Abstract is missing.
- The EDPS Strategy - Leading by ExampleGiovanni Buttarelli, Wojciech Wiewiórowski, Christopher Docksey. 1-11 [doi]
- Future Ecosystems for Secure Authentication and IdentificationMalte Kahrs, Kim Nguyen. 12-21 [doi]
- The Public Key Muddle - How to Manage Transparent End-to-end Encryption in OrganizationsGunnar Jacobson. 25-35 [doi]
- Overcoming Obstacles: Encryption for Everyone!Mechthild Stöwer, Tatjana Rubinstein. 36-45 [doi]
- Securing Enterprise Email Communication on both Sides of the FirewallBurkhard Wiegel. 46-57 [doi]
- On Location-determined Cloud Management for Legally Compliant OutsourcingBernhard Doll, Dirk Emmerich, Ralph Herkenhöner, Ramona Kühn, Hermann de Meer. 61-73 [doi]
- Cloud Deployments: Is this the End of N-Tier Architectures?David Frith. 74-86 [doi]
- Secure Partitioning of Application Logic In a Trustworthy CloudAmmar Alkassar, Michael Gröne, Norbert Schirmer. 87-97 [doi]
- Doubtless Identification and Privacy Preserving of User in Cloud SystemsNorbert Pohlmann, Antonio González Robles, Christoph Engling, Hubert A. Jäger, Edmund Ernst. 98-108 [doi]
- Doubtless Identification and Privacy Preserving of User in Cloud SystemsAntonio González Robles, Norbert Pohlmann, Christoph Engling, Hubert A. Jäger, Edmund Ernst. 98-108 [doi]
- Doubtless Identification and Privacy Preserving of User in Cloud SystemsAntonio González Robles, Norbert Pohlmann, Christoph Engling, Hubert A. Jäger, Edmund Ernst. 98-108 [doi]
- Industry 4.0 - Challenges in Anti-CounterfeitingChristian Thiel, Christoph Thiel. 111-120 [doi]
- Trust Evidence for IoT: Trust Establishment from Servers to SensorsDavid Ott, Claire Vishik, David Grawrock, Anand Rajan. 121-131 [doi]
- Making Sense of Future Cybersecurity Technologies: Using Ontologies for Multidisciplinary Domain AnalysisClaire Vishik, Marcello Balduccini. 135-145 [doi]
- How the God Particle will Help You Securing Your AssetsRoger Bollhalder, Christian Thiel, Thomas Punz. 146-156 [doi]
- Proximity-Based Access Control (PBAC) using Model-Driven SecurityUlrich Lang, Rudolf Schreiner. 157-170 [doi]
- A pan-European Framework on Electronic Identification and Trust Services for Electronic Transactions in the Internal MarketOlivier Delos, Tine Debusschere, Marijke De Soete, Jos Dumortier, Riccardo Genghini, Hans Graux, Sylvie Lacroix, Gianluca Ramunno, Marc Sel, Patrick van Eecke. 173-195 [doi]
- Signature Validation - a Dark Art?Peter Lipp. 196-205 [doi]
- A Comparison of Trust ModelsMarc Sel. 206-215 [doi]
- A Reference Model for a Trusted Service Guaranteeing Web-contentMihai Togan, Ionut Florea. 216-224 [doi]
- Architectural Elements of a Multidimensional AuthenticationLibor Neumann. 227-239 [doi]
- Bring Your Own Device For Authentication (BYOD4A) - The Xign-SystemNorbert Pohlmann, Markus Hertlein, Pascal Manaras. 240-250 [doi]
- Addressing Threats to Real-World Identity Management SystemsWanpeng Li, Chris J. Mitchell. 251-259 [doi]
- Information Security Standards in Critical Infrastructure ProtectionAlessandro Guarino. 263-269 [doi]
- Data Protection Tensions in Recent Software Development TrendsMaarten Truyens. 270-285 [doi]
- Changing the Security Mode of Operation in a Global IT Organization with 20000+ Technical StaffEberhard von Faber. 286-304 [doi]