Search dblp for Publications

export results for "toc:db/conf/isse/isse2009.bht:"

 download as .bib file

@proceedings{DBLP:conf/isse/2009,
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  publisher    = {Vieweg+Teubner},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5},
  doi          = {10.1007/978-3-8348-9363-5},
  isbn         = {978-3-8348-0958-2},
  timestamp    = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/BangerterBBDPPS09,
  author       = {Endre Bangerter and
                  Manuel Barbosa and
                  Daniel J. Bernstein and
                  Ivan Damg{\aa}rd and
                  Daniel Page and
                  Jakob Illeborg Pagter and
                  Ahmad{-}Reza Sadeghi and
                  Sampo Sovio},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Using Compilers to Enhance Cryptographic Product Development},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {291--301},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_29},
  doi          = {10.1007/978-3-8348-9363-5\_29},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isse/BangerterBBDPPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Bertocci09,
  author       = {Vittorio Bertocci},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Claims and Identity: On-Premise and Cloud Solutions},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {1--13},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_1},
  doi          = {10.1007/978-3-8348-9363-5\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Bertocci09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/BeyerW09,
  author       = {Anja Beyer and
                  Christiane Westendorf},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {How to Establish Security Awareness in Schools},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {177--186},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_17},
  doi          = {10.1007/978-3-8348-9363-5\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/BeyerW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Cavenne09,
  author       = {Fabien Cavenne},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {{ICT} Systems Contributing to European Secure-by-Design Critical Infrastructures},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {48--62},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_5},
  doi          = {10.1007/978-3-8348-9363-5\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Cavenne09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Colley09,
  author       = {John Colley},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Why Secure Coding is not Enough: Professionals' Perspective},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {302--311},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_30},
  doi          = {10.1007/978-3-8348-9363-5\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Colley09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/DAngioVK09,
  author       = {Phil D'Angio and
                  Panos Vassilliadas and
                  Phaidon Kaklamanis},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {{PKI} - Crawling Out of the Grave {\&} Into the Arms of Government},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {108--115},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_10},
  doi          = {10.1007/978-3-8348-9363-5\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/DAngioVK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/DegenhardtW09,
  author       = {Werner Degenhardt and
                  Johannes Wiele},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Social Engineering hits Social Commerce},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {169--176},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_16},
  doi          = {10.1007/978-3-8348-9363-5\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/DegenhardtW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/DumortierR09,
  author       = {Jos Dumortier and
                  Frank Robben},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {User and Access Management in Belgian e-Government},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {97--107},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_9},
  doi          = {10.1007/978-3-8348-9363-5\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/DumortierR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Faber09,
  author       = {Eberhard von Faber},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Measuring Information Security: Guidelines to Build Metrics},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {17--26},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_2},
  doi          = {10.1007/978-3-8348-9363-5\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Faber09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/FiedlerG09,
  author       = {Arno Fiedler and
                  Selma Gralher},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Acceptance of Trust Domains in IT-Infrastructures},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {255--261},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_25},
  doi          = {10.1007/978-3-8348-9363-5\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/FiedlerG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/GebelW09,
  author       = {Gerry Gebel and
                  Alice Wang},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Entitlement Management: Ready to Enter the IdM Mainstream},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {116--124},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_11},
  doi          = {10.1007/978-3-8348-9363-5\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/GebelW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Goucher09,
  author       = {Wendy Goucher},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {The Operational Manager - Enemy or Hero of Secure Business Practice?},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {270--278},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_27},
  doi          = {10.1007/978-3-8348-9363-5\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Goucher09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/GutierrezPL09,
  author       = {Manuel Garc{\'{\i}}a{-}Cervig{\'{o}}n Guti{\'{e}}rrez and
                  Juan V{\'{a}}zquez Pongilupi and
                  Manel Medina Llin{\`{a}}s},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Web Sessions Anomaly Detection in Dynamic Environments},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {216--220},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_21},
  doi          = {10.1007/978-3-8348-9363-5\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/GutierrezPL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/HohgrafeJ09,
  author       = {Bernd Hohgr{\"{a}}fe and
                  Sebastian Jacobi},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Voice Biometrics as a Way to Self-service Password Reset},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {137--144},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_13},
  doi          = {10.1007/978-3-8348-9363-5\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/HohgrafeJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Houdeau09,
  author       = {Detlef Houdeau},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Second Wave of Biometric ID-documents in Europe: The Residence Permit
                  for non-EU/EEA Nationals},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {87--93},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_8},
  doi          = {10.1007/978-3-8348-9363-5\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Houdeau09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Hoyer09,
  author       = {Philip Hoyer},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {ROI, Pitfalls and Best Practices with an Enterprise Smart Card Deployment},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {63--71},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_6},
  doi          = {10.1007/978-3-8348-9363-5\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Hoyer09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/MenzelTSSM09,
  author       = {Michael Menzel and
                  Ivonne Thomas and
                  Benjamin Sch{\"{u}}ler and
                  Maxim Schnjakin and
                  Christoph Meinel},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Security Requirements Specification in Process-aware Information Systems},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {145--154},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_14},
  doi          = {10.1007/978-3-8348-9363-5\_14},
  timestamp    = {Wed, 20 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isse/MenzelTSSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/NeuhausWZ09,
  author       = {Mathias Neuhaus and
                  J{\"{o}}rg Wolff and
                  Norbert Zisky},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Proposal for an {IT} Security Standard for Preventing Tax Fraud in
                  Cash Registers},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {262--269},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_26},
  doi          = {10.1007/978-3-8348-9363-5\_26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/NeuhausWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Oczko09,
  author       = {Martin Oczko},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {KryptoNAS: Open source based {NAS} encryption},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {223--229},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_22},
  doi          = {10.1007/978-3-8348-9363-5\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Oczko09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/OlnesBAGAR09,
  author       = {Jon {\O}lnes and
                  Leif Buene and
                  Anette Andresen and
                  H{\aa}vard Grindheim and
                  J{\"{o}}rg Apitzsch and
                  Adriano Rossi},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {A General Quality Classification System for eIDs and e-Signatures},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {72--86},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_7},
  doi          = {10.1007/978-3-8348-9363-5\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/OlnesBAGAR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Opstal09,
  author       = {Ton van Opstal},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {A Structured Approach to Software Security},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {281--290},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_28},
  doi          = {10.1007/978-3-8348-9363-5\_28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Opstal09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Peissl09,
  author       = {Walter Peissl},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Privacy and Security - a Way to Manage the Dilemma},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {187--196},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_18},
  doi          = {10.1007/978-3-8348-9363-5\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Peissl09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Pope09,
  author       = {Nick Pope},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Protecting Long Term Validity of {PDF} documents with PAdES-LTV},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {320--327},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_32},
  doi          = {10.1007/978-3-8348-9363-5\_32},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Pope09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Roessing09,
  author       = {Rolf von Roessing},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {The {ISACA} Business Model for Information Security: An Integrative
                  and Innovative Approach},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {37--47},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_4},
  doi          = {10.1007/978-3-8348-9363-5\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Roessing09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Ruggieri09,
  author       = {Franco Ruggieri},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {{ETSI} Specifications for Registered E-Mail {REM}},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {242--254},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_24},
  doi          = {10.1007/978-3-8348-9363-5\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Ruggieri09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/SadeghiVV09,
  author       = {Ahmad{-}Reza Sadeghi and
                  Ingrid Verbauwhede and
                  Claire Vishik},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Future of Assurance: Ensuring that a System is Trustworthy},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {339--348},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_34},
  doi          = {10.1007/978-3-8348-9363-5\_34},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isse/SadeghiVV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Schmeh09,
  author       = {Klaus Schmeh},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {A Taxonomy of Cryptographic Techniques for Securing Electronic Identity
                  Documents},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {349--356},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_35},
  doi          = {10.1007/978-3-8348-9363-5\_35},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Schmeh09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/SelA09,
  author       = {Marc Sel and
                  Kristof Van Der Auwera},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Demystifying {SAP} security},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {27--36},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_3},
  doi          = {10.1007/978-3-8348-9363-5\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/SelA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/SingeleeS09,
  author       = {Dave Singel{\'{e}}e and
                  Stefaan Seys},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {User Privacy in {RFID} Networks},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {206--215},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_20},
  doi          = {10.1007/978-3-8348-9363-5\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/SingeleeS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Takanen09,
  author       = {Ari Takanen},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Proactive Security Testing and Fuzzing},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {312--319},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_31},
  doi          = {10.1007/978-3-8348-9363-5\_31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Takanen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/VishikF09,
  author       = {Claire Vishik and
                  Giusella Finocchiaro},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing
                  Environment},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {197--205},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_19},
  doi          = {10.1007/978-3-8348-9363-5\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/VishikF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/WichmannHHJ09,
  author       = {Markus Wichmann and
                  Guido von der Heidt and
                  Carsten Hille and
                  Gunnar Jacobson},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Secure E-Mail Communication across Company Boundaries Experiences
                  and Architectures},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {125--136},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_12},
  doi          = {10.1007/978-3-8348-9363-5\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/WichmannHHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Wimmer09,
  author       = {Peter Kai Wimmer},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Secure Network Zones},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {230--241},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_23},
  doi          = {10.1007/978-3-8348-9363-5\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Wimmer09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/WolthuisBFSV09,
  author       = {Reinder Wolthuis and
                  Gerben Broenink and
                  Frank Fransen and
                  Sven Schultz and
                  Arnout de Vries},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Simple {\&} Secure: Attitude and behaviour towards security and
                  usability in internet products and services at home},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {157--168},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_15},
  doi          = {10.1007/978-3-8348-9363-5\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/WolthuisBFSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Wyseur09,
  author       = {Brecht Wyseur},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {{RE-TRUST:} Trustworthy Execution of {SW} on Remote Untrusted Platforms},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {328--338},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_33},
  doi          = {10.1007/978-3-8348-9363-5\_33},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Wyseur09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics