EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Access Control"
Narrow search

Narrow search

Year of publication
Subject
All
User access control 114 Zutrittskontrolle 114 Data security 67 Datensicherheit 67 Access control 28 Datenschutz 21 Theorie 21 Theory 21 Data protection 20 IT crime 18 IT-Kriminalität 18 Zugriffskontrolle 18 Access Control 14 Biometrics 14 Biometrie 13 Security 13 Computer network 12 Computernetz 12 Betriebliches Informationssystem 11 Cloud Computing 11 Information management 11 Informationsmanagement 11 Internet 11 United States 10 access control 10 Electronic Commerce 9 USA 9 E-commerce 8 Identitätsverwaltung 8 Privacy 8 Cloud computing 7 Deutschland 7 Germany 7 Mobile Anwendung 7 Mobile application 7 Mobile communications 7 Mobilkommunikation 7 Authentifikation 6 Authorization 6 Business intelligence system 6
more ... less ...
Online availability
All
Undetermined 62 Free 36
Type of publication
All
Article 155 Book / Working Paper 53 Other 8
Type of publication (narrower categories)
All
Article in journal 65 Aufsatz in Zeitschrift 65 Aufsatz im Buch 44 Book section 44 Graue Literatur 11 Non-commercial literature 11 Working Paper 10 Arbeitspapier 9 Thesis 9 Hochschulschrift 8 research-article 8 Congress Report 5 Case study 3 Collection of articles of several authors 3 Fallstudie 3 Sammelwerk 3 Aufsatzsammlung 2 Dissertation u.a. Prüfungsschriften 2 Forschungsbericht 2 Bibliographie 1 Conference paper 1 Conference proceedings 1 Konferenzbeitrag 1 Konferenzschrift 1 Lehrbuch 1 case-report 1 conceptual-paper 1 review-article 1
more ... less ...
Language
All
English 166 German 28 Undetermined 22
Author
All
Bertino, Elisa 6 Bellou, Andriana 3 Gaudin, Germain 3 Hatzinakos, Dimitrios 3 Mohammadian, Masoud 3 Roberds, William 3 Wang, Hua 3 White, Alexander 3 Bagchi, Aditya 2 Best, Peter J. 2 Bhatt, Rachana 2 Cavalcante, Ana Helena A. P. 2 Dawson, Edward 2 Eckert, Claudia 2 Fuchs, Ludwig 2 Kedjar, Saadia 2 Lakaraju, Sandeep 2 Li, Ninghui 2 Li, Yan 2 Lin, Dan 2 Mazumdar, Chandan 2 Mookerjee, Vijay S. 2 Pal, Pinakpani 2 Rao, Prathima 2 Royer, Denis 2 Salim, Farzad 2 Schmidt, Klaus 2 Schreft, Stacey L. 2 Sowa, Aleksandra 2 Stepien, Bernard 2 Sun, Lili 2 Tari, Abdelkamel 2 Wang, Yong 2 Xu, Dianxiang 2 Yaokumah, Winfred 2 Aali, Nawal Ait 1 Abbasi, Hasan 1 Abdullah, Matin Saad 1 Abrishami, Saied 1 Adi, Kamel 1
more ... less ...
Institution
All
ICETE <4, 2007, Barcelona> 1 Organisation for Economic Co-operation and Development 1 Verlag Dr. Kovač 1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers 10 HMD : Praxis der Wirtschaftsinformatik 4 Information & Computer Security 4 E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings 3 Information diffusion management and knowledge sharing ; volume 1 3 Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems 3 International Journal of Information Security and Privacy (IJISP) 3 International journal of business information systems : IJBIS 3 International journal of networking and virtual organisations : IJNVO 3 Journal of organizational computing and electronic commerce 3 Berichte aus der Wirtschaftsinformatik 2 Database Systems Journal 2 Decision support systems : DSS ; the international journal 2 Digital identity management : perspectives on the technological, business and social implications 2 Discussion paper series / IZA 2 Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste 2 E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers 2 International Journal of Electronic Finance 2 International Journal of Secure Software Engineering (IJSSE) 2 International journal of services technology and management 2 Journal of air transport management 2 Journal of internet commerce 2 Journal of payments strategy & systems 2 Managerial Auditing Journal 2 SpringerLink / Bücher 2 Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten 2 Wissen - Märkte - Geistiges Eigentum 2 Advances in multimedia and interactive technologies 1 American economic journal 1 Banking and information technology : BIT ; a strategic report for top management 1 Business & Information Systems Engineering 1 Business analytics and cyber security management in organizations 1 Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz 1 Communications in computer and information science 1 Constitutional economics network working paper series 1 Contemporary economic policy : a journal of Western Economic Association International 1 De Gruyter Oldenbourg Studium 1 Discussion paper series 1 Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research 1 ERP-Management : Auswahl, Einführung und Betrieb von ERP-Systemen 1
more ... less ...
Source
All
ECONIS (ZBW) 143 Other ZBW resources 32 BASE 17 USB Cologne (EcoSocSci) 14 RePEc 9 EconStor 1
Showing 51 - 60 of 216
Cover Image
Ownership, access, and sequential
Mai, Maxim; Smirnov, Vladimir; Wait, Andrew - In: The Canadian journal of economics 47 (2014) 1, pp. 203-231
Persistent link: https://www.econbiz.de/10010373271
Saved in:
Cover Image
The impact of digital fingerprinting and identity verification on data quality : duplication detection is not a perfect science
Courtright, Melanie; Pashupati, Kartik - In: Journal of advertising research 54 (2014) 3, pp. 263-269
Persistent link: https://www.econbiz.de/10010419829
Saved in:
Cover Image
Real-time Security Extensions for EPCglobal Networks : Case Study for the Pharmaceutical Industry
Schapranow, Matthieu-Patrick - 2014
-based access control for EPCglobal software components, which enables a continuous control of access based on the real …
Persistent link: https://www.econbiz.de/10014016802
Saved in:
Cover Image
PP-trust-X: A system for privacy preserving trust negotiations
Squicciarini, Anna; Bertino, Elisa; Ferrari, Elena; … - 2007
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive interactions may often occur between entities with no prior knowledge of each other. Although, to date several trust negotiation systems have been proposed, none of them fully address the problem...
Persistent link: https://www.econbiz.de/10009430846
Saved in:
Cover Image
Enforcing P3P policies using a digital rights management system
Salim, Farzad; Sheppard, Nicholas P.; Safavi-Naini, Rei - 2007
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that protects private data through the enforcement of licenses provided by consumers. Prior to supplying data, data owners are...
Persistent link: https://www.econbiz.de/10009438034
Saved in:
Cover Image
Rollen und Berechtigungskonzepte : Ansätze für das Identity- und Access Management im Unternehmen
Schmidt, Klaus - 2010 - 1. Aufl.
Persistent link: https://www.econbiz.de/10008653470
Saved in:
Cover Image
Parallel Access Control Model in Cross-Domain Grid Computing Environment
Namane, Sarra; Ghoualmi, Nassira - In: International Journal of Embedded and Real-Time … 9 (2018) 1, pp. 50-65
as access control. With the expansion of the network scale, a large number of authorization requests have to be treated …-domain access control, and a variety of solutions use the role mapping mechanism to allow collaborations between domains. But this … proposes a parallel access control model in cross-domain grid computing architecture to be more convenient to the security …
Persistent link: https://www.econbiz.de/10012044698
Saved in:
Cover Image
Access Control Framework Using Multi-Factor Authentication in Cloud Computing
Patel, Subhash Chandra; Jaiswal, Sumit; Singh, Ravi Shankar - In: International Journal of Green Computing (IJGC) 9 (2018) 2, pp. 1-15
The most challenging issues in cloud computing are access control and data security because users of the cloud … method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms … that are suitable for access control. The proposed system involves user ID/password, biometrics characteristics, and a …
Persistent link: https://www.econbiz.de/10012044942
Saved in:
Cover Image
Security Integration in DDoS Attack Mitigation Using Access Control Lists
Sharma, Kavita; Yadav, Sumit Kumar; Arora, Arushi - In: International Journal of Information System Modeling … 9 (2018) 1, pp. 56-76
In this article, the authors propose a DDoS mitigation system through access list-based configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to prohibit DDoS attacks over ISPs' networks traffic. The effectiveness of the proposed system relies heavily on the...
Persistent link: https://www.econbiz.de/10012045658
Saved in:
Cover Image
An Improvised Framework for Privacy Preservation in IoT
Hussain, Muzzammil; Kaliya, Neha - In: International Journal of Information Security and … 12 (2018) 2, pp. 46-63
Data privacy is now-a-days a special issue in era of Internet of Things because of the big data stored and transmitted by the public/private devices. Different types and levels of privacy can be provided at different layers of IoT architecture, also different mechanisms operate at different...
Persistent link: https://www.econbiz.de/10012045715
Saved in:
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...