Abstract is missing.
- Claims and Identity: On-Premise and Cloud SolutionsVittorio Bertocci. 1-13 [doi]
- Measuring Information Security: Guidelines to Build MetricsEberhard von Faber. 17-26 [doi]
- Demystifying SAP securityMarc Sel, Kristof Van Der Auwera. 27-36 [doi]
- The ISACA Business Model for Information Security: An Integrative and Innovative ApproachRolf von Roessing. 37-47 [doi]
- ICT Systems Contributing to European Secure-by-Design Critical InfrastructuresFabien Cavenne. 48-62 [doi]
- ROI, Pitfalls and Best Practices with an Enterprise Smart Card DeploymentPhilip Hoyer. 63-71 [doi]
- A General Quality Classification System for eIDs and e-SignaturesJon Ølnes, Leif Buene, Anette Andresen, Håvard Grindheim, Jörg Apitzsch, Adriano Rossi. 72-86 [doi]
- Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA NationalsDetlef Houdeau. 87-93 [doi]
- User and Access Management in Belgian e-GovernmentJos Dumortier, Frank Robben. 97-107 [doi]
- PKI - Crawling Out of the Grave & Into the Arms of GovernmentPhil D'Angio, Panos Vassilliadas, Phaidon Kaklamanis. 108-115 [doi]
- Entitlement Management: Ready to Enter the IdM MainstreamGerry Gebel, Alice Wang. 116-124 [doi]
- Secure E-Mail Communication across Company Boundaries Experiences and ArchitecturesMarkus Wichmann, Guido von der Heidt, Carsten Hille, Gunnar Jacobson. 125-136 [doi]
- Voice Biometrics as a Way to Self-service Password ResetBernd Hohgräfe, Sebastian Jacobi. 137-144 [doi]
- Security Requirements Specification in Process-aware Information SystemsMichael Menzel, Ivonne Thomas, Benjamin Schüler, Maxim Schnjakin, Christoph Meinel. 145-154 [doi]
- Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at homeReinder Wolthuis, Gerben Broenink, Frank Fransen, Sven Schultz, Arnout de Vries. 157-168 [doi]
- Social Engineering hits Social CommerceWerner Degenhardt, Johannes Wiele. 169-176 [doi]
- How to Establish Security Awareness in SchoolsAnja Beyer, Christiane Westendorf. 177-186 [doi]
- Privacy and Security - a Way to Manage the DilemmaWalter Peissl. 187-196 [doi]
- Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing EnvironmentClaire Vishik, Giusella Finocchiaro. 197-205 [doi]
- User Privacy in RFID NetworksDave Singelée, Stefaan Seys. 206-215 [doi]
- Web Sessions Anomaly Detection in Dynamic EnvironmentsManuel García-Cervigón Gutiérrez, Juan Vázquez Pongilupi, Manel Medina Llinàs. 216-220 [doi]
- KryptoNAS: Open source based NAS encryptionMartin Oczko. 223-229 [doi]
- Secure Network ZonesPeter Kai Wimmer. 230-241 [doi]
- ETSI Specifications for Registered E-Mail REMFranco Ruggieri. 242-254 [doi]
- Acceptance of Trust Domains in IT-InfrastructuresArno Fiedler, Selma Gralher. 255-261 [doi]
- Proposal for an IT Security Standard for Preventing Tax Fraud in Cash RegistersMathias Neuhaus, Jörg Wolff, Norbert Zisky. 262-269 [doi]
- The Operational Manager - Enemy or Hero of Secure Business Practice?Wendy Goucher. 270-278 [doi]
- A Structured Approach to Software SecurityTon van Opstal. 281-290 [doi]
- Using Compilers to Enhance Cryptographic Product DevelopmentEndre Bangerter, Manuel Barbosa, D. Bernstein, Ivan Damgård, Daniel Page, Jakob Illeborg Pagter, Ahmad-Reza Sadeghi, S. Sovio. 291-301 [doi]
- Why Secure Coding is not Enough: Professionals' PerspectiveJohn Colley. 302-311 [doi]
- Proactive Security Testing and FuzzingAri Takanen. 312-319 [doi]
- Protecting Long Term Validity of PDF documents with PAdES-LTVNick Pope. 320-327 [doi]
- RE-TRUST: Trustworthy Execution of SW on Remote Untrusted PlatformsBrecht Wyseur. 328-338 [doi]
- Future of Assurance: Ensuring that a System is TrustworthyAhmad-Reza Sadeghi, Ingrid Verbauwhede, Claire Vishik. 339-348 [doi]
- A Taxonomy of Cryptographic Techniques for Securing Electronic Identity DocumentsKlaus Schmeh. 349-356 [doi]