ISSE 2010 Securing Electronic Business Processes Highlights of the I
This book presents the most interesting talks given at ISSE 2010 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity and Security Management - Technical and Economical
- PDF / 74,191,185 Bytes
- 415 Pages / 476.22 x 680.315 pts Page_size
- 96 Downloads / 212 Views
I Helmut Reimer I Wolfgang Schneider (Eds.)
ISSE 2010 Securing Electronic Business Processes
Norbert Pohlmann I Helmut Reimer Wolfgang Schneider (Eds.)
I
ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conference With 80 Figures
VIEWEG+ TEUBNER
Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available in the Internet at http://dnb.d-nb.de.
Many of designations used by manufacturers and seilers to distinguish their products are claimed as trademarks.
1st Edition 2011 All rights reserved © Vieweg +Teubner Verlag
I Springer Fachmedien Wiesbaden GmbH 2011
Editorial Office: Dr. Christel Roß
I Andrea Broßler
Vieweg+Teubner Verlag is a brand of Springer Fachmedien. Springer Fachmedien is part of Springer Science+Business Media. www.viewegteubner.de No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the copyright holder. Registered and/or industrial names, trade names, trade descriptions etc. cited in this publication are part of the law for trade-mark protection and may not be used free in any form or by any means even if this is not specifically marked. Cover design: KünkelLopka Medienentwicklung, Heidelberg Typesetting: Oliver Reimer, Jena Printing company: MercedesDruck, Berlin Printed on acid-free paper Printed in Germany ISBN 978-3-8348-1438-8
Contents About this Book
vii
Welcome
xi
Germany on the Road to Electronic Proof of Identity
1
Ulrich Hamann
Identity and Security Management Security Analysis of OpenlD, followed bya Reference Implementation of an nPA-based OpenlD Provider
11 13
Sebastian Feld· Norbert Pohlmann
New Authentication Concepts for Electronic Identity Tokens
26
Jan Eichholz • Dr. Detlef Hühnlein • Dr. Gisela Meister· Johannes Schmölz
A Simplified Approach for Classifying Applications
39
Lenka Fibikova • Roland Müller
Technical and Economical Aspects of Cloud Security Single Sign-on(SSO) to Cloud based Services and Legacy Applications "Hitting the IAM wall"
51 53
Marcus Lasance
Cloud & SOAApplication Security as a Service
61
Ulrich Lang
Authentication and Trust: Turning the Cloud inside out
72
Christian Brindley
User Risk Management Strategies and Models - Adaption for Cloud Computing
80
Eberhard von Faber • Michael Pauly
Security and Compliance in Clouds
91
Kristian Beckers • Jan Jürjens
Applying BMIS to Cloud Security Rolfvon Rössing
101
Security Servicesand Large Scale Public Applications Criticallnfrastructure in Finance PARSIFAL Recommendations
113 115
BernhardM. Hämmerli • Henning H.Arendt
The SPOCS Interoperability Framework:Interoperability of eDocuments and eDelivery Systems taken as Example
122
ThomasRössler·Arne Tauber
STORK: Architecture,Implementation and Pi