ISSE 2004 — Securing Electronic Business Processes: Highlights Of The Information Security Solutions Europe 2004 Conference

Front Cover
Springer Science & Business Media, 2004 - Computers - 370 pages
The Information Security Solutions Europe Conference (ISSE) was started in 1999 by EEMA and TeleTrusT with the support of the European Commission and the German Federal Minis try of Technology and Economics. Today the annual conference is a fixed event in every IT security professional's calendar. The aim of ISSE is to support the development of a Euro pean information security culture and especially a cross-border framework for trustworthy IT applications for citizens, industry and administration. Therefore, it is important to take into consideration both international developments and European regulations and to allow for the interdisciplinary character of the information security field. In the five years of its existence ISSE has thus helped shape the profile of this specialist area. The integration of security in IT applications was initially driven only by the actual security issues considered important by experts in the field; currently, however, the economic aspects of the corresponding solutions are the most important factor in deciding their success. ISSE offers a suitable podium for the discussion of the relationship between these considerations and for the presentation of the practical implementation of concepts with their technical, or ganisational and economic parameters.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

True Economics of a Security Infrastructure
3
ROI+ Methodology to Justify Security Investment
12
Implications for eSecurity
23
The Role of Attack Simulation in Risk Management Automation
30
Secure ICT Architectures for Efficient Detection and Response
38
Technical Legal and Policy Issues
47
New Initiatives and New Needs for Privacy Enhancing Technologies
58
Data Protection Aspects of the Digital Rights Management
66
The Key to My OnLine Security
186
Dealing with Privacy Obligations in Enterprises
198
From Theory to Practice in the Real World
209
Electronic Signatures Key for Effective elnvoicing Processes
219
Legally Binding Cross Boarder Electronic Invoicing
228
SecMGW An OpenSource Enterprise Gateway for Secure EMail
237
Web Service Security XKMS TrustPoint
250
Tech Biz and Postal Services Meeting Point
259

Big Brother does not Keep your Assets Safe
75
Technology
87
Business Drivers Use Cases and Key Business Considerations
89
An Overview
99
Challenges and Progress
108
Lightweight PKIEnabling through the Service of a Central Signature Server
117
New Threats Need Novel AntiVirus Measures
127
A ModelDriven Security Framework for Distributed Systems
138
Is Grid Computing more Secure?
148
TamperResistant Biometric IDs
160
Application
177
Spam is Here to Stay
179
Practice
269
Infrastructure Protection Information Sharing Systems
271
Legal Status of Qualified Electronic Signatures in Europe
281
The Finnish Ecosystem for Mobile Signatures
290
eTransformation Turkey Project
299
Asia PKI Interoperability Guideline
309
Recent PKI Experiences in Serbia
321
CCTV and Workplace Privacy Italy
333
Enhancing Security of Computing Platforms with TCTechnology
346
Index
363
Copyright

Other editions - View all

Common terms and phrases

About the author (2004)

Dr Sachar Paulus is Security Strategist with the SAP AG, Walldorf, Germany.
Norbert Pohlmann is Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen, Germany.
Prof. Helmut Reimer is Chief Executive Officer of TeleTrusT, Germany.

Bibliographic information