ISSE/SECURE 2007 Securing Electronic Business Processes



Similar documents
What is the Right Security Solution for Mobile Computing? #RSAC

Doing Better Business in Germany

Making Digital Signatures Work across National Borders

About the Authors Preface Acknowledgements List of Acronyms

Achim Klabunde, Head of Sector IT Policy, European Data Protection Supervisor, Belgium

Paul M. Diffenderfer Samir El-Assal. Microsoft Dynamics NAV

CROSS-BORDER INVESTMENTS WITH GERMANY- TAX, LEGAL AND ACCOUNTING

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Glossary of Key Terms

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

Identity & Privacy Protection

ISO/IEC for secure mobile web applications

Secure your Privacy. jrsys, Inc. All rights reserved.

IT-Security. Perspective, History, Present and Future

Network Security. Windows 2012 Server. Securing Your Windows. Infrastructure. Network Systems and. Derrick Rountree. Richard Hicks, Technical Editor

Public Key Applications & Usage A Brief Insight

Egyptian Best Practices Securing E-Services

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

InfoSec Academy Application & Secure Code Track

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Defending the Internet of Things

Welcome to cryptovision. cv cryptovision GmbH T: +49 (0) F: +49 (0) info(at)cryptovision.com

Internet Governance and Cybersecurity Patrick Curry MACCSA

Identity: The Key to the Future of Healthcare

Egypt s E-Signature & PKInfrastructure

CESG Certification of Cyber Security Training Courses

OECD workshop on digital identity management BELGIAN approach

Bellevue University Cybersecurity Programs & Courses

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

WHITE PAPER Usher Mobile Identity Platform

National Cyber Security Policy -2013

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Lectures taught in English at HFU last update March 2012

Global Identity Management of Virtual Machines Based on Remote Secure Elements

PKI - current and future

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

Electronic Citizen Identities and Strong Authentication

IoT Security Concerns and Renesas Synergy Solutions

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

FIREEYE CYBER ADVANCED SECURITY SOLUTIONS FOR NEW BREED CYBER ATTACKS

Introduction to Cyber Security / Information Security

eid Online Authentication Network Threat Model, Attacks and Implications

Threats to Local Governments and What You Can Do to Mitigate the Risks

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Proposed Framework for an Interoperable Electronic Identity Management System

Kangas Cybersecurity strategy

Welcome to the. Business School of. the University of Mannheim!

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

IDaaS: Managed Credentials for Local & State Emergency Responders

Department of Veteran Affairs. Fred Catoe Office of Cyber and Information Security AAIP Project Manager March 2004

Challenges in Delivering Large-scale Services over Cloud Environments

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Table of Contents Abstract... 3

Security Issues in Cross-border Electronic Authentication

Entrust IdentityGuard

Finger Vein digital biometric signature: use cases

How To Get A Cloud Service For A Small Business

Simple Guide to Digital Signatures

ACH fraud: The problem Why ACH? Why now? Security evolution How to protect ACH. Combating the Newest Attack Method ACH Fraud Webinar agenda

Industrie 4.0; Sicherheitsmechanismen für die Produktion. 14. Deutscher IT-Sicherheitskongress; Andreas Philipp

THE FACILITY MANAGER'S GUIDE TO INFORMATION TECHNOLOGY

ATTPS Publication: Trustworthy ICT Taxonomy

Strategic Information Technology and Portfolio Management

SAMPLE. Insider Trading Chronology. Microsoft Corp (MSFT) Gates, William H. III -- 2,000,000 Shs. (0.25%)

Keywords: German electronic ID card, e-government and e-business applications, identity management

Written Contribution of the National Association of Statutory Health Insurance Funds of

PROTECT YOUR WORLD. Identity Management Solutions and Services

Industry 4.0: Cyber-Security Challenges on the Horizon

Secure Data Management in Trusted Computing

Biometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.

CYBER SECURITY STRATEGY AN OVERVIEW

Transcription:

Norbert Pohlmann Helmut Reimer Wolfgang Schneider ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference With 140 illustrations vieweg

Preface xi About this Book xiii Welcome xv Microsoft: A Trustworthy Vision for Computing xvii Legal, Technical and Social Aspects of Security ^_ 1 Regulating Information Security: A Matter of Principle? 3.Andreas Mitrakas Silvia Portesi ISTPA Operational Analysis of International Privacy Requirements 18 John T. Sabp The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet ' ' 26 Murdoch Watney Data Encryption on File Servers 38 Janusz Gebusia Setting up an Effective'Information Security Awareness Programme 49 Dirk De Maeyer Saferinternet.pl Project - Educational Activities for Internet Safety in Poland 59 Anna Rywczyriska Agnieszka Wrzesieh Is Cyber Tribalism Winning Online Information Warfare? 65 Godfried Williams Johnnes Arreymbi

Phishing Across Interaction Channels: Methods, Experience and Best Practice 73 Philip Hoyer IT-Security Beyond Borders - an Assessment of Trust Levels Across Europe 82 Christian Wernberg-Tougaard Analyzing and Improving the Security of Internet Elections ' 93 Adam Wierzbicki Krzystof Pietrzak Remote Access Mechanics as a Source of Threats to Enterprise Network Infrastructure. 102 Paulina Januszkiewicz Marek Pyka "Private Investigation" in the Computer Environment: Legal Aspects 110 Arkadiusz Lach Identity, Information Security and Rights Management 115 Design Rationale behind the Identity Metasystem Architecture 117 Kim Cameron Michael B. Jones Federated ID Management - Tackling Risk and Credentialing Users 130 Marc Speltens Patrick Patterson Information Security Governance for Executive Management, 136 Yves Le Roux Model Driven Security for Agile SOA-Style Environments 147 Ulrich Lang Rudolf Schreiner v The Business Perspective on Roles Including Root Causes of Implementation Problems ^ 157 Marc Sel ' A Security Architecture for Enterprise Rights Management 166 Ammar Alkassar Rani Husseiki Christian Stiible Michael Hartmann

vii Rights Management Technologies: A Good Choice for Securing Electronic Health Records? 178 Milan Petkovic Stefan Katzenbeisser Klaus Kursawe Case Studies from Fuzzing Bluetooth, WiFi and WiMAX 188 Sami Petajasoja Ari Takaneh Mikko Varpiola Heikki Kortti Evaluation of the Possible Utilization of anti-spam Mechanisms Against spit 196 Christian Dietrich Malte Hesse Modeling Trust Management and Security of Information 207 Anna Felkner Tomasz Jordan Kruk Smart Tokens, eld Cards, Infrastructure Solutions and Interoperability 217 Infrastructure for Trusted Environment: In Search of a Solution., 219 Claire Vishik Simon Johnson David Hoffman Integrity Check of Remote Computer SystemsTrusted Network Connect 228 Marian Jungbauer Norbert Pohlmann Technical Guidelines for Implementation and Utilization of RFID-based Systems.. 238 Cord Bartels Harald Kelter High Density Smart Cards:New Security Challenges and Applications 251 Helena Handschuh Elena Trichina ID Cards in Practice ^ 260 Detlef Houdeau Large Scale Fingerprint Applications: Which Technology Should be Used? _ 266 Andreas M. Wolf

From the ecard-api-framework Towards a Comprehensive eld-framework for Europe 276 Detlef Huhnlein Manuel Bach ; j Making Digital Signatures Work across National Borders 287 Jon 0lnes Anette Andresen Leif Buene Olga Cerrato Havard Grindheim Financial Fraud Information Sharing ;.. 297 Sharon Boeyen Enterprise Key Management Infrastructure " 306 Arshad Noor Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays '"' '" '' "'- ; ' ' " "''''- ' 313 Jorge Guajardo Sandeep S. Kumar Klaus Kursawe Geert-Jan Schrijen Pirn Tuyls Security Evaluation and Testing - Past, Present and Future 322 Peter Fischer Economics of Security and PKI Applications 329 Managing Information Security in Small and Medium Sized Enterprises: A Holistic Approach 331 Anas Tawileh Jeremy Hilton Stephen Mclntosh, EKIAS - Success Criteria of PKI Implementations.-.. -. / 340 Anja Beyer Sophie Hellmann Malte Hesse Friedrich Holl Peter Morcinek SachanPaulus Helmut Reimer Embedded PKI in Industrial Facilities 347 Marcus Hanke SIM-enabled Open Mobile Payment System Based on Nation-wide PKI. 355 Elena Trichina Konstantin Hypponen Marko Hassinen

Evidence Record Syntax 367 Tobias Gondrom PKI and Entitlement 376 Guido v. d. Heidt Reinhard Schoepf Future Diffusion of PKI-Technology - A German Delphi Study 386 Michael Gaude The Introduction of Health Telematics in Germany 396 Dirk Drees The German Identity Card - Concepts and Applications 401 Andreas Reisen Infrastructures for Identification and Identity Documents 405 Walter Landvogt The Security Infrastructure of the German Core Application in Public Transportation 411 Joseph Lutgen Applications of Citizen Portals 419 Hannes Ziegler Virtual Post Office in Practice _, 427 Wilhelm Weisweber Frank Planitzer Index 437