Data Protection Tensions in Recent Software Development Trends

Privacy by design and data protection by design focus mostly on product/service features, high-level design, security measures and organizational practices. However, low-level implementation details can also have a data protection impact that may need to

  • PDF / 9,306,310 Bytes
  • 315 Pages / 476.22 x 680.315 pts Page_size
  • 9 Downloads / 197 Views

DOWNLOAD

REPORT


ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference

ISSE 2015

Helmut Reimer  Norbert Pohlmann  Wolfgang Schneider Editors

ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference

Editors Helmut Reimer Bundesverband IT-Sicherheit e.V. TeleTrusT Erfurt, Germany

ISBN 978-3-658-10933-2 DOI 10.1007/978-3-658-10934-9

Norbert Pohlmann Westfälische Hochschule Gelsenkirchen, Germany Wolfgang Schneider Fraunhofer SIT Darmstadt, Germany

ISBN 978-3-658-10934-9 (eBook)

Library of Congress Control Number: 2015951350 Springer Vieweg © Springer Fachmedien Wiesbaden 2015 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Typesetting: Oliver Reimer, Großschwabhausen Printed on acid-free paper Springer Fachmedien Wiesbaden GmbH is part of Springer Science+Business Media (www.springer.com)

Contents About this Book _______________________________________________ix The EDPS Strategy – Leading by Example _________________________________ 1 Giovanni Buttarelli . Wojciech Wiewiórowski . Christopher Docksey

Future Ecosystems for Secure Authentication and Identification ____________ 12 Malte Kahrs . Dr. Kim Nguyen

Encrypted Communication ____________________________________ 23 The Public Key Muddle – How to Manage Transparent End-to-end Encryption in Organizations ___________________________________________ 25 Gunnar Jacobson

Overcoming Obstacles: Encryption for Everyone! _________________________ 36 Mechthild Stöwer . Tatjana Rubinstein

Securing Enterprise Email Communication on both Sides of the Firewall _____ 46 Dr. Burkhard Wiegel

Cloud Security _______________________________________________ 59 On Location-determined Cloud Management for Legally Compliant Outsourcing _______________________________________________ 61 Bernhard Doll . Dirk Emmerich . Ralph Herkenhöner .Ramona Kühn . Hermann de Meer

Cloud Deployments: Is this the End of N-Tier Architectures? ________________ 74 David Frith

Secure Partitioning of Application Log