Abstract is missing.
- Regulating Information Security: A Matter of Principle?Andreas Mitrakas, Silvia Portesi. 3-17 [doi]
- ISTPA Operational Analysis of International Privacy RequirementsJohn T. Sabo. 18-25 [doi]
- The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the InternetMurdoch Watney. 26-37 [doi]
- Data Encryption on File ServersJanusz Gebusia. 38-48 [doi]
- Setting up an Effective Information Security Awareness ProgrammeDirk De Maeyer. 49-58 [doi]
- Saferinternet.pl Project - Educational Activities for Internet Safety in PolandAnna Rywczynska, Agnieszka Wrzesien. 59-64 [doi]
- Is Cyber Tribalism Winning Online Information Warfare?Godfried Williams, Johnnes Arreymbi. 65-72 [doi]
- Phishing Across Interaction Channels: Methods, Experience and Best PracticePhilip Hoyer. 73-81 [doi]
- IT-Security Beyond Borders - an Assessment of Trust Levels Across EuropeChristian Wernberg-Tougaard. 82-92 [doi]
- Analyzing and Improving the Security of Internet ElectionsAdam Wierzbicki, Krzystof Pietrzak. 93-101 [doi]
- Remote Access Mechanics as a Source of Threats to Enterprise Network InfrastructurePaulina Januszkiewicz, Marek Pyka. 102-109 [doi]
- "Private Investigation" in the Computer Environment: Legal AspectsArkadiusz Lach. 110-113 [doi]
- Design Rationale behind the Identity Metasystem ArchitectureKim Cameron, Michael B. Jones. 117-129 [doi]
- Federated ID Management - Tackling Risk and Credentialing UsersMarc Speltens, Patrick Patterson. 130-135 [doi]
- Information Security Governance for Executive ManagementYves Le Roux. 136-146 [doi]
- Model Driven Security for Agile SOA-Style EnvironmentsUlrich Lang, Rudolf Schreiner. 147-156 [doi]
- The Business Perspective on Roles Including Root Causes of Implementation Problems and Proven Ways to Overcome themMarc Sel. 157-165 [doi]
- A Security Architecture for Enterprise Rights ManagementAmmar Alkassar, Rani Husseiki, Christian Stüble, Michael Hartmann. 166-177 [doi]
- Rights Management Technologies: A Good Choice for Securing Electronic Health Records?Milan Petkovic, Stefan Katzenbeisser 0001, Klaus Kursawe. 178-187 [doi]
- Case Studies from Fuzzing Bluetooth, WiFi and WiMAXSami Petäjäsoja, Ari Takanen, Mikko Varpiola, Heikki Kortti. 188-195 [doi]
- Evaluation of the Possible Utilization of anti-spam Mechanisms Against spitChristian J. Dietrich, Malte Hesse. 196-206 [doi]
- Modeling Trust Management and Security of InformationAnna Felkner, Tomasz Jordan Kruk. 207-216 [doi]
- Infrastructure for Trusted Environment: In Search of a SolutionClaire Vishik, Simon Johnson, David Hoffman. 219-227 [doi]
- Integrity Check of Remote Computer Systems Trusted Network ConnectMarian Jungbauer, Norbert Pohlmann. 228-237 [doi]
- Technical Guidelines for Implementation and Utilization of RFID-based SystemsCord Bartels, Harald Kelter. 238-250 [doi]
- High Density Smart Cards: New Security Challenges and ApplicationsHelena Handschuh, Elena Trichina. 251-259 [doi]
- ID Cards in PracticeDetlef Houdeau. 260-265 [doi]
- Large Scale Fingerprint Applications: Which Technology Should be Used?Andreas M. Wolf. 266-275 [doi]
- From the eCard-API-Framework Towards a Comprehensive eID-Framework for EuropeDetlef Hühnlein, Manuel Bach. 276-286 [doi]
- Making Digital Signatures Work across National BordersJon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim. 287-296 [doi]
- Financial Fraud Information SharingSharon Boeyen. 297-305 [doi]
- Enterprise Key Management InfrastructureArshad Noor. 306-312 [doi]
- Intrinsic Physical Unclonable Functions in Field Programmable Gate ArraysJorge Guajardo, Sandeep S. Kumar, Klaus Kursawe, Geert Jan Schrijen, Pim Tuyls. 313-321 [doi]
- Security Evaluation and Testing - Past, Present and FuturePeter Fischer. 322-328 [doi]
- Managing Information Security in Small and Medium Sized Enterprises: A Holistic ApproachAnas Tawileh, Jeremy Hilton, Stephen McIntosh. 331-339 [doi]
- EKIAS - Success Criteria of PKI ImplementationsAnja Beyer, Sophie Hellmann, Malte Hesse, Friedrich Holl, Peter Morcinek, Sachar Paulus, Helmut Reimer. 340-346 [doi]
- Embedded PKI in Industrial FacilitiesMarcus Hanke. 347-354 [doi]
- SIM-enabled Open Mobile Payment System Based on Nation-wide PKIElena Trichina, Konstantin Hyppönen, Marko Hassinen. 355-366 [doi]
- Evidence Record Syntax - a new International Standard for Long-Term Archiving of Electronic Documents and Signed DataTobias Gondrom. 367-375 [doi]
- PKI and Entitlement - Key Information Security Management Solutions for Business and IT ComplianceGuido von der Heidt, Reinhard Schoepf. 376-385 [doi]
- Future Diffusion of PK1-Technology - A German Delphi StudyMichael Gaude. 386-395 [doi]
- The Introduction of Health Telematics in GermanyDirk Drees. 396-400 [doi]
- The German Identity Card - Concepts and ApplicationsAndreas Reisen. 401-404 [doi]
- Infrastructures for Identification and Identity DocumentsWalter Landvogt. 405-410 [doi]
- The Security Infrastructure of the German Core Application in Public TransportationJoseph Lutgen. 411-418 [doi]
- Applications of Citizen PortalsHannes Ziegler. 419-426 [doi]
- Virtual Post Office in PracticeWilhelm Weisweber, Frank Planitzer. 427-436 [doi]