Abstract is missing.
- The Information Security Framework for Daimler Financial Services and its ImplementationLenka Fibikova, Roland Müller. 3-19 [doi]
- Information Security Status in Organisations 2008Anas Tawileh, Jeremy Hilton, Stephen McIntosh. 20-29 [doi]
- Quantified Trust Levels for AuthenticationIvonne Thomas, Michael Menzel, Christoph Meinel. 30-38 [doi]
- Identity Management in Open EnvironmentsManel Medina, Estíbaliz Delgado, Diego Fernández. 39-44 [doi]
- Identity management and privacy languages technologies: Improving user control of data privacyJosé Enrique López García, Carlos Alberto Gil García, Álvaro Armenteros Pacheco, Pedro Luis Muñoz Organero. 45-56 [doi]
- Security Economics and European PolicyRoss Anderson, Rainer Böhme, Richard Clayton, Tyler Moore. 57-76 [doi]
- How Economy and Society affect Enterprise Security ManagementEberhard von Faber. 77-83 [doi]
- Freedom and Security - Responses to the Threat of International TerrorismMarie-Theres Tinnefeld. 93-98 [doi]
- The Anonymity vs. Utility DilemmaMichele Bezzi, Jean-Christophe R. Pazzaglia. 99-107 [doi]
- Governmental Control of the Internet in addressing Law Enforcement and National SecurityMurdoch Watney. 108-118 [doi]
- Theft of Virtual Property - Towards Security Requirements for Virtual WorldsAnja Beyer. 119-127 [doi]
- Trusted Storage: Putting Security and Data TogetherMichael Willett, Dave Anderson. 131-138 [doi]
- Trust in Consumer ElectronicsKlaus Kursawe, Stefan Katzenbeisser. 139-143 [doi]
- Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network ConnectJosef von Helden, Ingo Bente. 152-162 [doi]
- Empirical research of IP blacklistsChristian Dietrich, Christian Rossow. 163-171 [doi]
- GIDRE: Grid-based Detection Intrusion and Response EnvironmentOlimpia Olguín, Manel Medina. 172-180 [doi]
- Biometrics and ID Cards - Enablers for Personal SecurityAndreas Reisen. 181-185 [doi]
- Agatha: Multimodal Biometric Authentication Platform in Large-Scale DatabasesDavid Hernando, David Gómez, Javier Rodríguez Saeta, Pascual Ejarque, Javier Hernando. 186-193 [doi]
- Development and Implementation of an Encryption Strategy for a global EnterpriseGuido von der Heidt. 197-207 [doi]
- Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity ToolKonstantin Hyppönen, Marko Hassinen, Elena Trichina. 208-217 [doi]
- Symmetric Key Services Markup Language (SKSML)Arshad Noor. 218-230 [doi]
- Managing business compliance using model-driven security managementUlrich Lang, Rudolf Schreiner. 231-241 [doi]
- Secure E-Business applications based on the European Citizen CardChristian Zipfel, Henning Daum, Gisela Meister. 242-250 [doi]
- Electronic Signatures for Public Procurement across EuropeJon Ølnes, Anette Andresen, Stefano Arbia, Markus Ernst, Martin Hagen, Stephan Klein, Giovanni Manca, Adriano Rossi, Frank Schipplick, Daniele Tatti, Gesa Wessolowski, Jan Windheuser. 251-261 [doi]
- Progress through uniformityDetlef Houdeau. 262-267 [doi]
- OTP and Challenge/Response algorithms for financial and e-government identity assurance: current landscape and trendsPhilip Hoyer. 281-290 [doi]
- NSA Suite B and its significance for non-USA organisationsKlaus Schmeh. 291-295 [doi]
- Managing vulnerabilities and achieving compliance for Oracle databases in a modern ERP environmentStefan Hölzner, Jan Kästle. 296-306 [doi]
- The need for the Protection of Critical National InfrastructuresFernando J. Sánchez Gómez, Miguel Ángel Abad Arranz. 313-318 [doi]
- Challenges for the Protection of Critical ICT-Based Financial InfrastructuresBernhard M. Hämmerli, Henning H. Arendt. 319-326 [doi]
- Evaluating Measures and Countermeasures for SPAM over Internet TelephonyAndreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari. 329-340 [doi]
- Influence of Security Mechanisms on the Quality of Service of VoIPPeter Backs, Norbert Pohlmann. 341-346 [doi]
- The security of mass transport ticketing systemsMarc Sel, Stefaan Seys, Eric R. Verheul. 347-356 [doi]
- Authentication for Web Services with the Internet Smart CardWalter Hinz. 357-366 [doi]
- Hardened Client Platforms for Secure Internet BankingCorrado Ronchi, Shukhrat Zakhidov. 367-379 [doi]
- Securing Flash Technology: How Does It Look From Inside?Helena Handschuh, Elena Trichina. 380-389 [doi]
- Deployment of German Electronic Citizen Cards in Banking: Opportunities and ChallengesMatthias Büger. 393-397 [doi]
- Infrastructures and Middleware for the Application of eID Cards in eGovernmentThomas Walloschke. 406-417 [doi]
- Securing Contactless Chips with PACEDennis Kügler. 418-423 [doi]