EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Access Control"
Narrow search

Narrow search

Year of publication
Subject
All
User access control 114 Zutrittskontrolle 114 Data security 67 Datensicherheit 67 Access control 28 Datenschutz 21 Theorie 21 Theory 21 Data protection 20 IT crime 18 IT-Kriminalität 18 Zugriffskontrolle 18 Access Control 14 Biometrics 14 Biometrie 13 Security 13 Computer network 12 Computernetz 12 Betriebliches Informationssystem 11 Cloud Computing 11 Information management 11 Informationsmanagement 11 Internet 11 United States 10 access control 10 Electronic Commerce 9 USA 9 E-commerce 8 Identitätsverwaltung 8 Privacy 8 Cloud computing 7 Deutschland 7 Germany 7 Mobile Anwendung 7 Mobile application 7 Mobile communications 7 Mobilkommunikation 7 Authentifikation 6 Authorization 6 Business intelligence system 6
more ... less ...
Online availability
All
Undetermined 62 Free 36
Type of publication
All
Article 155 Book / Working Paper 53 Other 8
Type of publication (narrower categories)
All
Article in journal 65 Aufsatz in Zeitschrift 65 Aufsatz im Buch 44 Book section 44 Graue Literatur 11 Non-commercial literature 11 Working Paper 10 Arbeitspapier 9 Thesis 9 Hochschulschrift 8 research-article 8 Congress Report 5 Case study 3 Collection of articles of several authors 3 Fallstudie 3 Sammelwerk 3 Aufsatzsammlung 2 Dissertation u.a. Prüfungsschriften 2 Forschungsbericht 2 Bibliographie 1 Conference paper 1 Conference proceedings 1 Konferenzbeitrag 1 Konferenzschrift 1 Lehrbuch 1 case-report 1 conceptual-paper 1 review-article 1
more ... less ...
Language
All
English 166 German 28 Undetermined 22
Author
All
Bertino, Elisa 6 Bellou, Andriana 3 Gaudin, Germain 3 Hatzinakos, Dimitrios 3 Mohammadian, Masoud 3 Roberds, William 3 Wang, Hua 3 White, Alexander 3 Bagchi, Aditya 2 Best, Peter J. 2 Bhatt, Rachana 2 Cavalcante, Ana Helena A. P. 2 Dawson, Edward 2 Eckert, Claudia 2 Fuchs, Ludwig 2 Kedjar, Saadia 2 Lakaraju, Sandeep 2 Li, Ninghui 2 Li, Yan 2 Lin, Dan 2 Mazumdar, Chandan 2 Mookerjee, Vijay S. 2 Pal, Pinakpani 2 Rao, Prathima 2 Royer, Denis 2 Salim, Farzad 2 Schmidt, Klaus 2 Schreft, Stacey L. 2 Sowa, Aleksandra 2 Stepien, Bernard 2 Sun, Lili 2 Tari, Abdelkamel 2 Wang, Yong 2 Xu, Dianxiang 2 Yaokumah, Winfred 2 Aali, Nawal Ait 1 Abbasi, Hasan 1 Abdullah, Matin Saad 1 Abrishami, Saied 1 Adi, Kamel 1
more ... less ...
Institution
All
ICETE <4, 2007, Barcelona> 1 Organisation for Economic Co-operation and Development 1 Verlag Dr. Kovač 1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers 10 HMD : Praxis der Wirtschaftsinformatik 4 Information & Computer Security 4 E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings 3 Information diffusion management and knowledge sharing ; volume 1 3 Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems 3 International Journal of Information Security and Privacy (IJISP) 3 International journal of business information systems : IJBIS 3 International journal of networking and virtual organisations : IJNVO 3 Journal of organizational computing and electronic commerce 3 Berichte aus der Wirtschaftsinformatik 2 Database Systems Journal 2 Decision support systems : DSS ; the international journal 2 Digital identity management : perspectives on the technological, business and social implications 2 Discussion paper series / IZA 2 Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste 2 E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers 2 International Journal of Electronic Finance 2 International Journal of Secure Software Engineering (IJSSE) 2 International journal of services technology and management 2 Journal of air transport management 2 Journal of internet commerce 2 Journal of payments strategy & systems 2 Managerial Auditing Journal 2 SpringerLink / Bücher 2 Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten 2 Wissen - Märkte - Geistiges Eigentum 2 Advances in multimedia and interactive technologies 1 American economic journal 1 Banking and information technology : BIT ; a strategic report for top management 1 Business & Information Systems Engineering 1 Business analytics and cyber security management in organizations 1 Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz 1 Communications in computer and information science 1 Constitutional economics network working paper series 1 Contemporary economic policy : a journal of Western Economic Association International 1 De Gruyter Oldenbourg Studium 1 Discussion paper series 1 Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research 1 ERP-Management : Auswahl, Einführung und Betrieb von ERP-Systemen 1
more ... less ...
Source
All
ECONIS (ZBW) 143 Other ZBW resources 32 BASE 17 USB Cologne (EcoSocSci) 14 RePEc 9 EconStor 1
Showing 141 - 150 of 216
Cover Image
TwoStep: an authentication method combining text and graphical passwords
Oorschot, P. C. van; Wan, Tao - In: E-technologies: innovation in an open world : 4th …, (pp. 233-239). 2009
Persistent link: https://www.econbiz.de/10003844975
Saved in:
Cover Image
Strong authentication for financial services : PTDs as a compromise between security and usability
Me, Gianluigi; Pirro, Daniele; Sarrecchia, Roberto - In: Mobile and ubiquitous commerce : advanced E-business methods, (pp. 101-114). 2009
Persistent link: https://www.econbiz.de/10003885209
Saved in:
Cover Image
Tippverhaltensbiometrie Psylock
Bartmann, Dieter - In: Banking and information technology : BIT ; a strategic … 10 (2009) 2, pp. 7-18
Persistent link: https://www.econbiz.de/10003886962
Saved in:
Cover Image
Am I really at risk? : determinants of online users' intentions to use strong passwords
Zhang, Lixuan; McDowell, William C. - In: Journal of internet commerce 8 (2009) 3/4, pp. 180-197
Persistent link: https://www.econbiz.de/10003941384
Saved in:
Cover Image
Regulating access to international large-value payment systems
Holthausen, Cornelia - 2000
Persistent link: https://www.econbiz.de/10013434302
Saved in:
Cover Image
Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking
Butler, Martin; Butler, Rika - In: Information & Computer Security 23 (2015) 4, pp. 421-434
Purpose – The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk profile. Online security remains a challenge to ensure safe transacting on the Internet. User authentication,...
Persistent link: https://www.econbiz.de/10014754867
Saved in:
Cover Image
Security evaluation of the OAuth 2.0 framework
Ferry, Eugene; O Raw, John; Curran, Kevin - In: Information & Computer Security 23 (2015) 1, pp. 73-101
Purpose – The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This...
Persistent link: https://www.econbiz.de/10014754902
Saved in:
Cover Image
Resolving authorization conflicts by ontology views for controlled access to a digital library
Dasgupta, Subhasis; Pal, Pinakpani; Mazumdar, Chandan; … - In: Journal of Knowledge Management 19 (2015) 1, pp. 45-59
proposes an access control mechanism for controlled access to different concepts by different users depending on the … Directed Acyclic Graph instead of a tree. A new access control model has been developed for such a polyhierarchic ontology … access control model has been introduced for the ontology structure where a user gets authorizations to access a concept node …
Persistent link: https://www.econbiz.de/10014881042
Saved in:
Cover Image
Mobility handling in wireless body area networks for patient monitoring in smart hospital
Venkateswari, R.; Rani, S. Subha - In: International journal of enterprise network management 6 (2015) 4, pp. 251-262
Persistent link: https://www.econbiz.de/10011539595
Saved in:
Cover Image
Resolving authorization conflicts by ontology views for controlled access to a digital library
Dasgupta, Subhasish; Pal, Pinakpani; Mazumdar, Chandan; … - In: Journal of knowledge management 19 (2015) 1, pp. 45-59
Persistent link: https://www.econbiz.de/10011296912
Saved in:
  • First
  • Prev
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...