//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~type_genre:"Aufsatz im Buch"
~subject:"Großbritannien"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject:"Access Control"
Narrow search
Delete all filters
| 2 applied filters
Year of publication
From:
To:
Subject
All
Großbritannien
User access control
42
Zutrittskontrolle
42
Data security
26
Datensicherheit
26
Theorie
10
Theory
10
IT crime
8
IT-Kriminalität
8
Computer network
6
Computernetz
6
Biometrics
5
Biometrie
5
Database
3
Datenbank
3
Deutschland
3
Digitale Dienste
3
E-commerce
3
Electronic Banking
3
Electronic Commerce
3
Electronic banking
3
Germany
3
Internet
3
Mobile Anwendung
3
Mobile application
3
United Kingdom
3
Web-based service
3
Algorithm
2
Algorithmus
2
Bank
2
Benutzerschnittstelle
2
Computerized method
2
Computerunterstützung
2
Information
2
Information management
2
Informationsmanagement
2
Mobile Business
2
Mobile business
2
Mobile communications
2
Mobilkommunikation
2
more ...
less ...
Type of publication
All
Article
3
Type of publication (narrower categories)
All
Aufsatz im Buch
Book section
3
Case study
1
Fallstudie
1
Language
All
English
3
Author
All
Arshad, Junaid
1
Bayliss, Christopher
1
Hardy, Keith
1
Jie, Wei
1
Miller, Paul
1
Sinnott, Richard O.
1
Published in...
All
Digital identity management : perspectives on the technological, business and social implications
1
E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers
1
Managing business risk : a practical guide to protecting your business
1
Source
All
ECONIS (ZBW)
3
Showing
1
-
3
of
3
Sort
Relevance
Date (newest first)
Date (oldest first)
1
The design, development and application of a proxy credential auditing infrastructure for collaborative research
Bayliss, Christopher
;
Sinnott, Richard O.
;
Jie, Wei
; …
- In:
E-technologies: transformation in a connected world : …
,
(pp. 211-226)
.
2011
Persistent link: https://www.econbiz.de/10009012913
Saved in:
2
The role of
access
control
in risk management
Hardy, Keith
- In:
Managing business risk : a practical guide to …
,
(pp. 215-219)
.
2010
Persistent link: https://www.econbiz.de/10003947035
Saved in:
3
Practical action : federation and mobility
Miller, Paul
- In:
Digital identity management : perspectives on the …
,
(pp. 73-88)
.
2007
Persistent link: https://www.econbiz.de/10003614060
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->