eBook ISSE 2013 Securing Electronic Business Processes, 1st Edition

  • Published By:
  • ISBN-10: 3658033711
  • ISBN-13: 9783658033712
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 282 Pages | eBook
  • Original Copyright 2013 | Published/Released April 2014
  • This publication's content originally published in print form: 2013
  • Price:  Sign in for price

About

Overview

This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:- Cloud Security, Trust Services, eId & Access Management- Human Factors, Awareness & Privacy, Regulations and Policies- Security Management- Cyber Security, Cybercrime, Critical Infrastructures- Mobile Security & ApplicationsAdequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
Contents.
About this Book.
1: Cloud Security, Trust Services, eId & Access Management.
2: Draft of a Dynamic Malware Detection System on Trustworthy Endpoints.
3: The Evolution of Authentication.
4: Security Challenges of Current Federated eID Architectures.
5: Worldbank’s Secure eID Toolkit for Africa.
6: The INDI Ecosystem of Privacy-Aware, User-Centric Identity.
7: Human Factors, Awareness & Privacy, Regulations & Policies.
8: Enhancing Transparency with Distributed Privacy-Preserving Logging.
9: Data Protection and Data Security by Design Applied to Financial Intelligence.
10: A Security Taxonomy that Facilitates Protecting an Industrial ICT Production and How it Really Provides Transparency.
11: A Practical Signature Policy Framework.
12: Facing the Upheaval: Changing Dynamics for Security Governance in the EU.
13: Alternative Authentication – What does it Really Provide?.
14: Security Management.
15: Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment.
16: Executive Career Paths in Information Security Management.
17: Positioning Information Security Roles, Processes and Interactions.
18: Safe Browsing.
19: Security Compliance Monitoring – The Next Evolution of Information Security Management?!.
20: Cybersecurity, Cybercrime, Critical Infrastructures.
21: Digital Forensics as a Big Data Challenge.
22: Security in Critical Infrastructures – Future Precondition for Operating License?.
23: A Practical Approach for an it Security Risk Analysis in Hospitals.
24: When does Abuse of Social Media Constitute a Crime? – A South African Legal Perspective Within a Global Context.
25: Mobile Security & Applications.
26: Protected Software Module Architectures.
27: Securing Communication Devices via Physical Unclonable Functions (PUFs).
28: Secure Mobile Government and Mobile Banking Systems Based on Android Clients.
Index.