EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Access Control"
Narrow search

Narrow search

Year of publication
Subject
All
User access control 114 Zutrittskontrolle 114 Data security 67 Datensicherheit 67 Access control 28 Datenschutz 21 Theorie 21 Theory 21 Data protection 20 IT crime 18 IT-Kriminalität 18 Zugriffskontrolle 18 Access Control 14 Biometrics 14 Biometrie 13 Security 13 Computer network 12 Computernetz 12 Betriebliches Informationssystem 11 Cloud Computing 11 Information management 11 Informationsmanagement 11 Internet 11 United States 10 access control 10 Electronic Commerce 9 USA 9 E-commerce 8 Identitätsverwaltung 8 Privacy 8 Cloud computing 7 Deutschland 7 Germany 7 Mobile Anwendung 7 Mobile application 7 Mobile communications 7 Mobilkommunikation 7 Authentifikation 6 Authorization 6 Business intelligence system 6
more ... less ...
Online availability
All
Undetermined 62 Free 36
Type of publication
All
Article 155 Book / Working Paper 53 Other 8
Type of publication (narrower categories)
All
Article in journal 65 Aufsatz in Zeitschrift 65 Aufsatz im Buch 44 Book section 44 Graue Literatur 11 Non-commercial literature 11 Working Paper 10 Arbeitspapier 9 Thesis 9 Hochschulschrift 8 research-article 8 Congress Report 5 Case study 3 Collection of articles of several authors 3 Fallstudie 3 Sammelwerk 3 Aufsatzsammlung 2 Dissertation u.a. Prüfungsschriften 2 Forschungsbericht 2 Bibliographie 1 Conference paper 1 Conference proceedings 1 Konferenzbeitrag 1 Konferenzschrift 1 Lehrbuch 1 case-report 1 conceptual-paper 1 review-article 1
more ... less ...
Language
All
English 166 German 28 Undetermined 22
Author
All
Bertino, Elisa 6 Bellou, Andriana 3 Gaudin, Germain 3 Hatzinakos, Dimitrios 3 Mohammadian, Masoud 3 Roberds, William 3 Wang, Hua 3 White, Alexander 3 Bagchi, Aditya 2 Best, Peter J. 2 Bhatt, Rachana 2 Cavalcante, Ana Helena A. P. 2 Dawson, Edward 2 Eckert, Claudia 2 Fuchs, Ludwig 2 Kedjar, Saadia 2 Lakaraju, Sandeep 2 Li, Ninghui 2 Li, Yan 2 Lin, Dan 2 Mazumdar, Chandan 2 Mookerjee, Vijay S. 2 Pal, Pinakpani 2 Rao, Prathima 2 Royer, Denis 2 Salim, Farzad 2 Schmidt, Klaus 2 Schreft, Stacey L. 2 Sowa, Aleksandra 2 Stepien, Bernard 2 Sun, Lili 2 Tari, Abdelkamel 2 Wang, Yong 2 Xu, Dianxiang 2 Yaokumah, Winfred 2 Aali, Nawal Ait 1 Abbasi, Hasan 1 Abdullah, Matin Saad 1 Abrishami, Saied 1 Adi, Kamel 1
more ... less ...
Institution
All
ICETE <4, 2007, Barcelona> 1 Organisation for Economic Co-operation and Development 1 Verlag Dr. Kovač 1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers 10 HMD : Praxis der Wirtschaftsinformatik 4 Information & Computer Security 4 E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings 3 Information diffusion management and knowledge sharing ; volume 1 3 Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems 3 International Journal of Information Security and Privacy (IJISP) 3 International journal of business information systems : IJBIS 3 International journal of networking and virtual organisations : IJNVO 3 Journal of organizational computing and electronic commerce 3 Berichte aus der Wirtschaftsinformatik 2 Database Systems Journal 2 Decision support systems : DSS ; the international journal 2 Digital identity management : perspectives on the technological, business and social implications 2 Discussion paper series / IZA 2 Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste 2 E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers 2 International Journal of Electronic Finance 2 International Journal of Secure Software Engineering (IJSSE) 2 International journal of services technology and management 2 Journal of air transport management 2 Journal of internet commerce 2 Journal of payments strategy & systems 2 Managerial Auditing Journal 2 SpringerLink / Bücher 2 Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten 2 Wissen - Märkte - Geistiges Eigentum 2 Advances in multimedia and interactive technologies 1 American economic journal 1 Banking and information technology : BIT ; a strategic report for top management 1 Business & Information Systems Engineering 1 Business analytics and cyber security management in organizations 1 Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz 1 Communications in computer and information science 1 Constitutional economics network working paper series 1 Contemporary economic policy : a journal of Western Economic Association International 1 De Gruyter Oldenbourg Studium 1 Discussion paper series 1 Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research 1 ERP-Management : Auswahl, Einführung und Betrieb von ERP-Systemen 1
more ... less ...
Source
All
ECONIS (ZBW) 143 Other ZBW resources 32 BASE 17 USB Cologne (EcoSocSci) 14 RePEc 9 EconStor 1
Showing 101 - 110 of 216
Cover Image
The design, development and application of a proxy credential auditing infrastructure for collaborative research
Bayliss, Christopher; Sinnott, Richard O.; Jie, Wei; … - In: E-technologies: transformation in a connected world : …, (pp. 211-226). 2011
Persistent link: https://www.econbiz.de/10009012913
Saved in:
Cover Image
A systematic approach to web application penetration testing using TTCN-3
Stepien, Bernard; Xiong, Pulei; Peyton, Liam - In: E-technologies: transformation in a connected world : …, (pp. 1-16). 2011
Persistent link: https://www.econbiz.de/10009012927
Saved in:
Cover Image
Mit dem E-Perso in die Wolke
Reisner, Stefan - In: Wirtschaftsinformatik & Management : Zeitschrift für … 3 (2011) 3, pp. 68-70
Persistent link: https://www.econbiz.de/10009158830
Saved in:
Cover Image
Integrating business process modelling and ERP role engineering
Panayiotou, Nikolaos A.; Gayialis, Sotiris P.; … - In: International journal of business information systems : … 8 (2011) 1, pp. 66-86
Persistent link: https://www.econbiz.de/10009270848
Saved in:
Cover Image
Hierarchy Similarity Analyser-An Approach to Securely Share Electronic Health Records
Bhartiya, Shalini; Mehrotra, Deepti; Girdhar, Anup - In: International Journal of E-Health and Medical … 7 (2016) 2, pp. 14-29
constraints, each organization defines its own access control schema exhibiting heterogeneity in organizational rules and policies …. An Extensible Access Control Markup Language (XACML)-based framework, Hierarchy Similarity Analyser (HSA), is proposed … which fine-grains access control policies of disparate healthcare organizations to achieve interoperable and secured sharing …
Persistent link: https://www.econbiz.de/10012044418
Saved in:
Cover Image
Combination of Access Control and De-Identification for Privacy Preserving in Big Data
Rahmani, Amine; Amine, Abdelmalek; Hamou, Reda Mohamed - In: International Journal of Information Security and … 10 (2016) 1, pp. 1-27
access control and data de-identification techniques in order to provide a powerful system. The aim of this system is to …
Persistent link: https://www.econbiz.de/10012045669
Saved in:
Cover Image
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing
Moradbeikie, Azin; Abrishami, Saied; Abbasi, Hasan - In: International Journal of Information Security and … 10 (2016) 4, pp. 44-57
offering an attribute-based access control method and time-limited attributes providing users' time-limited membership in cloud …
Persistent link: https://www.econbiz.de/10012045683
Saved in:
Cover Image
Access Control and Information Flow Control for Web Services Security
Kedjar, Saadia; Tari, Abdelkamel; Bertok, Peter - In: International Journal of Information Technology and Web … 11 (2016) 1, pp. 44-76
attention. The security solutions at the application level focus on access control which cannot alone ensure the confidentiality … and integrity of information. The solution proposed in this paper consists on a hybrid model that combines access control …
Persistent link: https://www.econbiz.de/10012046078
Saved in:
Cover Image
Throughput-Delay Evaluation of a Hybrid-MAC Protocol for M2M Communications
Verma, Pawan Kumar; Verma, Rajesh; Prakash, Arun; … - In: International Journal of Mobile Computing and … 7 (2016) 1, pp. 41-60
This paper proposes a robust hybrid-MAC protocol for direct communication among M2M devices with gateway coordination. The proposed protocol combines the benefits of both contention-based and reservation-based MAC schemes. The authors assume that the contention and reservation portion of M2M...
Persistent link: https://www.econbiz.de/10012046451
Saved in:
Cover Image
An Incremental B-Model for RBAC-Controlled Electronic Marking System
Aziz, Benjamin; Al-hadhrami, Nasser; Othmane, Lotfi ben - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 2, pp. 37-64
potentially renders the access control models inconsistent and creates security flaws. This paper proposes modeling Role Based … Access Control (RBAC) models of these software using the B language and re-evaluating the consistency of the models following …
Persistent link: https://www.econbiz.de/10012048073
Saved in:
  • First
  • Prev
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...