EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Access Control"
Narrow search

Narrow search

Year of publication
Subject
All
User access control 114 Zutrittskontrolle 114 Data security 67 Datensicherheit 67 Access control 28 Datenschutz 21 Theorie 21 Theory 21 Data protection 20 IT crime 18 IT-Kriminalität 18 Zugriffskontrolle 18 Access Control 14 Biometrics 14 Biometrie 13 Security 13 Computer network 12 Computernetz 12 Betriebliches Informationssystem 11 Cloud Computing 11 Information management 11 Informationsmanagement 11 Internet 11 United States 10 access control 10 Electronic Commerce 9 USA 9 E-commerce 8 Identitätsverwaltung 8 Privacy 8 Cloud computing 7 Deutschland 7 Germany 7 Mobile Anwendung 7 Mobile application 7 Mobile communications 7 Mobilkommunikation 7 Authentifikation 6 Authorization 6 Business intelligence system 6
more ... less ...
Online availability
All
Undetermined 62 Free 36
Type of publication
All
Article 155 Book / Working Paper 53 Other 8
Type of publication (narrower categories)
All
Article in journal 65 Aufsatz in Zeitschrift 65 Aufsatz im Buch 44 Book section 44 Graue Literatur 11 Non-commercial literature 11 Working Paper 10 Arbeitspapier 9 Thesis 9 Hochschulschrift 8 research-article 8 Congress Report 5 Case study 3 Collection of articles of several authors 3 Fallstudie 3 Sammelwerk 3 Aufsatzsammlung 2 Dissertation u.a. Prüfungsschriften 2 Forschungsbericht 2 Bibliographie 1 Conference paper 1 Conference proceedings 1 Konferenzbeitrag 1 Konferenzschrift 1 Lehrbuch 1 case-report 1 conceptual-paper 1 review-article 1
more ... less ...
Language
All
English 166 German 28 Undetermined 22
Author
All
Bertino, Elisa 6 Bellou, Andriana 3 Gaudin, Germain 3 Hatzinakos, Dimitrios 3 Mohammadian, Masoud 3 Roberds, William 3 Wang, Hua 3 White, Alexander 3 Bagchi, Aditya 2 Best, Peter J. 2 Bhatt, Rachana 2 Cavalcante, Ana Helena A. P. 2 Dawson, Edward 2 Eckert, Claudia 2 Fuchs, Ludwig 2 Kedjar, Saadia 2 Lakaraju, Sandeep 2 Li, Ninghui 2 Li, Yan 2 Lin, Dan 2 Mazumdar, Chandan 2 Mookerjee, Vijay S. 2 Pal, Pinakpani 2 Rao, Prathima 2 Royer, Denis 2 Salim, Farzad 2 Schmidt, Klaus 2 Schreft, Stacey L. 2 Sowa, Aleksandra 2 Stepien, Bernard 2 Sun, Lili 2 Tari, Abdelkamel 2 Wang, Yong 2 Xu, Dianxiang 2 Yaokumah, Winfred 2 Aali, Nawal Ait 1 Abbasi, Hasan 1 Abdullah, Matin Saad 1 Abrishami, Saied 1 Adi, Kamel 1
more ... less ...
Institution
All
ICETE <4, 2007, Barcelona> 1 Organisation for Economic Co-operation and Development 1 Verlag Dr. Kovač 1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers 10 HMD : Praxis der Wirtschaftsinformatik 4 Information & Computer Security 4 E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings 3 Information diffusion management and knowledge sharing ; volume 1 3 Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems 3 International Journal of Information Security and Privacy (IJISP) 3 International journal of business information systems : IJBIS 3 International journal of networking and virtual organisations : IJNVO 3 Journal of organizational computing and electronic commerce 3 Berichte aus der Wirtschaftsinformatik 2 Database Systems Journal 2 Decision support systems : DSS ; the international journal 2 Digital identity management : perspectives on the technological, business and social implications 2 Discussion paper series / IZA 2 Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste 2 E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers 2 International Journal of Electronic Finance 2 International Journal of Secure Software Engineering (IJSSE) 2 International journal of services technology and management 2 Journal of air transport management 2 Journal of internet commerce 2 Journal of payments strategy & systems 2 Managerial Auditing Journal 2 SpringerLink / Bücher 2 Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten 2 Wissen - Märkte - Geistiges Eigentum 2 Advances in multimedia and interactive technologies 1 American economic journal 1 Banking and information technology : BIT ; a strategic report for top management 1 Business & Information Systems Engineering 1 Business analytics and cyber security management in organizations 1 Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz 1 Communications in computer and information science 1 Constitutional economics network working paper series 1 Contemporary economic policy : a journal of Western Economic Association International 1 De Gruyter Oldenbourg Studium 1 Discussion paper series 1 Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research 1 ERP-Management : Auswahl, Einführung und Betrieb von ERP-Systemen 1
more ... less ...
Source
All
ECONIS (ZBW) 143 Other ZBW resources 32 BASE 17 USB Cologne (EcoSocSci) 14 RePEc 9 EconStor 1
Showing 1 - 10 of 216
Cover Image
Digitale Identitäten als Fundament des Web 3.0
Puhl, Pirmin; Roloff, Malte; Märkel, Christian; … - 2023
Die Evolution des World Wide Web führt zu einem verstärkten Wunsch nach und Bedarf an dezentralen, selbstverwalteten Digitalen Identitäten, auch als Self-Sovereign Identities (SSI) bekannt. Im Gegensatz zu gegenwärtig verbreiteten zentralisierten und föderierten Digitalen Identitäten...
Persistent link: https://www.econbiz.de/10014441893
Saved in:
Cover Image
Cybersecurity : Technology and Governance
Jøsang, Audun - 2025
Chapter 1 Basic concepts of cybersecurity -- Chapter 2 Attack vectors and malware -- Chapter 3 System security -- Chapter 4 Cryptography -- Chapter 5 Key management and PKI -- Chapter 6 Network security -- Chapter 7 Wireless Security -- Chapter 8 User authentication -- Chapter 9 IAM – Identity...
Persistent link: https://www.econbiz.de/10015135607
Saved in:
Cover Image
Research on secure storage data access control of smart TV based on blockchain
Qiu, Jianxin - In: International journal of product development : IJPD 27 (2023) 4, pp. 384-396
Persistent link: https://www.econbiz.de/10015065221
Saved in:
Cover Image
Vertical Agreements and User Access
Gaudin, Germain; White, Alexander - 2020
Platforms acting as sales channels for producers often charge users for access, via a subscription fee or a markup on hardware. We compare two common forms of vertical pricing agreement that platforms use with sellers: per-­unit and proportional fees. In particular, we analyze the critical role...
Persistent link: https://www.econbiz.de/10014033182
Saved in:
Cover Image
Vertical Agreements and User Access
Gaudin, Germain - 2020
Platforms acting as sales channels for producers often charge users for access, via a subscription fee or a markup on hardware. We compare two common forms of vertical pricing agreement that platforms use with sellers: per-unit and proportional fees. In particular, we analyze the critical role...
Persistent link: https://www.econbiz.de/10012826139
Saved in:
Cover Image
Development of Trust Based Access Control Models Using Fuzzy Logic in Cloud Computing
Kesarwani, Abhishek - 2020
Cloud computing is the technology that provides different types of services as a useful resource on the Internet. Resource trust value will help the cloud users to select the services of a cloud provider for processing and storing their essential information. Also, service providers can give...
Persistent link: https://www.econbiz.de/10014091143
Saved in:
Cover Image
Unified enterprise modelling language-based interoperability for collaborative access control framework in critical infrastructures
Baina, Amine; Benali, Khalid; Bellafkih, Mostafa; Aali, … - In: International journal of networking and virtual … 22 (2020) 1, pp. 75-100
Persistent link: https://www.econbiz.de/10012178096
Saved in:
Cover Image
Access control system for RFID-tagged documents in supply chain management
Nowicki, Tadeusz; Kiedrowicz, Maciej; Waszkowski, Robert; … - In: LogForum : elektroniczne czasopismo naukowe z dziedziny … 13 (2017) 1, pp. 91-101
Persistent link: https://www.econbiz.de/10011808610
Saved in:
Cover Image
FRABAC: a new hybrid access control model for the heterogeneous multi-domain systems
Ben Attia, Hasiba; Kahloul, Laid; Benharzallah, Saber - In: International journal of management and decision making … 17 (2018) 3, pp. 245-278
Persistent link: https://www.econbiz.de/10011971578
Saved in:
Cover Image
A Clark-Wilson and ANSI role-based access control model
Tsegaye, Tamir; Flowerday, Stephen - In: Information & Computer Security 28 (2020) 3, pp. 373-395
patient information. This paper aims to present a model for securing the EHR based on role-based access control (RBAC …), attribute-based access control (ABAC) and the Clark-Wilson model. Design/methodology/approach A systematic literature review was …
Persistent link: https://www.econbiz.de/10014754816
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...