Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Armand Portmann"'
Autor:
Oliver Hirschi, Armand Portmann
Publikováno v:
Corporate Treasury Management ISBN: 9783658185664
Es genugt heute beim Treasury Management in den Unternehmen nicht mehr, nur die finanziellen und unternehmerischen Risiken zu betrachten und durch geeignete Massnahmen zu mitigieren. Vielmehr mussen auch die bearbeiteten Daten und Informationen einen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fa67cf94c95eefb2e1529635a478f78b
https://doi.org/10.1007/978-3-658-18567-1_20
https://doi.org/10.1007/978-3-658-18567-1_20
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefull
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
Springer, AICT-354, 2011, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-21424-0⟩
Springer, AICT-354, 2011, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-21424-0⟩
Future Challenges in Security and Privacy for Academia and Industry : Proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne/Switzerland, June 2011
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b2502fd79561148715e9e98aff2680b3
https://doi.org/10.1007/978-3-642-21424-0
https://doi.org/10.1007/978-3-642-21424-0
Publikováno v:
IFIP Advances in Information and Communication Technology
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
Part 9: Intrusion Detection; International audience; The most common anomaly detection mechanisms at application level consist in detecting a deviation of the control-flow of a program. A popular method to detect such anomaly is the use of applicatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f3d1a8c1071b26bda92a24cedd244eea
https://hal-supelec.archives-ouvertes.fr/hal-00657971/file/ifipsec2011.pdf
https://hal-supelec.archives-ouvertes.fr/hal-00657971/file/ifipsec2011.pdf
Autor:
Ge Zhang
Publikováno v:
IFIP Advances in Information and Communication Technology
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.247-258, ⟨10.1007/978-3-642-21424-0_20⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.247-258, ⟨10.1007/978-3-642-21424-0_20⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
Part 7: Privacy Attacks and Privacy-Enhancing Technologies; International audience; Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. H
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aafcb181f98e778069cfeec07eea10be
https://hal.inria.fr/hal-01567602/document
https://hal.inria.fr/hal-01567602/document
Autor:
Roberto Carbone, Giancarlo Pellegrino, Jorge Cuellar, Luca Compagna, Alessandro Armando, Alessandro Sorniotti
Publikováno v:
IFIP Advances in Information and Communication Technology
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.68-79, ⟨10.1007/978-3-642-21424-0_6⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.68-79, ⟨10.1007/978-3-642-21424-0_6⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
Part 3: Authentication; International audience; Browser-based Single Sign-On (SSO) is replacing conventional solutions based on multiple, domain-specific credentials by offering an improved user experience: clients log on to their company system once
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9133bfaeb96f17f96623cdf04af28173
https://hal.inria.fr/hal-01567599
https://hal.inria.fr/hal-01567599
Autor:
Benjamin Kellermann
Publikováno v:
IFIP Advances in Information and Communication Technology
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.235-246, ⟨10.1007/978-3-642-21424-0_19⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.235-246, ⟨10.1007/978-3-642-21424-0_19⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
Part 7: Privacy Attacks and Privacy-Enhancing Technologies; International audience; Applications which help users to schedule events are becoming more and more important. A drawback of most existing applications is, that the preferences of all partic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d17e2497dbcd829b1c269c63c2247135
https://hal.inria.fr/hal-01567596/file/978-3-642-21424-0_19_Chapter.pdf
https://hal.inria.fr/hal-01567596/file/978-3-642-21424-0_19_Chapter.pdf
Autor:
Angelos D. Keromytis, Pádraig O'Sullivan, Matthew Smithson, Aparna Kotha, Rajeev Barua, Kapil Anand
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
IFIP Advances in Information and Communication Technology
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.154-172, ⟨10.1007/978-3-642-21424-0_13⟩
SEC
IFIP Advances in Information and Communication Technology
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.154-172, ⟨10.1007/978-3-642-21424-0_13⟩
Part 5: Software Security; International audience; We present a practical tool for inserting security features against low-level software attacks into third-party, proprietary or otherwise binary-only software. We are motivated by the inability of so
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cc4a598de64094420af677e5720032fb
https://doi.org/10.1007/978-3-642-21424-0_13
https://doi.org/10.1007/978-3-642-21424-0_13
Autor:
Daniel Le Métayer, Nora Cuppens-Boulahia, Frédéric Cuppens, Meriam Ben Ghorbel, Guillaume Piolle
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
IFIP Advances in Information and Communication Technology
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.197-209, ⟨10.1007/978-3-642-21424-0_16⟩
SEC
IFIP Advances in Information and Communication Technology
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.197-209, ⟨10.1007/978-3-642-21424-0_16⟩
Part 6: Policy Compliance and Obligations; International audience; In this paper, we discuss the issue of responsibilities related to the fulfillment and the violation of obligations. We propose to formally define the different aspects of responsibil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ec138e069af39ad25e2febe8642b018c
https://doi.org/10.1007/978-3-642-21424-0_16
https://doi.org/10.1007/978-3-642-21424-0_16
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
IFIP Advances in Information and Communication Technology
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.259-270, ⟨10.1007/978-3-642-21424-0_21⟩
SEC
IFIP Advances in Information and Communication Technology
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.259-270, ⟨10.1007/978-3-642-21424-0_21⟩
Part 8: Risk Analysis and Security Metrics; International audience; Traditional information technology (IT) security risk assessment approaches are based on an analysis of events, probabilities and impacts. In practice, security experts often find it
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::49dacb5c934088634fe471be78ddd875
https://doi.org/10.1007/978-3-642-21424-0_21
https://doi.org/10.1007/978-3-642-21424-0_21