Skip to main content
  • Book
  • © 2013

ISSE 2013 Securing Electronic Business Processes

Highlights of the Information Security Solutions Europe 2013 Conference

  • The most interesting talks given at ISSE 2013
  • State-of-the-art: best papers
  • How to adequately secure electronic business processes
  • Includes supplementary material: sn.pub/extras

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 chapters)

  1. Cybersecurity, Cybercrime, Critical Infrastructures

    1. Front Matter

      Pages 195-195
    2. Digital Forensics as a Big Data Challenge

      • Alessandro Guarino
      Pages 197-203
    3. A Practical Approach for an IT Security Risk Analysis in Hospitals

      • Levona Eckstein, Reiner Kraft
      Pages 217-226
  2. Mobile Security & Applications

    1. Front Matter

      Pages 239-239
    2. Protected Software Module Architectures

      • Raoul Strackx, Job Noorman, Ingrid Verbauwhede, Bart Preneel, Frank Piessens
      Pages 241-251
    3. Secure Mobile Government and Mobile Banking Systems Based on Android Clients

      • Milan Marković, Goran Đorđević
      Pages 263-273
  3. Back Matter

    Pages 275-282

About this book

This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:

- Cloud Security, Trust Services, eId & Access Management

- Human Factors, Awareness & Privacy, Regulations and Policies

- Security Management

- Cyber Security, Cybercrime, Critical Infrastructures

- Mobile Security & Applications

Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.

Editors and Affiliations

  • TeleTrusT – Bundesverband IT-Sicherheit e.V., Erfurt, Germany

    Helmut Reimer

  • Gelsenkirchen, Germany

    Norbert Pohlmann

  • Darmstadt, Germany

    Wolfgang Schneider

About the editors

Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen

Helmut Reimer: Senior Consultant, TeleTrusT

Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access