Abbrevation
ISGIG
City
Pisa
Country
Italy
Deadline Paper
Start Date
End Date
Abstract

ISGIG &#8242;08 is focused on two broad areas of challenge in securing enterprises in a pervasively connected world; cross&#8211;border and cross&#8211;organisiation domain issues&#046; The resolution of conflict and development of synergy between these issues will be a defining factor in the success of personal, enterprise and EU wide information security&#046; <BR> <B>Keywords:</B> <UL> <LI>Resilient and dependable cross&#8211;border infrastructures <UL> <LI>Resilient security, alert &amp; threat sharing infrastructures (CIP &amp; CIIP) <LI>Trust infrastructures for federation of individuals and businesses <LI>Identity assurance infrastructures <LI>Specialized National (control, monitoring, etc&#046;) Internets </LI></UL> <LI>Open security standards, architectures and policies <UL> <LI>Interoperability, Information Exchange (alert, threat, incident etc&#046;) <LI>Dependability and Trust <LI>Security Incident Detection, Reaction and Recovery (CERTs, CSIRTs, WARPs etc&#046;) <LI>Degrees of Openness: Public vs&#046; Selective “Institutional” </LI></UL> <LI>Cross&#8211;border identity management <UL> <LI>Models for identity establishment, verification and assurance <LI>Mechanisms: Biometrics, Identity Cards, etc&#046; </LI></UL> <LI>Cross&#8211;border security management <UL> <LI>Managed Security Services <LI>EU boundary IT and ICT security <LI>Secure mobility &amp; mobile working <LI>Embedded and wireless (Pervasive) computing and services <LI>Functional mapping of security models and mechanisms </LI></UL> <LI>Security and Privacy Policy <LI>Legislative framework, IT and ICT governance and incentives <UL> <LI>The role of government and related organizations <LI>Regulatory Compliance: Theory and Practice <LI>IT and ICT Governance <LI>Certification and Evaluation <LI>IT outsourcing framework </LI></UL></LI></UL>