Abstract is missing.
- Data Loss Prevention in Real LifeThorsten Scharmatinat. 1-8 [doi]
- Threats, Risks and the Derived Information Security StrategyLenka Fibíková, Roland Müller. 11-20 [doi]
- Information Security Management - Best Practice Guidelines for ManagersWerner Wüpper, Iryna Windhorst. 21-36 [doi]
- IT Security Investment and Costing Emphasizing Benefits in Times of Limited BudgetsMechthild Stöwer, Reiner Kraft. 37-47 [doi]
- A Modern Approach on Information Security MeasurementFrederik Humpert-Vrielink, Nina Vrielink. 48-53 [doi]
- e-Identity - Monetization and InteroperabilityMarc Sel. 54-63 [doi]
- The PoSecCo Security Decision Support SystemCataldo Basile, Antonio Lioy, Stefano Paraboschi. 64-74 [doi]
- Enterprise Mobility - A Balancing Act between Security and UsabilityPatrick Michaelis. 75-79 [doi]
- A Systematic Holistic Approach for Providers to Deliver Secure ICT ServicesEberhard von Faber, Wolfgang Behnsen. 80-88 [doi]
- Implementing Least Privilege for Interconnected, Agile SOAs/CloudsUlrich Lang, Rudolf Schreiner. 89-102 [doi]
- Privacy-Preserving Smart MeteringAlfredo Rial, George Danezis. 105-115 [doi]
- Smart Metering, Common Criteria and European Privacy NeedsMarkus Bartsch. 116-127 [doi]
- Securing the Smart Grid with Hardware Security ModulesDieter Bong, Andreas Philipp. 128-136 [doi]
- The Human Aspect in Data Leakage Prevention in AcademiaElham Rajabian Noghondar, Konrad Marfurt, Bernhard M. Hämmerli. 137-146 [doi]
- Security of Mobile Devices, Applications and TransactionsDaniel Borleteau, Nicolas Bousquet, Thierry Crespo, Xavier Dubarry, Jan Eichholz, Virginie Galindo. 149-160 [doi]
- Management and Use of ID Credentials on NFC Enabled Phones: Use Cases, Challenges, Technologies and StandardsPhilip Hoyer. 161-170 [doi]
- Malware Detection in Ubiquitous EnvironmentsManuel García-Cervigón, Roberto Morales. 171-179 [doi]
- A New Security Architecture for Smartcards Utilizing PUFsThomas Esbach, Walter Fumy, Olga Kulikovska, Dominik Merli, Dieter Schuster, Frederic Stumpf. 180-194 [doi]
- Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber IdentityLibor Neumann, Tomás Halman, Pavel Rotek, Alexander Boettcher, Julian Stecklina, Michal Sojka, David Nuñez, Isaac Agudo. 195-206 [doi]
- eConsent Management and Enforcement in Personal TelehealthMuhammad Asim, Paul Koster, Milan Petkovic, Martin Rosner. 209-216 [doi]
- Information Management and Sharing for National Cyber Situational AwarenessFlorian Skopik, Thomas Bleier, Roman Fiedler. 217-227 [doi]
- Analyzing G-20's Key Autonomus Systems and their Intermeshing using As-AnalyzerSebastian Feld, Norbert Pohlmann, Michael Sparenberg, Bastian C. Wichmann. 228-242 [doi]
- Intention Semantics and Trust EvidenceClaire Vishik, David Ott, David Grawrock. 243-251 [doi]
- Applying a Security Kernel Framework to Smart Meter GatewaysMichael Gröne, Marcel Winandy. 252-259 [doi]
- Securing Smartphone Compartments: Approaches and SolutionsAmmar Alkassar, Steffen Schulz 0001, Christian Stüble, Sven Wohlgemuth. 260-268 [doi]
- ETSI STF 428 - Accelerating Deployment of Interoperable Electronic Signatures in EuropeJuan Carlos Cruellas, Andrea Caccia, Konrad Lanz, Giulana Marzola, Luigi Rizzo, Laurent Velez. 271-281 [doi]
- PEPPOL - Experience from Four Years Work on eSignature InteroperabilityJon Ølnes. 282-295 [doi]
- Exploiting Virtual File Formats for Fun and ProfitEnno Rey, Pascal Turbing, Daniel Mende, Matthias Luft. 296-305 [doi]
- Anonymous, a new Civil Disobedience PhenomenonVaclav Jirovsky. 306-315 [doi]
- Building Technologies that Help Cyber-Defense: Hardware-enabled TrustClaire Vishik, Ruby B. Lee, Fred Chong. 316-325 [doi]