ISSE 2010 Securing Electronic Business Processes Highlights of the I

This book presents the most interesting talks given at ISSE 2010 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity and Security Management - Technical and Economical

  • PDF / 74,191,185 Bytes
  • 415 Pages / 476.22 x 680.315 pts Page_size
  • 96 Downloads / 211 Views

DOWNLOAD

REPORT


I Helmut Reimer I Wolfgang Schneider (Eds.)

ISSE 2010 Securing Electronic Business Processes

Norbert Pohlmann I Helmut Reimer Wolfgang Schneider (Eds.)

I

ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conference With 80 Figures

VIEWEG+ TEUBNER

Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available in the Internet at http://dnb.d-nb.de.

Many of designations used by manufacturers and seilers to distinguish their products are claimed as trademarks.

1st Edition 2011 All rights reserved © Vieweg +Teubner Verlag

I Springer Fachmedien Wiesbaden GmbH 2011

Editorial Office: Dr. Christel Roß

I Andrea Broßler

Vieweg+Teubner Verlag is a brand of Springer Fachmedien. Springer Fachmedien is part of Springer Science+Business Media. www.viewegteubner.de No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the copyright holder. Registered and/or industrial names, trade names, trade descriptions etc. cited in this publication are part of the law for trade-mark protection and may not be used free in any form or by any means even if this is not specifically marked. Cover design: KünkelLopka Medienentwicklung, Heidelberg Typesetting: Oliver Reimer, Jena Printing company: MercedesDruck, Berlin Printed on acid-free paper Printed in Germany ISBN 978-3-8348-1438-8

Contents About this Book

vii

Welcome

xi

Germany on the Road to Electronic Proof of Identity

1

Ulrich Hamann

Identity and Security Management Security Analysis of OpenlD, followed bya Reference Implementation of an nPA-based OpenlD Provider

11 13

Sebastian Feld· Norbert Pohlmann

New Authentication Concepts for Electronic Identity Tokens

26

Jan Eichholz • Dr. Detlef Hühnlein • Dr. Gisela Meister· Johannes Schmölz

A Simplified Approach for Classifying Applications

39

Lenka Fibikova • Roland Müller

Technical and Economical Aspects of Cloud Security Single Sign-on(SSO) to Cloud based Services and Legacy Applications "Hitting the IAM wall"

51 53

Marcus Lasance

Cloud & SOAApplication Security as a Service

61

Ulrich Lang

Authentication and Trust: Turning the Cloud inside out

72

Christian Brindley

User Risk Management Strategies and Models - Adaption for Cloud Computing

80

Eberhard von Faber • Michael Pauly

Security and Compliance in Clouds

91

Kristian Beckers • Jan Jürjens

Applying BMIS to Cloud Security Rolfvon Rössing

101

Security Servicesand Large Scale Public Applications Criticallnfrastructure in Finance PARSIFAL Recommendations

113 115

BernhardM. Hämmerli • Henning H.Arendt

The SPOCS Interoperability Framework:Interoperability of eDocuments and eDelivery Systems taken as Example

122

ThomasRössler·Arne Tauber

STORK: Architecture,Implementation and Pi