ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 ConferenceHelmut Reimer, Norbert Pohlmann, Wolfgang Schneider This book presents the most interesting talks given at ISSE 2014 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014. |
Contents
1 | |
Security Management CISO Inside | 33 |
Trust Services eID and Cloud Security | 79 |
Cybersecurity Cybercrime Critical Infrastructures | 120 |
BYOD and Mobile Security | 175 |
Other editions - View all
Common terms and phrases
activities addition allow analysis application approach assurance attack authentication authorization benefits build called certificate Cloud communication complete computing connected considered cost countries create cryptographic cyber defined described devices Directive discussed document effective electronic elements encryption espionage European example existing function ID card identified identity implementation important increase industry infrastructure integrity Internet issues Key Management means measures methods mobile operations organizations performed physical platform possible practices present proposed protection protocols qualified recording References regulation request requirements result risk routing secret server service provider sharing signature smart solutions specific standardization steganography storage stored tachograph technical techniques term testing threats tion trust types validation vulnerabilities