Narrow your search

Library

KU Leuven (8)

ULB (8)

ULiège (8)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

VIVES (5)

UCLouvain (3)

EhB (1)

More...

Resource type

book (10)


Language

English (10)


Year
From To Submit

2012 (1)

2010 (1)

2009 (3)

2007 (1)

2005 (1)

More...
Listing 1 - 10 of 10
Sort by

Book
ISSE 2012 securing electronic business processes : highlights of the Information Security Solutions Europe 2012 conference
Authors: --- --- ---
ISBN: 3658003324 3658003332 1283935546 Year: 2012 Publisher: Wiesbaden : Springer Vieweg,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the most interesting talks given at ISSE 2012 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: Information Security Strategy; Enterprise and Cloud Computing Security Security and Privacy; Impact of Green Energy; Human Factors of IT Security Solutions for Mobile Applications; Identity & Access Management Trustworthy Infrastructures; Separation & Isolation EU Digital Agenda; Cyber Security: Hackers & Threats Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2012. Content Information Security Strategy - Enterprise and Cloud Computing Security - Security and Privacy - Impact of Green Energy - Human Factors of IT Security - Solutions for Mobile Applications - Identity & Access Management - Trustworthy Infrastructures - Separation & Isolation - EU Digital Agenda - Cyber Security: Hackers & Threats Target Groups Developers of Electronic Business Processes IT Managers IT Security Experts Researchers The Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westfälische University for Applied Sciences Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT.


Book
Economics of Information Security and Privacy
Authors: --- --- ---
ISBN: 9781441969675 9781441969668 1441969667 Year: 2010 Publisher: Boston MA Springer US

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.


Book
ISSE 2008 securing electronic business processes : highlights of the Information Security Solutions Europe 2008 Conference
Authors: --- --- ---
ISBN: 3834806609 3834892831 Year: 2009 Publisher: Wisebaden : Vieweg+Teubner Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the most interesting talks given at ISSE 2008 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.

Trust, privacy, and security in digital business : second International conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005 : proceedings
Authors: ---
ISSN: 03029743 ISBN: 3540282246 3540317961 9783540282242 Year: 2005 Volume: 3592 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.


Book
Trust management
Authors: ---
ISBN: 9780387736549 0387736549 0387736557 Year: 2007 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.

Financial cryptography : 6th International Conference, FC 2002, Southampton, Bermuda, March 11-14, 2002 : revised papers
Authors: ---
ISBN: 3540365044 354000646X Year: 2003 Publisher: Berlin, Germany : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Sixth International Financial Cryptography Conference was held during March 11-14, 2002, in Southampton, Bermuda. As is customary at FC, these proceedings represent "final" versions of the papers presented, revised to take into account comments and discussions from the conference. Submissions to the conference were strong, with 74 papers submitted and 19 accepted for presentation and publication. (Regrettably, three of the submit­ ted papers had to be summarily rejected after it was discovered that they had been improperly submitted in parallel to other conferences.) The small program committee worked very hard under a tight schedule (working through Christmas day) to select the program. No program chair could ask for a better committee; my thanks to everyone for their hard work and dedication. In addition to the refereed papers, the program included a welcome from the Minister of Telecommunications and e-Commerce, Renee Webb, a keynote address by Nigel Hickson, and a panel on privacy tradeoffs cheiired by Rebecca Wright (with panelists Ian Goldberg, Ron Rivest, and Graham Wood). The traditional Tuesday evening "rump session" was skillfully officiated by Markus Jakobsson. My job as program chair was made much, much easier by the excellent work of our general chair, Nicko van Someren, who performed the miracle of hiding from me any evidence of the innumerable logistical nightmares associated with conducting this conference. I have no idea how he did it, but it must have involved many sleepless nights.

Keywords

Computer networks -- Security measures -- Congresses. --- Data encryption (Computer science) -- Congresses. --- Electronic commerce -- Security measures -- Congresses. --- Electronic funds transfers -- Security measures -- Congresses. --- Internet -- Security measures -- Congresses. --- Electronic funds transfers --- Data encryption (Computer science) --- Electronic commerce --- Internet --- Computer networks --- Banking --- Finance --- Business & Economics --- Security measures --- DARPA Internet --- Internet (Computer network) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Digital cash --- Digital currency --- Digital money --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Virtual money --- Computer science. --- Finance. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Management information systems. --- E-commerce. --- Computer Science. --- Data Encryption. --- Finance, general. --- Computer Communication Networks. --- Operating Systems. --- Management of Computing and Information Systems. --- e-Commerce/e-business. --- Wide area networks (Computer networks) --- World Wide Web --- Commerce --- Information superhighway --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Information Systems. --- Cryptology. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Funding --- Funds --- Economics --- Currency question --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Operating systems --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing

Financial cryptography : third International conference, FC '99, Anguilla, British West Indies, February 22-25, 1999 : proceedings
Authors: ---
ISSN: 03029743 ISBN: 3540663622 354048390X 9783540663621 Year: 1999 Volume: 1648 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Electronic funds transfers --- Data encryption (Computer science) --- Electronic commerce --- Internet --- Computer networks --- Monnaie électronique --- Chiffrement (Informatique) --- Security measures --- Congresses --- Sécurité --- Mesures --- Périodiques --- Congrès --- Computer science. --- Information technology. --- Business --- Finance. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Finance, general. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- IT in Business. --- Algorithm Analysis and Problem Complexity. --- Data processing. --- Monnaie électronique --- Congresses. --- Sécurité --- Périodiques --- Congrès --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Funding --- Funds --- Economics --- Currency question --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Business—Data processing. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Communication systems --- Distributed processing --- Foundations --- Electronic funds transfers - Security measures - Congresses --- Data encryption (Computer science) - Congresses --- Electronic commerce - Security measures - Congresses --- Internet - Security measures - Congresses --- Computer networks - Security measures - Congresses

Financial cryptography : 5th International conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001 : proceedings
Authors: ---
ISSN: 03029743 ISBN: 3540440798 9783540440796 3540460888 Year: 2002 Volume: 2339 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Electronic funds transfers --- Data encryption (Computer science) --- Electronic commerce --- Internet --- Computer networks --- Chiffrement (Informatique) --- Security measures --- Congresses --- Congrès --- Banking --- Finance --- Business & Economics --- Congrès --- DARPA Internet --- Internet (Computer network) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Digital cash --- Digital currency --- Digital money --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Virtual money --- Computer science. --- Operating systems (Computers). --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Management information systems. --- Public finance. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Public Economics. --- Systems and Data Security. --- Data Encryption. --- Operating Systems. --- Management of Computing and Information Systems. --- Wide area networks (Computer networks) --- World Wide Web --- Commerce --- Information superhighway --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Data structures (Computer scienc. --- Information Systems. --- Data Structures and Information Theory. --- Cryptology. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cameralistics --- Public finance --- Currency question --- Operating systems --- Protection --- Public finances --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems --- Electronic funds transfers - Security measures - Congresses --- Data encryption (Computer science) - Congresses --- Electronic commerce - Security measures - Congresses --- Internet - Security measures - Congresses --- Computer networks - Security measures - Congresses


Book
Financial cryptography and data security : 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009 : revised selected papers
Authors: --- ---
ISBN: 3642035485 9786612331879 1282331876 3642035493 Year: 2009 Publisher: Berlin, Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Financial Cryptography and Data Security, FC 2009, held in Accra Beach, Barbados, in February 2009. The 20 revised full papers and 1 revised short papers presented together with 1 panel report and 1 keynote address were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on economics of information security, anonymity and privacy, private computation, authentication and identification, fraud detection and auctions.

Keywords

Computer security -- Congresses. --- Data encryption (Computer science) -- Congresses. --- Electronic commerce -- Security measures -- Congresses. --- Electronic funds transfers -- Security measures -- Congresses. --- Internet -- Security measures -- Congresses. --- Computer Science --- Banking --- Finance --- Engineering & Applied Sciences --- Business & Economics --- Data encryption (Computer science) --- Electronic commerce --- Electronic funds transfers --- Security measures --- Digital cash --- Digital currency --- Digital money --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Virtual money --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Distributed processing --- Commerce --- Information superhighway --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data


Book
E-Technologies: Innovation in an Open World : 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009, Proceedings
Authors: --- --- ---
ISBN: 3642011861 364201187X Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the proceedings of the 4th International Conference on E-Technologies, MCETECH 2009, held in Ottawa, Canada, during May 4-6, 2009. The 23 full and 4 short papers included in this volume were carefully reviewed and selected from a total of 42 submissions. They cover topics such as inter-organzational processes, service-oriented architectures, security and trust, middleware infrastructures, open source and open environments, and applications including eGovernment, eEducation, and eHealth.

Keywords

Business enterprises --Data processing --Congresses. --- Business intelligence --Computer network resources --Congresses. --- Electronic commerce --Computer networks --Congresses. --- Electronic commerce --Security measures --Congresses. --- Electronic commerce --Technological innovations --Congresses. --- Web services --Congresses. --- Electronic commerce --- Business intelligence --- Business enterprises --- Web services --- Marketing & Sales --- Commerce --- Business & Economics --- Technological innovations --- Computer networks --- Security measures --- Computer network resources --- Data processing --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business espionage --- Competitive intelligence --- Corporate intelligence --- Economic espionage --- Espionage, Business --- Espionage, Economic --- Espionage, Industrial --- Industrial espionage --- Intelligence, Business --- Intelligence, Corporate --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Information technology. --- Business --- Database management. --- Application software. --- E-commerce. --- Computer engineering. --- Computer Science. --- e-Commerce/e-business. --- Database Management. --- Computer Engineering. --- IT in Business. --- Information Systems Applications (incl. Internet). --- Computer Appl. in Administrative Data Processing. --- Data processing. --- Computers --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- IT (Information technology) --- Technology --- Telematics --- Knowledge management --- Informatics --- Science --- Design and construction --- Business ethics --- Competition, Unfair --- Industrial management --- Confidential business information --- Information systems. --- Business—Data processing. --- Electronic commerce. --- Computer networks. --- Business information services. --- Information technology --- e-Commerce and e-Business. --- Computer Engineering and Networks. --- Computer and Information Systems Applications. --- Computer Application in Administrative Data Processing. --- Management. --- Information services --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing

Listing 1 - 10 of 10
Sort by