ISSE/SECURE 2007 Securing Electronic Business Processes
|
|
|
- Vincent Scott
- 10 years ago
- Views:
Transcription
1 Norbert Pohlmann Helmut Reimer Wolfgang Schneider ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference With 140 illustrations vieweg
2 Preface xi About this Book xiii Welcome xv Microsoft: A Trustworthy Vision for Computing xvii Legal, Technical and Social Aspects of Security ^_ 1 Regulating Information Security: A Matter of Principle? 3.Andreas Mitrakas Silvia Portesi ISTPA Operational Analysis of International Privacy Requirements 18 John T. Sabp The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet ' ' 26 Murdoch Watney Data Encryption on File Servers 38 Janusz Gebusia Setting up an Effective'Information Security Awareness Programme 49 Dirk De Maeyer Saferinternet.pl Project - Educational Activities for Internet Safety in Poland 59 Anna Rywczyriska Agnieszka Wrzesieh Is Cyber Tribalism Winning Online Information Warfare? 65 Godfried Williams Johnnes Arreymbi
3 Phishing Across Interaction Channels: Methods, Experience and Best Practice 73 Philip Hoyer IT-Security Beyond Borders - an Assessment of Trust Levels Across Europe 82 Christian Wernberg-Tougaard Analyzing and Improving the Security of Internet Elections ' 93 Adam Wierzbicki Krzystof Pietrzak Remote Access Mechanics as a Source of Threats to Enterprise Network Infrastructure. 102 Paulina Januszkiewicz Marek Pyka "Private Investigation" in the Computer Environment: Legal Aspects 110 Arkadiusz Lach Identity, Information Security and Rights Management 115 Design Rationale behind the Identity Metasystem Architecture 117 Kim Cameron Michael B. Jones Federated ID Management - Tackling Risk and Credentialing Users 130 Marc Speltens Patrick Patterson Information Security Governance for Executive Management, 136 Yves Le Roux Model Driven Security for Agile SOA-Style Environments 147 Ulrich Lang Rudolf Schreiner v The Business Perspective on Roles Including Root Causes of Implementation Problems ^ 157 Marc Sel ' A Security Architecture for Enterprise Rights Management 166 Ammar Alkassar Rani Husseiki Christian Stiible Michael Hartmann
4 vii Rights Management Technologies: A Good Choice for Securing Electronic Health Records? 178 Milan Petkovic Stefan Katzenbeisser Klaus Kursawe Case Studies from Fuzzing Bluetooth, WiFi and WiMAX 188 Sami Petajasoja Ari Takaneh Mikko Varpiola Heikki Kortti Evaluation of the Possible Utilization of anti-spam Mechanisms Against spit 196 Christian Dietrich Malte Hesse Modeling Trust Management and Security of Information 207 Anna Felkner Tomasz Jordan Kruk Smart Tokens, eld Cards, Infrastructure Solutions and Interoperability 217 Infrastructure for Trusted Environment: In Search of a Solution., 219 Claire Vishik Simon Johnson David Hoffman Integrity Check of Remote Computer SystemsTrusted Network Connect 228 Marian Jungbauer Norbert Pohlmann Technical Guidelines for Implementation and Utilization of RFID-based Systems Cord Bartels Harald Kelter High Density Smart Cards:New Security Challenges and Applications 251 Helena Handschuh Elena Trichina ID Cards in Practice ^ 260 Detlef Houdeau Large Scale Fingerprint Applications: Which Technology Should be Used? _ 266 Andreas M. Wolf
5 From the ecard-api-framework Towards a Comprehensive eld-framework for Europe 276 Detlef Huhnlein Manuel Bach ; j Making Digital Signatures Work across National Borders 287 Jon 0lnes Anette Andresen Leif Buene Olga Cerrato Havard Grindheim Financial Fraud Information Sharing ; Sharon Boeyen Enterprise Key Management Infrastructure " 306 Arshad Noor Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays '"' '" '' "'- ; ' ' " "''''- ' 313 Jorge Guajardo Sandeep S. Kumar Klaus Kursawe Geert-Jan Schrijen Pirn Tuyls Security Evaluation and Testing - Past, Present and Future 322 Peter Fischer Economics of Security and PKI Applications 329 Managing Information Security in Small and Medium Sized Enterprises: A Holistic Approach 331 Anas Tawileh Jeremy Hilton Stephen Mclntosh, EKIAS - Success Criteria of PKI Implementations / 340 Anja Beyer Sophie Hellmann Malte Hesse Friedrich Holl Peter Morcinek SachanPaulus Helmut Reimer Embedded PKI in Industrial Facilities 347 Marcus Hanke SIM-enabled Open Mobile Payment System Based on Nation-wide PKI. 355 Elena Trichina Konstantin Hypponen Marko Hassinen
6 Evidence Record Syntax 367 Tobias Gondrom PKI and Entitlement 376 Guido v. d. Heidt Reinhard Schoepf Future Diffusion of PKI-Technology - A German Delphi Study 386 Michael Gaude The Introduction of Health Telematics in Germany 396 Dirk Drees The German Identity Card - Concepts and Applications 401 Andreas Reisen Infrastructures for Identification and Identity Documents 405 Walter Landvogt The Security Infrastructure of the German Core Application in Public Transportation 411 Joseph Lutgen Applications of Citizen Portals 419 Hannes Ziegler Virtual Post Office in Practice _, 427 Wilhelm Weisweber Frank Planitzer Index 437
What is the Right Security Solution for Mobile Computing? #RSAC
SESSION ID: SPO1-T09 Trust in Mobile Enterprise Have We Lost the Game? MODERATOR: Prof. Dr. Norbert Pohlmann Professor Computer Science Department for Information Security, Director of the Institute for
Doing Better Business in Germany
Doing Better Business in Germany Direct Investments Commerce and Trade Initial Orientation and Guidance for Clients and Legal Counsel Abroad Doing Better Business in Germany Doing Better Business in Germany
Making Digital Signatures Work across National Borders
Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det
About the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium
preliminary Conference Programme Day 1 Tuesday 22 nd October 2013 09.00 10.00 Registration open, morning coffee 10.00 11.30 Opening Introduction by Norbert Pohlmann, Chairman, TeleTrusT & Director, if(is),
Paul M. Diffenderfer Samir El-Assal. Microsoft Dynamics NAV
Paul M. Diffenderfer Samir El-Assal Microsoft Dynamics NAV IT Stochastic Petri Nets by Falko Bause and Pieter S. Kritzinger From Enterprise Architecture to IT Governance by Klaus D. Niemann ISSE/SECURE
CROSS-BORDER INVESTMENTS WITH GERMANY- TAX, LEGAL AND ACCOUNTING
CROSS-BORDER INVESTMENTS WITH GERMANY- TAX, LEGAL AND ACCOUNTING In Honour of Detlev J. Plltz Published by the Partners of Flick Gocke Schaumburg Editorial Team: Prof. Dr. Thomas Rödder, Dr. Jochen Bahns
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
Identity & Privacy Protection
Identity & Privacy Protection An Essential Component for a Federated Access Ecosystem Dan Turissini - CTO, WidePoint Corporation [email protected] 703 246 8550 CyberSecurity One of the most serious economic
ISO/IEC 24727 for secure mobile web applications
ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, [email protected] 2 Infineon Technologies AG, [email protected]
Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.
Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password
IT-Security. Perspective, History, Present and Future
IT-Security Perspective, History, Present and Future Prof. Dr. Norbert Pohlmann Chairman of the Board TeleTrusT Germany Association http://www.teletrust.de Content TeleTrusT Germany IT Security and Trustworthiness
Network Security. Windows 2012 Server. Securing Your Windows. Infrastructure. Network Systems and. Derrick Rountree. Richard Hicks, Technical Editor
Windows 2012 Server Network Security Securing Your Windows Network Systems and Infrastructure Derrick Rountree Richard Hicks, Technical Editor AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN
Public Key Applications & Usage A Brief Insight
Public Key Applications & Usage A Brief Insight Scenario :: Identification, Authentication & Non- Repudiation :: Confidentiality :: Authenticity, requirements and e-business Integrity for electronic transaction
Egyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
InfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
Defending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
Welcome to cryptovision. cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com
Welcome to cryptovision cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Just who is cryptovision? 2 cryptovision Headquarters: Gelsenkirchen, Germany Subsidiary:
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected]
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected] This project has received funding from the European Union s Seventh Framework Programme for research, technological development
Identity: The Key to the Future of Healthcare
Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital
Egypt s E-Signature & PKInfrastructure
EGYPT-MCIT ITIDA Egypt s E-Signature & PKInfrastructure Seminar on Electronic Signature Algeria 8-9 Dec. 2009 By: Hisham Mohamed Abdel Wahab Head of the E-Signature CA Licensing ITIDA- MCIT EGYPT Email:
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
OECD workshop on digital identity management BELGIAN approach
OECD workshop on digital identity management BELGIAN approach FEDICT Frank LEYMAN Trondheim - 08/05/2007 Information security in Belgium > Government disposes of data: Identification data, fiscal data,
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker
ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill
Lectures taught in English at HFU last update March 2012
Lectures taught in English at HFU last update March 2012 Bachelor Level SS = Summer Semester (Mid-March to July) WS = Winter Semester (October to February) Campus Furtwangen SS WS 1 Faculty of Computer
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
PKI - current and future
PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki [email protected] SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi
Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business
Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles
Electronic Citizen Identities and Strong Authentication
Electronic Citizen Identities and Strong Authentication Sanna Suoranta, Lari Haataja, Tuomas Aura Department of Computer Science Aalto University Finland Sanna Suoranta [email protected] Content
IoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance
Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance December 2, 2011 Powered by the Federal Chief Information Officers Council and the Federal Enterprise Architecture
FIREEYE CYBER ADVANCED SECURITY SOLUTIONS FOR NEW BREED CYBER ATTACKS
White Paper FIREEYE CYBER ADVANCED SECURITY SOLUTIONS FOR NEW BREED CYBER ATTACKS FireEye www. Fireeye.com Executive summary This white paper presents the advanced security solutions designed by FireEye
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
eid Online Authentication Network Threat Model, Attacks and Implications
eid Online Authentication Network Threat Model, Attacks and Implications Christian J. Dietrich 1,2, Christian Rossow 1,3, and Norbert Pohlmann 1 1 Institute for Internet Security, University of Applied
Threats to Local Governments and What You Can Do to Mitigate the Risks
Association of Minnesota Counties Threats to Local Governments and What You Can Do to Mitigate the Risks Andrew Dolan Director of Government Affairs Multi-State Information Sharing and Analysis Center()
Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer
Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
Proposed Framework for an Interoperable Electronic Identity Management System
page 1 Proposed Framework for an Interoperable Electronic Identity Management System Amir Hayat 1, Thomas Rössler 1 Several Member States in the European Union (EU)have rolled out electronic identity (eid)
23.9.2015. Kangas Cybersecurity strategy
Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures
Welcome to the. Business School of. the University of Mannheim!
Welcome to the Business School of the University of Mannheim! The University of Mannheim Reasons for choosing us in a nutshell Best Business School in Germany Triple accreditation (AACSB, EQUIS and AMBA)
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
IDaaS: Managed Credentials for Local & State Emergency Responders
IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com
Department of Veteran Affairs. Fred Catoe Office of Cyber and Information Security AAIP Project Manager March 2004
Department of Veteran Affairs Fred Catoe Office of Cyber and Information Security AAIP Project Manager March 2004 Background Smart Cards are a subset of a larger Authentication and Authorization Infrastructure
Challenges in Delivering Large-scale Services over Cloud Environments
Computation World 2014 Panel CLOUD/SERVICES Challenges in Delivering Large-scale Services over Cloud Environments Moderator Christoph Reich, Furtwangen University of Applied Science, Germany Panelists
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Table of Contents Abstract... 3
Haj-Hamed 2 Table of Contents Abstract... 3 Introduction... 4 Current Situation... 4 User Profiles... 5 Table 1 User Profile Form... 6 Figure 1. DLP s Diagram... 7 Technical elements... 7 Budget... 8 Figure
Security Issues in Cross-border Electronic Authentication
Risk Assessment Report February 10 Security Issues in Cross-border Electronic Authentication www.enisa.europa.eu 2 Security Issues in Cross-border Electronic Authentication 1 About ENISA The European Network
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Finger Vein digital biometric signature: use cases
Finger Vein digital biometric signature: use cases Arkadiusz Buroń Presales & Account Director Information Systems Group Serock, 2015-09-23 Agenda 1. Introduction to Finger Vein technology 2. Digital biometric
How To Get A Cloud Service For A Small Business
Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business
Simple Guide to Digital Signatures
Simple Guide to Digital Signatures Rohas Nagpal Asian School of Cyber Laws About the author Rohas Nagpal is the founder President of Asian School of Cyber Laws. He advises Governments and corporates around
ACH fraud: The problem Why ACH? Why now? Security evolution How to protect ACH. Combating the Newest Attack Method ACH Fraud Webinar agenda
Combating the Newest Attack Method ACH Fraud Webinar agenda ACH fraud: The problem Why ACH? Attack methods Dynamics of ACH Why now? Action taken Weakness exposed Security evolution How to protect ACH Webinar:
Industrie 4.0; Sicherheitsmechanismen für die Produktion. 14. Deutscher IT-Sicherheitskongress; Andreas Philipp
Industrie 4.0; Sicherheitsmechanismen für die Produktion 14. Deutscher IT-Sicherheitskongress; Andreas Philipp Utimaco HSM Aachen, Germany 2015 Page 1 At a glance 1... 2... 3... Headquarters in Aachen
THE FACILITY MANAGER'S GUIDE TO INFORMATION TECHNOLOGY
THE FACILITY MANAGER'S GUIDE TO INFORMATION TECHNOLOGY GEOFF WILLIAMS MICHAEL MAY Table of Contents Preface Michael May, Geoff Williams xv 1 The Relationship Between FM and IT 1 Kevin Janus 2 Technologies
ATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
Strategic Information Technology and Portfolio Management
Strategic Information Technology and Portfolio Management Albert Wee Kwan Tan National University of Singapore, Singapore Petros Theodorou Athens University of Economics and Business, Greece Information
SAMPLE. Insider Trading Chronology. Microsoft Corp (MSFT) Gates, William H. III -- 2,000,000 Shs. (0.25%)
Insider buys Price Chart Insider sells Hastings, Reed -- 77,000 Shs. (43.5%) Turner, Brian Kevin -- 234,000 Shs. (29.17%) Gates, William H. III -- 2,000,000 Shs. (0.25%) Gates, William H. III -- 2,000,000
Keywords: German electronic ID card, e-government and e-business applications, identity management
From Student Smartcard Applications to the German Electronic Identity Card Lucie Langer, Axel Schmidt, Alex Wiesmaier Technische Universität Darmstadt, Department of Computer Science, Darmstadt, Germany
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities
PROTECT YOUR WORLD. Identity Management Solutions and Services
PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and
Industry 4.0: Cyber-Security Challenges on the Horizon
Industry 4.0: Cyber-Security Challenges on the Horizon Threats in Industry 4.0 and IoT Impact on medical equipment Solutions Oliver Winzenried Co-Founder and CEO [email protected] 2015-04-21 MEDTEC:
Secure Data Management in Trusted Computing
1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU
Biometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku
Biometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku Agenda 1. Biometric e-signature: what is it? 2. Possible Biometric Signature Applications 3. Biometric Electronic
GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches
GFSU Certified Cyber Crime Investigator GFSU-CCCI 1. Internet Fundamentals 2. Cyber Crime Essentials 3. Cyber Investigation Essentials 4. Digital Evidence in Computer Devices 5. Cyber Forensics Essentials
IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)
Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving
SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.
SIP SECURITY Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne WILEY A John Wiley and Sons, Ltd., Publication Foreword About the Authors Acknowledgment xi xiii xv 1 Introduction
CYBER SECURITY STRATEGY AN OVERVIEW
CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without
