never Dies? 433-438 - Shahbaz Ali, Jon G. Hall

:
Introducing Regulatory Compliance Requirements Engineering. 439-447 - Irene Kafeza, Eleanna Kafeza

, Felix Wai-Hon Chan:
Legal Issues in Secure Grid Computing Environments. 448-454 - Pieter Kleve, Richard V. de Mulder, Kees van Noortwijk:

The Impact of Monitoring Technology on the Law. 455-466

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














