ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference
Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider
Springer Science & Business Media, Jan 17, 2011 - Computers - 416 pages
This book presents the most interesting talks given at ISSE 2010 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes.
The topics include:
- Identity and Security Management
- Technical and Economical Aspects of Cloud Security
- Security Services and Large Scale Public Applications
- Smart Grid Security and Emerging Security Solutions
- Privacy and Data Protection
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2010.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Technical and Economical Aspects of Cloud Security
Security Services and Large Scale Public Applications
Privacyand Data Protection
Threats and Countermeasures
Smart Grid Security and Future Aspects
Biometries and Teehnieal Solutions
eID and the new German Identity Card
Other editions - View all
2010 Securing Electronic analysis application approach architecture attacker authentication biometric botnet certificate challenges citizen client cloud computing Cloud Security cloud services communication compliance components data protection defined Deutsche Post devices digital signature document domain eDelivery eGovernment eID server Electronic Business Processes electronic signature encrypted example framework fraud function German ID card identified identity management identity management system implementation Information Security infrastructure integration interface internal Internet interoperability IPsec ISACA ISSE 2010 Securing issues layer malware mechanisms middleware module monitoring online banking OpenID OpenID provider operation organisation parties personal data phishing platform Pohlmann et al.(eds protocol pseudonym public key requirements response risk scenarios Securing Electronic Business service provider smart card Smart Grid smart meters specific SPOCS Springer Fachmedien Wiesbaden standards STORK Symmetric Key technical threat agents tion trust vendor verified Vieweg+Teubner Verlag Wiesbaden GmbH 2011