Abstract is missing.
- Germany on the Road to Electronic Proof of IdentityUlrich Hamann. 1-9 [doi]
- Security Analysis of OpenID, followed by a Reference Implementation of an nPA-based OpenID ProviderSebastian Feld, Norbert Pohlmann. 13-25 [doi]
- New Authentication Concepts for Electronic Identity TokensJan Eichholz, Detlef Hühnlein, Gisela Meister, Johannes Schmölz. 26-38 [doi]
- A Simplified Approach for Classifying ApplicationsLenka Fibíková, Roland Müller. 39-49 [doi]
- Single Sign-on(SSO) to Cloud based Services and Legacy Applications "Hitting the IAM wall"Marcus Lasance. 53-60 [doi]
- Cloud & SOA Application Security as a ServiceUlrich Lang. 61-71 [doi]
- Authentication and Trust: Turning the Cloud inside outChristian Brindley. 72-79 [doi]
- User Risk Management Strategies and Models - Adaption for Cloud ComputingEberhard von Faber, Michael Pauly. 80-90 [doi]
- Security and Compliance in CloudsKristian Beckers, Jan Jürjens. 91-100 [doi]
- Applying BMIS to Cloud SecurityRolf von Roessing. 101-112 [doi]
- Critical Infrastructure in Finance PARSIFAL RecommendationsBernhard M. Hämmerli, Henning H. Arendt. 115-121 [doi]
- The SPOCS Interoperability Framework: Interoperability of eDocuments and eDelivery Systems taken as ExampleThomas Rössler, Arne Tauber. 122-130 [doi]
- STORK: Architecture, Implementation and PilotsHerbert Leitold, Bernd Zwattendorfer. 131-142 [doi]
- Secure Networking is the Key to German Public e-Health Solution: Migration Towards an Integrated e-Health InfrastructureBernhard Weiss. 143-150 [doi]
- Advanced Security Service cERTificate for SOA: Certified Services go DigitalJean-Christophe R. Pazzaglia, Volkmar Lotz, V. Campos Cerda, Ernesto Damiani, Claudio Agostino Ardagna, Sigrid Gürgens, Antonio Maña, Claudia Pandolfo, George Spanoudakis, Franco Guida, Renato Menicocci. 151-160 [doi]
- Data Protection and Data Security Issues Related to Cloud Computing in the EUPaolo Balboni. 163-172 [doi]
- The Mask of the Honorable CitizenJohannes Wiele. 173-181 [doi]
- Towards Future-Proof Privacy-Respecting Identity Management SystemsMarit Hansen. 182-190 [doi]
- Privacy Compliant Internal Fraud ScreeningUlrich Flegel. 191-199 [doi]
- Malware Detection and Prevention Platform: Telecom Italia Case StudyLuciana Costa, Roberta D'Amico. 203-213 [doi]
- Defining Threat Agents: Towards a More Complete Threat AnalysisTimothy Casey, Patrick Koeberl, Claire Vishik. 214-225 [doi]
- A Mechanism for e-Banking Frauds Prevention and User Privacy ProtectionRosalia D'Alessandro, Manuel Leone. 226-235 [doi]
- Countering Phishing with TPM-bound CredentialsIngo Bente, Joerg Vieweg, Josef von Helden. 236-246 [doi]
- Security Challenges of a Changing Energy LandscapeMarek Jawurek, Martin Johns. 249-259 [doi]
- Privacy by Design: Best Practices for Privacy and the Smart GridAnn Cavoukian. 260-270 [doi]
- A Policy-based Authorization Scheme for Resource Sharing in Pervasive EnvironmentsRoberto Morales, Jetzabel Serna, Manel Medina. 271-279 [doi]
- Visual Representation of Advanced Electronic SignaturesNick Pope. 280-290 [doi]
- DSKPP and PSKC, IETF Standard Protocol and Payload for Symmetric Key ProvisioningPhilip Hoyer. 291-299 [doi]
- Silicon PUFs in PracticePatrick Koeberl, Jiangtao Li 0001, Anand Rajan, Claire Vishik. 300-311 [doi]
- Visa Applications in TG Biometrics for Public Sector ApplicationsSibylle Hick, Fares Rahmun, Ernest Hammerschmidt. 315-322 [doi]
- Taking Signatures Seriously - Combining Biometric and Digital SignaturesSantiago Uriel Arias. 323-333 [doi]
- Automatic Configuration of Complex IPsec-VPNs and Implications to Higher Layer Network ManagementMichael Rossberg, Günter Schäfer, Kai Martius. 334-342 [doi]
- SCADA and Control System Security: New Standards Protecting Old TechnologyScott Howard. 343-353 [doi]
- A Small Leak will Sink a Great Ship: An Empirical Study of DLP SolutionsMatthias Luft, Thorsten Holz. 354-364 [doi]
- The New German ID CardMarian Margraf. 367-373 [doi]
- AusweisApp and the eID Service/Server - Online Identification Finally more SecureWerner Braun, Dirk Arendt. 374-384 [doi]
- Postident Online with the new Personal Identity CardJens Terboven. 385-391 [doi]
- The eID Function of the nPA within the European STORK InfrastructureVolker Reible, Andre Braunmandl. 392-398 [doi]
- Polish Concepts for Securing E-Government Document FlowMiroslaw Kutylowski, Przemyslaw Kubiak. 399-407 [doi]