EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Access Control"
Narrow search

Narrow search

Year of publication
Subject
All
User access control 114 Zutrittskontrolle 114 Data security 67 Datensicherheit 67 Access control 28 Datenschutz 21 Theorie 21 Theory 21 Data protection 20 IT crime 18 IT-Kriminalität 18 Zugriffskontrolle 18 Access Control 14 Biometrics 14 Biometrie 13 Security 13 Computer network 12 Computernetz 12 Betriebliches Informationssystem 11 Cloud Computing 11 Information management 11 Informationsmanagement 11 Internet 11 United States 10 access control 10 Electronic Commerce 9 USA 9 E-commerce 8 Identitätsverwaltung 8 Privacy 8 Cloud computing 7 Deutschland 7 Germany 7 Mobile Anwendung 7 Mobile application 7 Mobile communications 7 Mobilkommunikation 7 Authentifikation 6 Authorization 6 Business intelligence system 6
more ... less ...
Online availability
All
Undetermined 62 Free 36
Type of publication
All
Article 155 Book / Working Paper 53 Other 8
Type of publication (narrower categories)
All
Article in journal 65 Aufsatz in Zeitschrift 65 Aufsatz im Buch 44 Book section 44 Graue Literatur 11 Non-commercial literature 11 Working Paper 10 Arbeitspapier 9 Thesis 9 Hochschulschrift 8 research-article 8 Congress Report 5 Case study 3 Collection of articles of several authors 3 Fallstudie 3 Sammelwerk 3 Aufsatzsammlung 2 Dissertation u.a. Prüfungsschriften 2 Forschungsbericht 2 Bibliographie 1 Conference paper 1 Conference proceedings 1 Konferenzbeitrag 1 Konferenzschrift 1 Lehrbuch 1 case-report 1 conceptual-paper 1 review-article 1
more ... less ...
Language
All
English 166 German 28 Undetermined 22
Author
All
Bertino, Elisa 6 Bellou, Andriana 3 Gaudin, Germain 3 Hatzinakos, Dimitrios 3 Mohammadian, Masoud 3 Roberds, William 3 Wang, Hua 3 White, Alexander 3 Bagchi, Aditya 2 Best, Peter J. 2 Bhatt, Rachana 2 Cavalcante, Ana Helena A. P. 2 Dawson, Edward 2 Eckert, Claudia 2 Fuchs, Ludwig 2 Kedjar, Saadia 2 Lakaraju, Sandeep 2 Li, Ninghui 2 Li, Yan 2 Lin, Dan 2 Mazumdar, Chandan 2 Mookerjee, Vijay S. 2 Pal, Pinakpani 2 Rao, Prathima 2 Royer, Denis 2 Salim, Farzad 2 Schmidt, Klaus 2 Schreft, Stacey L. 2 Sowa, Aleksandra 2 Stepien, Bernard 2 Sun, Lili 2 Tari, Abdelkamel 2 Wang, Yong 2 Xu, Dianxiang 2 Yaokumah, Winfred 2 Aali, Nawal Ait 1 Abbasi, Hasan 1 Abdullah, Matin Saad 1 Abrishami, Saied 1 Adi, Kamel 1
more ... less ...
Institution
All
ICETE <4, 2007, Barcelona> 1 Organisation for Economic Co-operation and Development 1 Verlag Dr. Kovač 1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers 10 HMD : Praxis der Wirtschaftsinformatik 4 Information & Computer Security 4 E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings 3 Information diffusion management and knowledge sharing ; volume 1 3 Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems 3 International Journal of Information Security and Privacy (IJISP) 3 International journal of business information systems : IJBIS 3 International journal of networking and virtual organisations : IJNVO 3 Journal of organizational computing and electronic commerce 3 Berichte aus der Wirtschaftsinformatik 2 Database Systems Journal 2 Decision support systems : DSS ; the international journal 2 Digital identity management : perspectives on the technological, business and social implications 2 Discussion paper series / IZA 2 Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste 2 E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers 2 International Journal of Electronic Finance 2 International Journal of Secure Software Engineering (IJSSE) 2 International journal of services technology and management 2 Journal of air transport management 2 Journal of internet commerce 2 Journal of payments strategy & systems 2 Managerial Auditing Journal 2 SpringerLink / Bücher 2 Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten 2 Wissen - Märkte - Geistiges Eigentum 2 Advances in multimedia and interactive technologies 1 American economic journal 1 Banking and information technology : BIT ; a strategic report for top management 1 Business & Information Systems Engineering 1 Business analytics and cyber security management in organizations 1 Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz 1 Communications in computer and information science 1 Constitutional economics network working paper series 1 Contemporary economic policy : a journal of Western Economic Association International 1 De Gruyter Oldenbourg Studium 1 Discussion paper series 1 Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research 1 ERP-Management : Auswahl, Einführung und Betrieb von ERP-Systemen 1
more ... less ...
Source
All
ECONIS (ZBW) 143 Other ZBW resources 32 BASE 17 USB Cologne (EcoSocSci) 14 RePEc 9 EconStor 1
Showing 111 - 120 of 216
Cover Image
Gesture-based animated CAPTCHA
Shumilov, Artem; Philippovich, Andrey - In: Information & Computer Security 24 (2016) 3, pp. 242-254
Purpose This paper aims to describe the development of a new experimental CAPTCHA (completely automated public turing test to tell computers and humans apart), which is supposed to provide better protection against spam bots compared to the existing captcha solutions. Design/methodology/approach...
Persistent link: https://www.econbiz.de/10014754907
Saved in:
Cover Image
Security-by-Design in der Cloud-Anwendungsentwicklung
Schoknecht, Andreas; Schiefer, Gunther; Citak, Murat; … - In: HMD : Praxis der Wirtschaftsinformatik 53 (2016) 311, pp. 688-697
-based Access Control Modell auf. Dabei werden Zugriffsrechte gewährt, indem Zugriffsregeln ausgewertet werden, welche …
Persistent link: https://www.econbiz.de/10011668995
Saved in:
Cover Image
Towards a game theoretic authorisation model
Salim, Farzad; Reid, Jason; Dulleck, Uwe; Dawson, Edward - 2010
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users? access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer...
Persistent link: https://www.econbiz.de/10009483459
Saved in:
Cover Image
Cost Effective RADIUS Authentication for Wireless Clients
ENACEANU, Alexandru; GARAIS, Gabriel - In: Database Systems Journal 1 (2010) 2, pp. 27-32
Network administrators need to keep administrative user information for each network device, but network devices usually support only limited functions for user management. WLAN security is a modern problem that needs to be solved and it requires a lot of overhead especially when applied to...
Persistent link: https://www.econbiz.de/10010587755
Saved in:
Cover Image
Modelling a Trusted Mechanism for Knowledge Sharing
PETRESCU, Marius; POPESCU, Delia Mioara; SIRBU, Nicoleta - In: REVISTA DE MANAGEMENT COMPARAT INTERNATIONAL/REVIEW OF … 11 (2010) 5, pp. 799-806
assurance concepts of integrity, authenticity, availability, non-repudiation and access-control may be employed to ensure a …
Persistent link: https://www.econbiz.de/10008852699
Saved in:
Cover Image
Neue Chancen im Service Management durch Sprachbiometrie
Baumgärtner, Frank - In: Professionelles Sales & Service Management : Vorsprung …, (pp. 233-258). 2010
Persistent link: https://www.econbiz.de/10003973413
Saved in:
Cover Image
Influence of awareness and training on cyber security
McCrohan, Kevin F.; Engel, Kathryn; Harvey, James W. - In: Journal of internet commerce 9 (2010) 1, pp. 23-41
Persistent link: https://www.econbiz.de/10003988456
Saved in:
Cover Image
Towards an understanding of user acceptance to use biometric authentication systems in e-commerce : using an extension of the Technology Acceptance Model
Al-Harby, Fahad; Qahwaji, Rami; Kamala, Mumtaz - In: International journal of e-business research : an … 6 (2010) 3, pp. 34-55
Persistent link: https://www.econbiz.de/10008649852
Saved in:
Cover Image
Commercial Internet filters : perils and opportunities
Chou, Chen-huei; Sinha, Atish P.; Huimin, Zhao - In: Decision support systems : DSS ; the international journal 48 (2009/10) 4, pp. 521-530
Persistent link: https://www.econbiz.de/10003953698
Saved in:
Cover Image
Governance Risk Compliance im SAP-Umfeld der Banken
Petermann, Sven; Sowa, Aleksandra - In: HMD : Praxis der Wirtschaftsinformatik 47 (2010) 272, pp. 91-99
Persistent link: https://www.econbiz.de/10003956223
Saved in:
  • First
  • Prev
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...