RFID, e-ID Cards, Trusted Computing, Interoperability.- Radio Frequency Identification (RFID) and Data Protection Legal Issues.- e-ID and Smartcards — Current Status, Hopeful Developments and Best Practices.- European Citizen Card Combined with Travel Document Function, Convergence or Divergence?.- Physical Unclonable Functions for enhanced security of tokens and tags.- Hardware Security Features for Secure Embedded Devices.- Security in Next Generation Consumer Electronic Devices.- Security Architecture for Device Encryption and VPN.- TPM Enterprise Key Management requires centralized Hardware-based Security.- Implementation of DRM Systems under the EU Legal Framework.- IT-Grundschutz: Two-Tier Risk Assessment for a Higher Efficiency in IT Security Management.- ISOIIEC 24727 — A Future Standard for Smart Card Middleware.- Information Security Standardization — the ETSI Perspective.- Digital Signatures without the Headaches.- Could Test Standards Help on the Way to Achieve Global e-Passport Interoperability?.- A New Standard Based Road to Interoperable Strong Authentication.- Identity Management, Biometrics, PKI-Solutions, Network Security.- Identifying Patterns of Federation Adoption.- Fidelity: Federated Identity Management Security based on Liberty Alliance on European Ambit.- Deflecting Active Directory Attacks.- Implementing role based access control — How we can do it better!.- Identity and Access Control — Demonstrating Compliance.- Robust and Secure Biometrics: Some Application Examples.- Selecting the Optimal Biometric 2-factor Authentication Method — a User’s Viewpoint.- A Face Recognition System for Mobile Phones.- Advanced certificate validation service for secure Service-Oriented Architectures.- An Introduction to Validation for FederatedPKIs.- MADSig: Enhancing Digital Signature to Capture Secure Document Processing Requirements.- PKi Consolidation Project and Multiapplicative Smart Payment Cards.- Security Analysis and Configuration of Large Networks.- S-VPN Policy: Access List Conflict Automatic Analysis and Resolution.- Lock-Keeper: A New Implementation of Physical Separation Technology.- SPEECH: Secure Personal End-to-End Communication with Handheld.- Finding the Mobile Trusted Element.- Security Management, Applications.- Centrally Administered COIs Using Cross-Organizational Trust.- Improving Assurance of Information Security Rol.- Modelling the Economics of Free and Open Source Software Security.- Securing service-oriented applications.- A Service Oriented Trust Development Platform.- A Trust Label for Secure and Compliant e-ID Applications: The Belgian Experience.- Electronic signature in Italy after ten years of “running in”.- Awareness Raising, Compliance, Data Protection, Cyberspace Regulation.- Internet Early Warning System: The Global View.- IT Security Vulnerability and Incident Response Management.- Blending Corporate Governance with Information Security.- On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context.- Regulation of State Surveillance of the Internet.- How Can NRA Contribute to the Improvement of IT Security?.- Information Security Regulation: Tomorrow Never Dies?.- Introducing Regulatory Compliance Requirements Engineering.- Legal Issues in Secure Grid Computing Environments.- The Impact of Monitoring Technology on the Law.