Shortcuts
Bitte warten Sie, bis die Seite geladen ist.
 
PageMenu- Hauptmenü-
Page content

Katalogdatenanzeige

ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference

ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference
Kataloginformation
Feldname Details
Vorliegende Sprache eng
Hinweise auf parallele Ausgaben 332249352 Buchausg. u.d.T.: ‡Securing electronic business processes
ISBN 978-3-8348-1438-8
Name Pohlmann, Norbert
Reimer, Helmut
Name ANZEIGE DER KETTE Reimer, Helmut
Name Schneider, Wolfgang
T I T E L ISSE 2010 Securing Electronic Business Processes
Zusatz zum Titel Highlights of the Information Security Solutions Europe 2010 Conference
Verlagsort Wiesbaden
Verlag Vieweg+Teubner Verlag / Springer Fachmedien Wiesbaden GmbH, Wiesbaden
Erscheinungsjahr 2011
2011
Umfang Online-Ressource (XII, 416p. 80 illus, digital)
Reihe SpringerLink. Bücher
Notiz / Fußnoten "With 80 figures
Includes bibliographical references and index
Weiterer Inhalt Contents; About this Book; Welcome; Germany on the Road to Electronic Proof of Identity; High security in miniature format; Security in many layers; Trust based on reciprocity; Give and take - the principle of networked system chains; Full control over data for citizens; Other components for using the German eID card; That's what authorisation certificates warrant; Tasks of AusweisApp; eID service as a trust authority; Who will benefit from the new eID architecture?; Security for the digital handshake; Citizens are the ones who will determine the success of the new concept; Outlook. ConclusionIdentityand Security Management; Security Analysis of OpenlD, followed by a Reference Implementation of an nPA-based OpenlD Provider; 1 OpenlD asa standard for SSO on the Internet; 1.1 Problem; 1.2 Overview of OpenlD; 1.3 Courseof the protocol; 1.4 Possible fields of application; 2 Security evaluation of using OpenlD; 2.1 The main threats: Phishing and profiling; 2.2 Additional risks and concerns; 3 The new identity card (nPA) in Germany; 3.1 Overview of the nPA; 3.2 Course of an online authentication; 3.3 Recognition via Restricted Identification. 4 An nPA-based OpenlD provider (OP)4.1 Fundamental Concept; 4.2 OP's communication sequence; 4.3 Precondition for user and services; 4.4 Added value in different directions; 5 Outlook; 6 Summary; References; New Authentication Concepts for Electronic IdentityTokens; 1 Introduction; 2 Background and motivation; 2.1 Standardized interfaces in the context of electronic Identity Cards; 2.2 Java Card 3.0 connected; 2.3 Existing and emerging SAML-related profiles; 3 The Service Access Layer as interoperable smart card Interface; 4 New Authentication Concepts; 4.1 EAC Web Service Binding. 4.2 Path Protection based on XML and WS Secure Conversation4.3 Path protection based on an EAC-TLS cipher suite; 4.4 Integrating eID and SAML; 4.4.1 Naïve integration using Web Browser SSO Profile; 4.4.2 An ECP-based SAML-profile for eID integration; 4.4.3 Identity Provider inside the elD-Taken; 5 Conclusion; References; A Simplified Approach for Classifying Applications; 1 Introduction; 2 Background; 3 Classification scheme; 3.1 Confidentiality; 3.2 Availability; 3.3 Integrity; 4 How to Classify Information; 4.1 Process-oriented Approach; 4.2 Application-oriented Approach; 5 Experiences. 5.1 Application Classification5.2 Fast Lane Information Classification; 5.3 The FLICTool; 6 Conclusion; Technical and Economical Aspects of Cloud Security; Single Sign-on(SSO) to Cloud based Services and Legacy Applications ""Hitting the IAM wall""; 1 Examining the role of IAM as SSO enabler; 2 No SSO without solid Identity Management!; 3 What makes Access Control 'in the Cloud' special?; 3.1 Conventional SSO Solutions; 3.2 Access to non web based legacy applications; 3.3 Legacy Applications need user provisioning; 4 SSO to Web applications 'in the cloud' using federation. 5 SSO to Web applications 'in the cloud' using a User Centric Identity Management Framework (UCIF)
Titelhinweis Buchausg. u.d.T.: ‡Securing electronic business processes
ISBN ISBN 978-3-8348-9788-6
Klassifikation UR
UTN
COM053000
005.8
QA76.9.A25
ST 277
Kurzbeschreibung This book presents the most interesting talks given at ISSE 2010 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity and Security Management - Technical and Economical Aspects of Cloud Security - Security Services and Large Scale Public Applications - Smart Grid Security and Emerging Security Solutions - Privacy and Data Protection Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2010. The content: Identity and Security Management - Technical and Economical Aspects of Cloud Security - Security Services and Large Scale Public Applications - Smart Grid Security and Emerging Security Solutions - Privacy and Data Protection - Security Threats and Contermeasures About the Editors Norbert Pohlmann: Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT.
1. Schlagwortkette Electronic Commerce
Datensicherung
Kongress
1. Schlagwortkette ANZEIGE DER KETTE Electronic Commerce -- Datensicherung -- Kongress
2. Schlagwortkette Electronic Commerce
Computersicherheit
SWB-Titel-Idn 337797692
Signatur Springer E-Book
Bemerkungen Elektronischer Volltext - Campuslizenz
Elektronische Adresse $uhttp://dx.doi.org/10.1007/978-3-8348-9788-6
Internetseite / Link Volltext
Siehe auch Volltext
Siehe auch Cover
Kataloginformation500158542 Datensatzanfang . Kataloginformation500158542 Seitenanfang .
Vollanzeige Katalogdaten 

Auf diesem Bildschirm erhalten Sie Katalog- und Exemplarinformationen zum ausgewählten Titel.

Im Bereich Kataloginformation werden die bibliographischen Details angezeigt. Per Klick auf Hyperlink-Begriffe wie Schlagwörter, Autoren, Reihen, Körperschaften und Klassifikationen können Sie sich weitere Titel des gewählten Begriffes anzeigen lassen.

Der Bereich Exemplarinformationen enthält zum einen Angaben über den Standort und die Verfügbarkeit der Exemplare. Zum anderen haben Sie die Möglichkeit, ausgeliehene Exemplare vorzumerken oder Exemplare aus dem Magazin zu bestellen.
Schnellsuche