Shortcuts
Top of page (Alt+0)
Page content (Alt+9)
Page menu (Alt+8)
Your browser does not support javascript, some WebOpac functionallity will not be available.
PageMenu
-
Hauptmenü
-
Suchmenü
Einfache Suche
.
Erweiterte Suche
.
Zeitschriften-Suche
.
Suchergebnisse verfeinern
.
Neuerwerbungsliste nach Gruppen
.
Sortierreihenfolge
.
Benutzerdienste
Nutzeranmeldung
.
Mein Konto
.
Erwerbungsvorschlag
.
Fernleihe
.
Vormerkung
.
Verlängerung
.
Weitere Recherchemöglichkeiten
Datenbankinfosystem (DBIS)
.
Karlsruher virtueller Katalog (KVK)
.
Regensburger Systematik (RVK)
.
Elektronische Zeitschriften (EZB)
.
Zeitschriftendatenbank (ZDB)
.
Sitzung beenden
Katalog verlassen
.
Homepage WHZ
.
Hochschulbibliothek
.
© LIBERO v6.4.1sp240211
Page content
Sie befinden sich hier
:
>
E-Mail versenden
Katalogdatenanzeige
Katalogdatenanzeige
ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference
.
Bookmark für diesen Satz setzen
Katalogdatensatz500158542
.
.
Wikipedia-Verfasserlink
.
.
LibraryThing
.
Kataloginformation
Katalogdatensatz500158542
.
Kataloginformation
Feldname
Details
Vorliegende Sprache
eng
Hinweise auf parallele Ausgaben
332249352 Buchausg. u.d.T.: ‡Securing electronic business processes
ISBN
978-3-8348-1438-8
Name
Pohlmann, Norbert
Reimer, Helmut
Name ANZEIGE DER KETTE
Reimer, Helmut
Name
Schneider, Wolfgang
T I T E L
ISSE 2010 Securing Electronic Business Processes
Zusatz zum Titel
Highlights of the Information Security Solutions Europe 2010 Conference
Verlagsort
Wiesbaden
Verlag
Vieweg+Teubner Verlag / Springer Fachmedien Wiesbaden GmbH, Wiesbaden
Erscheinungsjahr
2011
2011
Umfang
Online-Ressource (XII, 416p. 80 illus, digital)
Reihe
SpringerLink. Bücher
Notiz / Fußnoten
"With 80 figures
Includes bibliographical references and index
Weiterer Inhalt
Contents; About this Book; Welcome; Germany on the Road to Electronic Proof of Identity; High security in miniature format; Security in many layers; Trust based on reciprocity; Give and take - the principle of networked system chains; Full control over data for citizens; Other components for using the German eID card; That's what authorisation certificates warrant; Tasks of AusweisApp; eID service as a trust authority; Who will benefit from the new eID architecture?; Security for the digital handshake; Citizens are the ones who will determine the success of the new concept; Outlook. ConclusionIdentityand Security Management; Security Analysis of OpenlD, followed by a Reference Implementation of an nPA-based OpenlD Provider; 1 OpenlD asa standard for SSO on the Internet; 1.1 Problem; 1.2 Overview of OpenlD; 1.3 Courseof the protocol; 1.4 Possible fields of application; 2 Security evaluation of using OpenlD; 2.1 The main threats: Phishing and profiling; 2.2 Additional risks and concerns; 3 The new identity card (nPA) in Germany; 3.1 Overview of the nPA; 3.2 Course of an online authentication; 3.3 Recognition via Restricted Identification. 4 An nPA-based OpenlD provider (OP)4.1 Fundamental Concept; 4.2 OP's communication sequence; 4.3 Precondition for user and services; 4.4 Added value in different directions; 5 Outlook; 6 Summary; References; New Authentication Concepts for Electronic IdentityTokens; 1 Introduction; 2 Background and motivation; 2.1 Standardized interfaces in the context of electronic Identity Cards; 2.2 Java Card 3.0 connected; 2.3 Existing and emerging SAML-related profiles; 3 The Service Access Layer as interoperable smart card Interface; 4 New Authentication Concepts; 4.1 EAC Web Service Binding. 4.2 Path Protection based on XML and WS Secure Conversation4.3 Path protection based on an EAC-TLS cipher suite; 4.4 Integrating eID and SAML; 4.4.1 Naïve integration using Web Browser SSO Profile; 4.4.2 An ECP-based SAML-profile for eID integration; 4.4.3 Identity Provider inside the elD-Taken; 5 Conclusion; References; A Simplified Approach for Classifying Applications; 1 Introduction; 2 Background; 3 Classification scheme; 3.1 Confidentiality; 3.2 Availability; 3.3 Integrity; 4 How to Classify Information; 4.1 Process-oriented Approach; 4.2 Application-oriented Approach; 5 Experiences. 5.1 Application Classification5.2 Fast Lane Information Classification; 5.3 The FLICTool; 6 Conclusion; Technical and Economical Aspects of Cloud Security; Single Sign-on(SSO) to Cloud based Services and Legacy Applications ""Hitting the IAM wall""; 1 Examining the role of IAM as SSO enabler; 2 No SSO without solid Identity Management!; 3 What makes Access Control 'in the Cloud' special?; 3.1 Conventional SSO Solutions; 3.2 Access to non web based legacy applications; 3.3 Legacy Applications need user provisioning; 4 SSO to Web applications 'in the cloud' using federation. 5 SSO to Web applications 'in the cloud' using a User Centric Identity Management Framework (UCIF)
Titelhinweis
Buchausg. u.d.T.: ‡Securing electronic business processes
ISBN
ISBN 978-3-8348-9788-6
Klassifikation
UR
UTN
COM053000
005.8
QA76.9.A25
ST 277
Kurzbeschreibung
This book presents the most interesting talks given at ISSE 2010 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity and Security Management - Technical and Economical Aspects of Cloud Security - Security Services and Large Scale Public Applications - Smart Grid Security and Emerging Security Solutions - Privacy and Data Protection Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2010. The content: Identity and Security Management - Technical and Economical Aspects of Cloud Security - Security Services and Large Scale Public Applications - Smart Grid Security and Emerging Security Solutions - Privacy and Data Protection - Security Threats and Contermeasures About the Editors Norbert Pohlmann: Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT.
1. Schlagwortkette
Electronic Commerce
Datensicherung
Kongress
1. Schlagwortkette ANZEIGE DER KETTE
Electronic Commerce -- Datensicherung -- Kongress
2. Schlagwortkette
Electronic Commerce
Computersicherheit
SWB-Titel-Idn
337797692
Signatur
Springer E-Book
Bemerkungen
Elektronischer Volltext - Campuslizenz
Elektronische Adresse
$uhttp://dx.doi.org/10.1007/978-3-8348-9788-6
Internetseite / Link
Volltext
Siehe auch
Volltext
Siehe auch
Cover
.
ISBD-Anzeige
Katalogdatensatz500158542
.
Kategorien-Anzeige
Katalogdatensatz500158542
.
Verwandte Werke
Katalogdatensatz500158542
.
Titel zur Titelsammlung hinzufügen
Katalogdatensatz500158542
.
Kataloginformation500158542
Datensatzanfang
.
Kataloginformation500158542
Seitenanfang
.
Titel vormerken
Katalogdatensatz500158542
Vollanzeige Katalogdaten
Auf diesem Bildschirm erhalten Sie Katalog- und Exemplarinformationen zum ausgewählten Titel.
Im Bereich
Kataloginformation
werden die bibliographischen Details angezeigt. Per Klick auf Hyperlink-Begriffe wie Schlagwörter, Autoren, Reihen, Körperschaften und Klassifikationen können Sie sich weitere Titel des gewählten Begriffes anzeigen lassen.
Der Bereich
Exemplarinformationen
enthält zum einen Angaben über den Standort und die Verfügbarkeit der Exemplare. Zum anderen haben Sie die Möglichkeit, ausgeliehene Exemplare vorzumerken oder Exemplare aus dem Magazin zu bestellen.
Schnellsuche
Suche nach