Listing 1 - 10 of 10 |
Sort by
|
Choose an application
This book presents the most interesting talks given at ISSE 2012 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: Information Security Strategy; Enterprise and Cloud Computing Security Security and Privacy; Impact of Green Energy; Human Factors of IT Security Solutions for Mobile Applications; Identity & Access Management Trustworthy Infrastructures; Separation & Isolation EU Digital Agenda; Cyber Security: Hackers & Threats Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2012. Content Information Security Strategy - Enterprise and Cloud Computing Security - Security and Privacy - Impact of Green Energy - Human Factors of IT Security - Solutions for Mobile Applications - Identity & Access Management - Trustworthy Infrastructures - Separation & Isolation - EU Digital Agenda - Cyber Security: Hackers & Threats Target Groups Developers of Electronic Business Processes IT Managers IT Security Experts Researchers The Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westfälische University for Applied Sciences Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT.
Computer networks -- Access control -- Congresses. --- Computer networks -- Security measures -- Congresses. --- Electronic commerce -- Security measures -- Congresses. --- Engineering & Applied Sciences --- Computer Science --- Information Technology --- Computer Science (Hardware & Networks) --- Electronic commerce --- Security measures --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer Science. --- Computer Science, general. --- Commerce --- Information superhighway --- Informatics --- Science
Choose an application
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.
Computer Science. --- Systems and Data Security. --- Economics/Management Science, general. --- Computer Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Computer science. --- Computer network architectures. --- Data protection. --- Data structures (Computer science). --- Economics. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Structures de données (Informatique) --- Economie politique --- Architectures --- Computer networks --- Data encryption (Computer science) --- Electronic commerce --- Computers --- Security measures --- Economic aspects --- Access control --- Computer networks - Security measures - Economic aspects - Congresses --- Data encryption (Computer science) - Economic aspects - Congresses --- Electronic commerce - Security measures - Congresses --- Computers - Access control - Economic aspects - Congresses
Choose an application
This book presents the most interesting talks given at ISSE 2008 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.
Computer networks -- Access control -- Congresses. --- Computer networks -- Security measures -- Congresses. --- Electronic commerce -- Security measures -- Congresses. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer Science --- Computer networks --- Electronic commerce --- Security measures --- Access control --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Commerce --- Information superhighway --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.
Computer security --- Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Data communication systems --- Transmission of data --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Security measures --- Computer networks --- Sécurité informatique --- Infrastructure à clé publique (Sécurité informatique) --- Données --- Commerce électronique --- Entreprises --- Congresses --- Congrès --- Transmissions --- Sécurité --- Mesures --- Réseaux d'ordinateurs --- EPUB-LIV-FT SPRINGER-B --- Computer security - Congresses --- Public key infrastructure (Computer security) - Congresses --- Data transmission systems - Security measures - Congresses --- Electronic commerce - Security measures - Congresses --- Business enterprises - Computer networks - Security measures - Congresses --- Congresses.
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Systèmes informatiques --- Confiance --- Ordinateurs --- Sécurité informatique --- Commerce électronique --- Reliability --- Congresses --- Access control --- Security measures --- Fiabilité --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer security -- Congresses. --- Computer systems -- Reliability -- Congresses. --- Computers -- Access control -- Congresses. --- Electronic books. -- local. --- Electronic commerce -- Security measures -- Congresses. --- Trust -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Trust (Psychology) --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Commerce --- Information superhighway --- Attitude (Psychology) --- Emotions
Choose an application
The Sixth International Financial Cryptography Conference was held during March 11-14, 2002, in Southampton, Bermuda. As is customary at FC, these proceedings represent "final" versions of the papers presented, revised to take into account comments and discussions from the conference. Submissions to the conference were strong, with 74 papers submitted and 19 accepted for presentation and publication. (Regrettably, three of the submit ted papers had to be summarily rejected after it was discovered that they had been improperly submitted in parallel to other conferences.) The small program committee worked very hard under a tight schedule (working through Christmas day) to select the program. No program chair could ask for a better committee; my thanks to everyone for their hard work and dedication. In addition to the refereed papers, the program included a welcome from the Minister of Telecommunications and e-Commerce, Renee Webb, a keynote address by Nigel Hickson, and a panel on privacy tradeoffs cheiired by Rebecca Wright (with panelists Ian Goldberg, Ron Rivest, and Graham Wood). The traditional Tuesday evening "rump session" was skillfully officiated by Markus Jakobsson. My job as program chair was made much, much easier by the excellent work of our general chair, Nicko van Someren, who performed the miracle of hiding from me any evidence of the innumerable logistical nightmares associated with conducting this conference. I have no idea how he did it, but it must have involved many sleepless nights.
Computer networks -- Security measures -- Congresses. --- Data encryption (Computer science) -- Congresses. --- Electronic commerce -- Security measures -- Congresses. --- Electronic funds transfers -- Security measures -- Congresses. --- Internet -- Security measures -- Congresses. --- Electronic funds transfers --- Data encryption (Computer science) --- Electronic commerce --- Internet --- Computer networks --- Banking --- Finance --- Business & Economics --- Security measures --- DARPA Internet --- Internet (Computer network) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Digital cash --- Digital currency --- Digital money --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Virtual money --- Computer science. --- Finance. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Management information systems. --- E-commerce. --- Computer Science. --- Data Encryption. --- Finance, general. --- Computer Communication Networks. --- Operating Systems. --- Management of Computing and Information Systems. --- e-Commerce/e-business. --- Wide area networks (Computer networks) --- World Wide Web --- Commerce --- Information superhighway --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Information Systems. --- Cryptology. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Funding --- Funds --- Economics --- Currency question --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Operating systems --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing
Choose an application
Electronic funds transfers --- Data encryption (Computer science) --- Electronic commerce --- Internet --- Computer networks --- Monnaie électronique --- Chiffrement (Informatique) --- Security measures --- Congresses --- Sécurité --- Mesures --- Périodiques --- Congrès --- Computer science. --- Information technology. --- Business --- Finance. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Finance, general. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- IT in Business. --- Algorithm Analysis and Problem Complexity. --- Data processing. --- Monnaie électronique --- Congresses. --- Sécurité --- Périodiques --- Congrès --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Funding --- Funds --- Economics --- Currency question --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Business—Data processing. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Communication systems --- Distributed processing --- Foundations --- Electronic funds transfers - Security measures - Congresses --- Data encryption (Computer science) - Congresses --- Electronic commerce - Security measures - Congresses --- Internet - Security measures - Congresses --- Computer networks - Security measures - Congresses
Choose an application
Electronic funds transfers --- Data encryption (Computer science) --- Electronic commerce --- Internet --- Computer networks --- Chiffrement (Informatique) --- Security measures --- Congresses --- Congrès --- Banking --- Finance --- Business & Economics --- Congrès --- DARPA Internet --- Internet (Computer network) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Digital cash --- Digital currency --- Digital money --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Virtual money --- Computer science. --- Operating systems (Computers). --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Management information systems. --- Public finance. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Public Economics. --- Systems and Data Security. --- Data Encryption. --- Operating Systems. --- Management of Computing and Information Systems. --- Wide area networks (Computer networks) --- World Wide Web --- Commerce --- Information superhighway --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Data structures (Computer scienc. --- Information Systems. --- Data Structures and Information Theory. --- Cryptology. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cameralistics --- Public finance --- Currency question --- Operating systems --- Protection --- Public finances --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems --- Electronic funds transfers - Security measures - Congresses --- Data encryption (Computer science) - Congresses --- Electronic commerce - Security measures - Congresses --- Internet - Security measures - Congresses --- Computer networks - Security measures - Congresses
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Financial Cryptography and Data Security, FC 2009, held in Accra Beach, Barbados, in February 2009. The 20 revised full papers and 1 revised short papers presented together with 1 panel report and 1 keynote address were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on economics of information security, anonymity and privacy, private computation, authentication and identification, fraud detection and auctions.
Computer security -- Congresses. --- Data encryption (Computer science) -- Congresses. --- Electronic commerce -- Security measures -- Congresses. --- Electronic funds transfers -- Security measures -- Congresses. --- Internet -- Security measures -- Congresses. --- Computer Science --- Banking --- Finance --- Engineering & Applied Sciences --- Business & Economics --- Data encryption (Computer science) --- Electronic commerce --- Electronic funds transfers --- Security measures --- Digital cash --- Digital currency --- Digital money --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Virtual money --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Distributed processing --- Commerce --- Information superhighway --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Choose an application
This volume constitutes the proceedings of the 4th International Conference on E-Technologies, MCETECH 2009, held in Ottawa, Canada, during May 4-6, 2009. The 23 full and 4 short papers included in this volume were carefully reviewed and selected from a total of 42 submissions. They cover topics such as inter-organzational processes, service-oriented architectures, security and trust, middleware infrastructures, open source and open environments, and applications including eGovernment, eEducation, and eHealth.
Business enterprises --Data processing --Congresses. --- Business intelligence --Computer network resources --Congresses. --- Electronic commerce --Computer networks --Congresses. --- Electronic commerce --Security measures --Congresses. --- Electronic commerce --Technological innovations --Congresses. --- Web services --Congresses. --- Electronic commerce --- Business intelligence --- Business enterprises --- Web services --- Marketing & Sales --- Commerce --- Business & Economics --- Technological innovations --- Computer networks --- Security measures --- Computer network resources --- Data processing --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business espionage --- Competitive intelligence --- Corporate intelligence --- Economic espionage --- Espionage, Business --- Espionage, Economic --- Espionage, Industrial --- Industrial espionage --- Intelligence, Business --- Intelligence, Corporate --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Information technology. --- Business --- Database management. --- Application software. --- E-commerce. --- Computer engineering. --- Computer Science. --- e-Commerce/e-business. --- Database Management. --- Computer Engineering. --- IT in Business. --- Information Systems Applications (incl. Internet). --- Computer Appl. in Administrative Data Processing. --- Data processing. --- Computers --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- IT (Information technology) --- Technology --- Telematics --- Knowledge management --- Informatics --- Science --- Design and construction --- Business ethics --- Competition, Unfair --- Industrial management --- Confidential business information --- Information systems. --- Business—Data processing. --- Electronic commerce. --- Computer networks. --- Business information services. --- Information technology --- e-Commerce and e-Business. --- Computer Engineering and Networks. --- Computer and Information Systems Applications. --- Computer Application in Administrative Data Processing. --- Management. --- Information services --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing
Listing 1 - 10 of 10 |
Sort by
|