En savoir plus 
This book presents the most interesting talks given at ISSE 2011 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. 
The topics include:
- Cloud Computing & Enterprise Security Services
- Awareness, Education, Privacy & Trustworthiness
- Smart Grids, Mobile & Wireless Security
- Security Management, Identity & Access Management
- eID & eGovernment
- Device & Network Security
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2011.
Table des matières
Cloud Computing & Enterprise Security Services - Awareness, Education, Privacy & Trustworthiness - Smart Grids, Mobile & Wireless Security - Security Management, Identity & Access Management - eID & eGovernment - Device & Network Security
A propos de l'auteur
Norbert Pohlmann ist Informatikprofessor für Verteilte Systeme und Informationssicherheit an der Fachhochschule Gelsenkirchen sowie geschäftsführender Direktor des Instituts für Internet-Sicherheit (www.internet-sicherheit.de). Er pflegt intensive Kontakte mit der Sicherheitsagentur der EU und ist Mitglied des wissenschaftlichen Beirates der Gesellschaft für Datenschutz und Datensicherung.
Prof. Helmut Reimer is Chief Executive Officer of TeleTrusT, Germany.
Résumé
This book presents the most interesting talks given at ISSE 2011 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. 
The topics include:
- Cloud Computing & Enterprise Security Services
- Awareness, Education, Privacy & Trustworthiness
- Smart Grids, Mobile & Wireless Security
- Security Management, Identity & Access Management
- eID & eGovernment
- Device & Network Security
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2011.