


default search action
9th ISSE/SECURE 2007: Warsaw, Poland
- Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider:

ISSE/SECURE 2007 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe/SECURE 2007 Conference, Warsaw, Poland, September 25-27, 2007. Vieweg+Teubner 2007, ISBN 978-3-8348-0346-7 - Andreas Mitrakas, Silvia Portesi:

Regulating Information Security: A Matter of Principle? 3-17 - John T. Sabo:

ISTPA Operational Analysis of International Privacy Requirements. 18-25 - Murdoch Watney

:
The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet. 26-37 - Janusz Gebusia:

Data Encryption on File Servers. 38-48 - Dirk De Maeyer:

Setting up an Effective Information Security Awareness Programme. 49-58 - Anna Rywczynska, Agnieszka Wrzesien:

Saferinternet.pl Project - Educational Activities for Internet Safety in Poland. 59-64 - Godfried Williams, Johnnes Arreymbi:

Is Cyber Tribalism Winning Online Information Warfare? 65-72 - Philip Hoyer:

Phishing Across Interaction Channels: Methods, Experience and Best Practice. 73-81 - Christian Wernberg-Tougaard:

IT-Security Beyond Borders - an Assessment of Trust Levels Across Europe. 82-92 - Adam Wierzbicki

, Krzystof Pietrzak:
Analyzing and Improving the Security of Internet Elections. 93-101 - Paulina Januszkiewicz, Marek Pyka:

Remote Access Mechanics as a Source of Threats to Enterprise Network Infrastructure. 102-109 - Arkadiusz Lach:

"Private Investigation" in the Computer Environment: Legal Aspects. 110-113 - Kim Cameron, Michael B. Jones:

Design Rationale behind the Identity Metasystem Architecture. 117-129 - Marc Speltens, Patrick Patterson:

Federated ID Management - Tackling Risk and Credentialing Users. 130-135 - Yves Le Roux:

Information Security Governance for Executive Management. 136-146 - Ulrich Lang, Rudolf Schreiner:

Model Driven Security for Agile SOA-Style Environments. 147-156 - Marc Sel:

The Business Perspective on Roles Including Root Causes of Implementation Problems and Proven Ways to Overcome them. 157-165 - Ammar Alkassar, Rani Husseiki, Christian Stüble, Michael Hartmann:

A Security Architecture for Enterprise Rights Management. 166-177 - Milan Petkovic, Stefan Katzenbeisser, Klaus Kursawe:

Rights Management Technologies: A Good Choice for Securing Electronic Health Records? 178-187 - Sami Petäjäsoja, Ari Takanen, Mikko Varpiola, Heikki Kortti:

Case Studies from Fuzzing Bluetooth, WiFi and WiMAX. 188-195 - Christian Dietrich, Malte Hesse:

Evaluation of the Possible Utilization of anti-spam Mechanisms Against spit. 196-206 - Anna Felkner

, Tomasz Jordan Kruk:
Modeling Trust Management and Security of Information. 207-216 - Claire Vishik, Simon Johnson, David Hoffman:

Infrastructure for Trusted Environment: In Search of a Solution. 219-227 - Marian Jungbauer, Norbert Pohlmann:

Integrity Check of Remote Computer Systems Trusted Network Connect. 228-237 - Cord Bartels, Harald Kelter:

Technical Guidelines for Implementation and Utilization of RFID-based Systems. 238-250 - Helena Handschuh, Elena Trichina:

High Density Smart Cards: New Security Challenges and Applications. 251-259 - Detlef Houdeau:

ID Cards in Practice. 260-265 - Andreas M. Wolf:

Large Scale Fingerprint Applications: Which Technology Should be Used? 266-275 - Detlef Hühnlein, Manuel Bach:

From the eCard-API-Framework Towards a Comprehensive eID-Framework for Europe. 276-286 - Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim:

Making Digital Signatures Work across National Borders. 287-296 - Sharon Boeyen:

Financial Fraud Information Sharing. 297-305 - Arshad Noor:

Enterprise Key Management Infrastructure. 306-312 - Jorge Guajardo, Sandeep S. Kumar, Klaus Kursawe, Geert Jan Schrijen

, Pim Tuyls:
Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays. 313-321 - Peter Fischer:

Security Evaluation and Testing - Past, Present and Future. 322-328 - Anas Tawileh, Jeremy Hilton

, Stephen McIntosh:
Managing Information Security in Small and Medium Sized Enterprises: A Holistic Approach. 331-339 - Anja Beyer, Sophie Hellmann, Malte Hesse, Friedrich Holl, Peter Morcinek, Sachar Paulus, Helmut Reimer:

EKIAS - Success Criteria of PKI Implementations. 340-346 - Marcus Hanke:

Embedded PKI in Industrial Facilities. 347-354 - Elena Trichina, Konstantin Hyppönen, Marko Hassinen:

SIM-enabled Open Mobile Payment System Based on Nation-wide PKI. 355-366 - Tobias Gondrom:

Evidence Record Syntax - a new International Standard for Long-Term Archiving of Electronic Documents and Signed Data. 367-375 - Guido von der Heidt, Reinhard Schoepf:

PKI and Entitlement - Key Information Security Management Solutions for Business and IT Compliance. 376-385 - Michael Gaude:

Future Diffusion of PK1-Technology - A German Delphi Study. 386-395 - Dirk Drees:

The Introduction of Health Telematics in Germany. 396-400 - Andreas Reisen:

The German Identity Card - Concepts and Applications. 401-404 - Walter Landvogt:

Infrastructures for Identification and Identity Documents. 405-410 - Joseph Lutgen:

The Security Infrastructure of the German Core Application in Public Transportation. 411-418 - Hannes Ziegler:

Applications of Citizen Portals. 419-426 - Wilhelm Weisweber, Frank Planitzer:

Virtual Post Office in Practice. 427-436

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














