↓ Skip to main content

ISSE 2009 Securing Electronic Business Processes

Overview of attention for book
Cover of 'ISSE 2009 Securing Electronic Business Processes'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Claims and Identity: On-Premise and Cloud Solutions
  3. Altmetric Badge
    Chapter 2 Measuring Information Security: Guidelines to Build Metrics
  4. Altmetric Badge
    Chapter 3 Demystifying SAP security
  5. Altmetric Badge
    Chapter 4 The ISACA Business Model for Information Security: An Integrative and Innovative Approach
  6. Altmetric Badge
    Chapter 5 ICT Systems Contributing to European Secure-by-Design Critical Infrastructures
  7. Altmetric Badge
    Chapter 6 ROI, Pitfalls and Best Practices with an Enterprise Smart Card Deployment
  8. Altmetric Badge
    Chapter 7 A General Quality Classification System for eIDs and e-Signatures
  9. Altmetric Badge
    Chapter 8 Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals
  10. Altmetric Badge
    Chapter 9 User and Access Management in Belgian e-Government
  11. Altmetric Badge
    Chapter 10 PKI – Crawling Out of the Grave & Into the Arms of Government
  12. Altmetric Badge
    Chapter 11 Entitlement Management: Ready to Enter the IdM Mainstream
  13. Altmetric Badge
    Chapter 12 Secure E-Mail Communication across Company Boundaries Experiences and Architectures
  14. Altmetric Badge
    Chapter 13 Voice Biometrics as a Way to Self-service Password Reset
  15. Altmetric Badge
    Chapter 14 Security Requirements Specification in Process-aware Information Systems
  16. Altmetric Badge
    Chapter 15 Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home
  17. Altmetric Badge
    Chapter 16 Social Engineering hits Social Commerce
  18. Altmetric Badge
    Chapter 17 How to Establish Security Awareness in Schools
  19. Altmetric Badge
    Chapter 18 Privacy and Security – a Way to Manage the Dilemma
  20. Altmetric Badge
    Chapter 19 Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing Environment
  21. Altmetric Badge
    Chapter 20 User Privacy in RFID Networks
  22. Altmetric Badge
    Chapter 21 Web Sessions Anomaly Detection in Dynamic Environments
  23. Altmetric Badge
    Chapter 22 KryptoNAS: Open source based NAS encryption
  24. Altmetric Badge
    Chapter 23 Secure Network Zones
  25. Altmetric Badge
    Chapter 24 ETSI Specifications for Registered E-Mail REM
  26. Altmetric Badge
    Chapter 25 Acceptance of Trust Domains in IT-Infrastructures
  27. Altmetric Badge
    Chapter 26 Proposal for an IT Security Standard for Preventing Tax Fraud in Cash Registers
  28. Altmetric Badge
    Chapter 27 The Operational Manager – Enemy or Hero of Secure Business Practice?
  29. Altmetric Badge
    Chapter 28 A Structured Approach to Software Security
  30. Altmetric Badge
    Chapter 29 Using Compilers to Enhance Cryptographic Product Development
  31. Altmetric Badge
    Chapter 30 Why Secure Coding is not Enough: Professionals’ Perspective
  32. Altmetric Badge
    Chapter 31 Proactive Security Testing and Fuzzing
  33. Altmetric Badge
    Chapter 32 Protecting Long Term Validity of PDF documents with PAdES-LTV
  34. Altmetric Badge
    Chapter 33 RE-TRUST: Trustworthy Execution of SW on Remote Untrusted Platforms
  35. Altmetric Badge
    Chapter 34 Future of Assurance: Ensuring that a System is Trustworthy
  36. Altmetric Badge
    Chapter 35 A Taxonomy of Cryptographic Techniques for Securing Electronic Identity Documents
Attention for Chapter 22: KryptoNAS: Open source based NAS encryption
Altmetric Badge

Readers on

mendeley
2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
KryptoNAS: Open source based NAS encryption
Chapter number 22
Book title
ISSE 2009 Securing Electronic Business Processes
Published in
ADS, January 2010
DOI 10.1007/978-3-8348-9363-5_22
Book ISBNs
978-3-83-480958-2, 978-3-83-489363-5
Authors

Martin Oczko

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 2 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 50%
Other 1 50%
Readers by discipline Count As %
Computer Science 2 100%