Search dblp for Publications

export results for "toc:db/conf/isse/isse2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/isse/BalboniKM13,
  author       = {Paolo Balboni and
                  Udo Kroon and
                  Milda Macenaite},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Data Protection and Data Security by Design Applied to Financial Intelligence},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_7},
  doi          = {10.1007/978-3-658-03371-2\_7},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/BalboniKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Berlich13,
  author       = {Peter Berlich},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Executive Career Paths in Information Security Management},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {149--161},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_13},
  doi          = {10.1007/978-3-658-03371-2\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Berlich13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/EcksteinK13,
  author       = {Levona Eckstein and
                  Reiner Kraft},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {A Practical Approach for an {IT} Security Risk Analysis in Hospitals},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {217--226},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_19},
  doi          = {10.1007/978-3-658-03371-2\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/EcksteinK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/FaberB13,
  author       = {Eberhard von Faber and
                  Wolfgang Behnsen},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {A security Taxonomy that facilitates Protecting an industrial {ICT}
                  Production and how it really provides Transparency},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_8},
  doi          = {10.1007/978-3-658-03371-2\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/FaberB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Guarino13,
  author       = {Alessandro Guarino},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Digital Forensics as a Big Data Challenge},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {197--203},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_17},
  doi          = {10.1007/978-3-658-03371-2\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Guarino13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/KafitzB13,
  author       = {Willi Kafitz and
                  Volker Burgers},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Security in Critical Infrastructures - Future Precondition for Operating
                  License?},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {205--215},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_18},
  doi          = {10.1007/978-3-658-03371-2\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/KafitzB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/LeontaridisALZY13,
  author       = {Lefteris Leontaridis and
                  Thomas Andersson and
                  Herbert Leitold and
                  Bernd Zwattendorfer and
                  Shuzhe Yang and
                  Pasi Lindholm},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {The {INDI} Ecosystem of privacy-aware, user-centric Identity},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {45--57},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_5},
  doi          = {10.1007/978-3-658-03371-2\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/LeontaridisALZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Lindemann13,
  author       = {Rolf Lindemann},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {The Evolution of Authentication},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {11--19},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_2},
  doi          = {10.1007/978-3-658-03371-2\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Lindemann13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/MarkovicD13,
  author       = {Milan Markovic and
                  Goran Dordevic},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Secure Mobile Government and Mobile Banking Systems Based on Android
                  Clients},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {263--273},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_23},
  doi          = {10.1007/978-3-658-03371-2\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/MarkovicD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Neumann13,
  author       = {Libor Neumann},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Security Challenges of Current Federated eID Architectures},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {21--32},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_3},
  doi          = {10.1007/978-3-658-03371-2\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Neumann13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Olnes13,
  author       = {Jon {\O}lnes},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {A Practical Signature Policy Framework},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {99--112},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_9},
  doi          = {10.1007/978-3-658-03371-2\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Olnes13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Pannifer13,
  author       = {Steve Pannifer},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Alternative Authentication - What does it really Provide?},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {121--130},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_11},
  doi          = {10.1007/978-3-658-03371-2\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Pannifer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/PapadopoulosH13,
  author       = {Dimitrios Papadopoulos and
                  Bernhard M. H{\"{a}}mmerli},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Positioning Information Security Roles, Processes and Interactions},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {163--172},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_14},
  doi          = {10.1007/978-3-658-03371-2\_14},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isse/PapadopoulosH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/PeetersPW13,
  author       = {Roel Peeters and
                  Tobias Pulls and
                  Karel Wouters},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Enhancing Transparency with Distributed Privacy-Preserving Logging},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {61--71},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_6},
  doi          = {10.1007/978-3-658-03371-2\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/PeetersPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Roux13,
  author       = {Yves Le Roux},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Facing the Upheaval: Changing Dynamics for Security Governance in
                  the {EU}},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {113--120},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_10},
  doi          = {10.1007/978-3-658-03371-2\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Roux13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Schirmer13,
  author       = {Norbert Schirmer},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Safe Browsing},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {173--182},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_15},
  doi          = {10.1007/978-3-658-03371-2\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Schirmer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/SelS13,
  author       = {Marc Sel and
                  Tomas Clemente Sanchez},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Worldbank's Secure eID Toolkit for Africa},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {33--44},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_4},
  doi          = {10.1007/978-3-658-03371-2\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/SelS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Sklavos13,
  author       = {Nicolas Sklavos},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Securing Communication Devices via Physical Unclonable Functions (PUFs)},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {253--261},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_22},
  doi          = {10.1007/978-3-658-03371-2\_22},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isse/Sklavos13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/SpeierFBRP13,
  author       = {Andreas Speier and
                  Christofer Fein and
                  David Bothe and
                  Eric Reich and
                  Norbert Pohlmann},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Draft of a Dynamic Malware Detection System on Trustworthy Endpoints},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {3--9},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_1},
  doi          = {10.1007/978-3-658-03371-2\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/SpeierFBRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/StrackxNVPP13,
  author       = {Raoul Strackx and
                  Job Noorman and
                  Ingrid Verbauwhede and
                  Bart Preneel and
                  Frank Piessens},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Protected Software Module Architectures},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {241--251},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_21},
  doi          = {10.1007/978-3-658-03371-2\_21},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isse/StrackxNVPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/VishikSO13,
  author       = {Claire Vishik and
                  Frederick T. Sheldon and
                  David Ott},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Economic Incentives for Cybersecurity: Using Economics to Design Technologies
                  Ready for Deployment},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_12},
  doi          = {10.1007/978-3-658-03371-2\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/VishikSO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/VogelB13,
  author       = {Marko Vogel and
                  Vinzent Broer},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Security Compliance Monitoring - The next Evolution of Information
                  Security Management?!},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {183--194},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_16},
  doi          = {10.1007/978-3-658-03371-2\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/VogelB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Watney13,
  author       = {Murdoch Watney},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {When does Abuse of Social Media constitute a Crime? - {A} South African
                  Legal Perspective within a Global Context},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {227--238},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_20},
  doi          = {10.1007/978-3-658-03371-2\_20},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isse/Watney13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isse/2013,
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2},
  doi          = {10.1007/978-3-658-03371-2},
  isbn         = {978-3-658-03370-5},
  timestamp    = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics