Half Title Page.
About this Book.
1: Cloud Security, Trust Services, eId & Access Management.
2: Draft of a Dynamic Malware Detection System on Trustworthy Endpoints.
3: The Evolution of Authentication.
4: Security Challenges of Current Federated eID Architectures.
5: Worldbank’s Secure eID Toolkit for Africa.
6: The INDI Ecosystem of Privacy-Aware, User-Centric Identity.
7: Human Factors, Awareness & Privacy, Regulations & Policies.
8: Enhancing Transparency with Distributed Privacy-Preserving Logging.
9: Data Protection and Data Security by Design Applied to Financial Intelligence.
10: A Security Taxonomy that Facilitates Protecting an Industrial ICT Production and How it Really Provides Transparency.
11: A Practical Signature Policy Framework.
12: Facing the Upheaval: Changing Dynamics for Security Governance in the EU.
13: Alternative Authentication – What does it Really Provide?.
14: Security Management.
15: Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment.
16: Executive Career Paths in Information Security Management.
17: Positioning Information Security Roles, Processes and Interactions.
18: Safe Browsing.
19: Security Compliance Monitoring – The Next Evolution of Information Security Management?!.
20: Cybersecurity, Cybercrime, Critical Infrastructures.
21: Digital Forensics as a Big Data Challenge.
22: Security in Critical Infrastructures – Future Precondition for Operating License?.
23: A Practical Approach for an it Security Risk Analysis in Hospitals.
24: When does Abuse of Social Media Constitute a Crime? – A South African Legal Perspective Within a Global Context.
25: Mobile Security & Applications.
26: Protected Software Module Architectures.
27: Securing Communication Devices via Physical Unclonable Functions (PUFs).
28: Secure Mobile Government and Mobile Banking Systems Based on Android Clients.