ISSE 2014 Securing Electronic Business Processes

Highlights of the Information Security Solutions Europe 2014 Conference

  • Helmut Reimer
  • Norbert Pohlmann
  • Wolfgang Schneider

Table of contents

  1. Front Matter
    Pages i-xiii
  2. Security Management, CISO Inside

    1. Front Matter
      Pages 33-33
    2. Christian Schlehuber, Erik Tews, Stefan Katzenbeisser
      Pages 56-64
  3. Trust Services, eID and Cloud Security

    1. Front Matter
      Pages 79-79
    2. Francisco Jordan, Helena Pujol, David Ruana
      Pages 81-93
    3. Gregor Bühler, Enrico Entschew, Marcel Selhorst
      Pages 94-105
  4. Cybersecurity, Cybercrime, Critical Infrastructures

    1. Front Matter
      Pages 121-121
    2. Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier
      Pages 123-133
    3. Norbert Pohlmann, Michael Sparenberg, Illya Siromaschenko, Kilian Kilden
      Pages 155-169
    4. Arno Fiedler, Christoph Thiel
      Pages 170-174
  5. BYOD and Mobile Security

    1. Front Matter
      Pages 175-175
    2. Vincent van der Leest, Roel Maes, Geert-Jan Schrijen, Pim Tuyls
      Pages 188-198
    3. Milan Marković, Goran Đorđević
      Pages 199-208
  6. Privacy, Data Protection, Human Factors

    1. Front Matter
      Pages 209-209
    2. Anders Andersen, Trygve Hardersen, Norbert Schirmer
      Pages 211-219
    3. Christian Thiel, Christoph Thiel
      Pages 220-229
  7. Regulation & Policies

    1. Front Matter
      Pages 239-239
    2. Detlef Hühnlein
      Pages 241-248
    3. Michele Bezzi, Frances Cleary, Luca Compagna
      Pages 256-264
  8. Back Matter
    Pages 265-274

About these proceedings


This book presents the most interesting talks given at ISSE 2014 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include:

- Trust Services, eID and Cloud Security

- BYOD and Mobile Security

- Cybersecurity, Cybercrime, Critical Infrastructures

- Security Management, CISO Inside

- Privacy, Data Protection, Human Factors

- Regulation & Policies

Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014.


Trust Services, eID, Cloud Security & Management – BYOD, Mobile Security & Applications – Cybersecurity, Cybercrime, Critical Infrastructures – Security Management, CISO’s Experiences – Human Factors, Awareness & Privacy – Regulations and Policies

Target Groups

Chief Information Security Officers

Developers of Electronic Business Processes

IT Managers

IT Security Experts



Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen. Additionally he is president of the IT Security Association TeleTrusT.

Helmut Reimer: Senior Consultant, TeleTrusT

Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT


Business Process Electronic Business IT-Security Security

Editors and affiliations

  • Helmut Reimer
    • 1
  • Norbert Pohlmann
    • 2
  • Wolfgang Schneider
    • 3
  1. 1.TeleTrusT Bundesverband IT-Sicherheit e.V.ErfurtGermany
  2. 2.Institute for Internet SecurityWestfälische HochschuleGelsenkirchenGermany
  3. 3.Fraunhofer Institute SITDarmstadtGermany

Bibliographic information

  • DOI
  • Copyright Information Springer Fachmedien Wiesbaden 2014
  • Publisher Name Springer Vieweg, Wiesbaden
  • eBook Packages Computer Science
  • Print ISBN 978-3-658-06707-6
  • Online ISBN 978-3-658-06708-3
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software