//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~type_genre:"Aufsatz im Buch"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Berechtigungskontrolle"
Narrow search
Delete all filters
| 1 applied filter
Year of publication
From:
To:
Subject
All
User access control
42
Zutrittskontrolle
42
Data security
26
Datensicherheit
26
Theorie
10
Theory
10
IT crime
8
IT-Kriminalität
8
Computer network
6
Computernetz
6
Biometrics
5
Biometrie
5
Database
3
Datenbank
3
Deutschland
3
Digitale Dienste
3
E-commerce
3
Electronic Banking
3
Electronic Commerce
3
Electronic banking
3
Germany
3
Großbritannien
3
Internet
3
United Kingdom
3
Web-based service
3
Algorithm
2
Algorithmus
2
Bank
2
Benutzerschnittstelle
2
Computerized method
2
Computerunterstützung
2
Information management
2
Informationsmanagement
2
Mobile Anwendung
2
Mobile Business
2
Mobile application
2
Mobile business
2
Mobile communications
2
Mobilkommunikation
2
Personalisierung
2
more ...
less ...
Online availability
All
Undetermined
4
Type of publication
All
Article
42
Type of publication (narrower categories)
All
Aufsatz im Buch
Article in journal
44
Aufsatz in Zeitschrift
44
Book section
42
Graue Literatur
8
Non-commercial literature
8
Arbeitspapier
7
Working Paper
7
Hochschulschrift
4
Case study
3
Fallstudie
3
Thesis
3
Collection of articles of several authors
2
Sammelwerk
2
Aufsatzsammlung
1
Conference paper
1
Conference proceedings
1
Forschungsbericht
1
Konferenzbeitrag
1
Konferenzschrift
1
more ...
less ...
Language
All
English
36
German
6
Author
All
Stepien, Bernard
2
Adi, Kamel
1
Arshad, Junaid
1
Baldimtsi, F.
1
Bar-Josef, Noa
1
Barz, Christiane
1
Baumgärtner, Frank
1
Bayliss, Christopher
1
Bistarelli, Stefano
1
Bouzida, Yacine
1
Božović, Vladimir
1
Böttcher, Stefan
1
Cai, Hongxia
1
Carullo, Giuliana
1
Chalkias, K.
1
Chandra, Satish
1
Colantonio, Alessandro
1
Debbabi, Mourad
1
Deters, Ralph
1
Dyachuk, Dmytro
1
Ege, Raimund K.
1
Fang, Minglun
1
Felty, Amy
1
Ferrante, Alberto
1
Ferrucci, Filomena
1
Fürst, Franz Thomas
1
Gilbert-Rolfe, Cyrus
1
Gupta, Ruchika
1
Halang, Wolfgang A.
1
Hardy, Keith
1
Hattak, Ikhlass
1
Hristu-Varsakelis, D.
1
JayaMangalam, Vasugi
1
Jie, Wei
1
Johnson, M.Eric
1
Jorga, Frank Stefan
1
Kang, Yin
1
Kedjar, Saadia
1
Kiyomoto, Shinsaku
1
Koblensky, Mingyur
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
10
E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings
3
Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems
3
Digital identity management : perspectives on the technological, business and social implications
2
E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers
2
Information diffusion management and knowledge sharing ; volume 1
2
Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten
2
Wissen - Märkte - Geistiges Eigentum
2
Business analytics and cyber security management in organizations
1
Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz
1
Emerging methods in predictive analytics : risk management and decision-making
1
Enterprise applications and services in the finance industry : 3. international workshop, FinanceCom 2007, Montreal, Canada, December 8, 2007 ; revised papers
1
Ideas, insights and innovation on management research : an international perspective
1
Information resources management ; Vol. 2
1
Information systems and new applications in the service sector : models and methods
1
Innovations in SMEs and conducting e-business : technologies, trends and solutions
1
Internetworked world : 15th Workshop on e-Business, WeB 2016, Dublin, Ireland, December 10, 2016 : revised selected papers
1
Knowledge enterprise: intelligent strategies in product design, manufacturing, and management : proceedings of PROLAMAT 2006, IFIP TC5 international conference, June 15-17 2006, Shanghai, China
1
Managing business risk : a practical guide to protecting your business
1
Mobile and ubiquitous commerce : advanced E-business methods
1
Multi- und Omnichannel-Management in Banken und Sparkassen : Wege in eine erfolgreiche Zukunft
1
Professionelles Sales & Service Management : Vorsprung durch konsequente Kundenorientierung
1
The secure online business handbook : a practical guide to risk management and business continuity
1
Web information systems and technologies : third international conference ; WEBIST 2007, Barcelona, Spain, March 3 - 6, 2007 ; revised selected papers
1
more ...
less ...
Source
All
ECONIS (ZBW)
42
Showing
1
-
42
of
42
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
Access control and information flow control for web services security
Kedjar, Saadia
;
Tari, Abdelkamel
-
2020
Persistent link: https://www.econbiz.de/10012169730
Saved in:
2
Analysis of healthcare workflows in accordance with access control policies
Lakaraju, Sandeep
;
Xu, Dianxiang
;
Wang, Yong
-
2020
Persistent link: https://www.econbiz.de/10012169745
Saved in:
3
Customer perception and behavioral intention to use biometric-enabled e-banking services in India
Varma, Siddharth
;
Gupta, Ruchika
- In:
Business analytics and cyber security management in …
,
(pp. 137-146)
.
2017
Persistent link: https://www.econbiz.de/10011586306
Saved in:
4
Continuous user authentication on touch-screen mobile phones : toward more secure and usable m-commerce
Zhang, Dongsong
;
Kang, Yin
;
Zhou, Lina
;
Lai, Jianwei
- In:
Internetworked world : 15th Workshop on e-Business, WeB …
,
(pp. 225-236)
.
2017
Persistent link: https://www.econbiz.de/10011758993
Saved in:
5
Onlineidentifikation : medienbruchfreies Multikanalmanagement
Fürst, Franz Thomas
;
Jorga, Frank Stefan
- In:
Multi- und Omnichannel-Management in Banken und …
,
(pp. 363-375)
.
2015
Persistent link: https://www.econbiz.de/10011305192
Saved in:
6
Biometric authentication : verifying a user's identity using a frequentist probability model of keystroke intervals
Voloshin, Mikhail
- In:
Emerging methods in predictive analytics : risk …
,
(pp. 254-269)
.
2014
Persistent link: https://www.econbiz.de/10010367399
Saved in:
7
Negotiation of weighted RTML credentials on mobile devices
Bistarelli, Stefano
;
Martinelli, Fabio
;
Roperti, Francesco
- In:
Information systems : crossroads for organization, …
,
(pp. 429-438)
.
2012
Persistent link: https://www.econbiz.de/10009577615
Saved in:
8
Prioritizing role engineering objectives using the analytic hierarchy process
Colantonio, Alessandro
- In:
Information systems : crossroads for organization, …
,
(pp. 419-427)
.
2012
Persistent link: https://www.econbiz.de/10009577617
Saved in:
9
Towards improving usability of authentication systesm using smartphones for logical and physical resource access in a single sign-on environment
Carullo, Giuliana
;
Ferrucci, Filomena
;
Sarro, Federica
- In:
Information systems : crossroads for organization, …
,
(pp. 145-153)
.
2012
Persistent link: https://www.econbiz.de/10009577680
Saved in:
10
Sicherheit für Banken in einer vernetzen Welt
Martini, Ullrich
- In:
Web 2.0 und soziale Netzwerke - Risiko oder …
,
(pp. 413-432)
.
2011
Persistent link: https://www.econbiz.de/10009389939
Saved in:
11
Sicherheitsstrategien für das Online-Angebot von Banken
Kraus, Hans-Peter
- In:
Web 2.0 und soziale Netzwerke - Risiko oder …
,
(pp. 389-412)
.
2011
Persistent link: https://www.econbiz.de/10009389949
Saved in:
12
Semantic mapping for access control model
Zhao, Yi
;
Halang, Wolfgang A.
- In:
Innovations in SMEs and conducting e-business : …
,
(pp. 247-262)
.
2011
Persistent link: https://www.econbiz.de/10009405587
Saved in:
13
The design, development and application of a proxy credential auditing infrastructure for collaborative research
Bayliss, Christopher
;
Sinnott, Richard O.
;
Jie, Wei
; …
- In:
E-technologies: transformation in a connected world : …
,
(pp. 211-226)
.
2011
Persistent link: https://www.econbiz.de/10009012913
Saved in:
14
A systematic approach to web application penetration testing using TTCN-3
Stepien, Bernard
;
Xiong, Pulei
;
Peyton, Liam
- In:
E-technologies: transformation in a connected world : …
,
(pp. 1-16)
.
2011
Persistent link: https://www.econbiz.de/10009012927
Saved in:
15
Access control method with XML databases
Sun, Lili
;
Li, Yan
;
Wang, Hua
- In:
Information systems and new applications in the service …
,
(pp. 227-239)
.
2011
Persistent link: https://www.econbiz.de/10009124082
Saved in:
16
Neue Chancen im Service Management durch Sprachbiometrie
Baumgärtner, Frank
- In:
Professionelles Sales & Service Management : Vorsprung …
,
(pp. 233-258)
.
2010
Persistent link: https://www.econbiz.de/10003973413
Saved in:
17
Trust-based usage control in collaborative environment
Yang, Li
;
Phuong, Chang
;
Novobilski, Andy
;
Ege, Raimund K.
-
2010
Persistent link: https://www.econbiz.de/10003977700
Saved in:
18
The role of access control in risk management
Hardy, Keith
- In:
Managing business risk : a practical guide to …
,
(pp. 215-219)
.
2010
Persistent link: https://www.econbiz.de/10003947035
Saved in:
19
Information security : a study on the impact and its significance on Internet filtering
Radhakrishnan, KalaiVani
;
T., Murugan
;
JayaMangalam, Vasugi
- In:
Ideas, insights and innovation on management research : …
,
(pp. 156-171)
.
2010
Persistent link: https://www.econbiz.de/10009130849
Saved in:
20
Technische Schutzmaßnahmen und "Zugangsrechte"
Riesenhuber, Karl
- In:
Wissen - Märkte - Geistiges Eigentum
,
(pp. 141-185)
.
2010
Persistent link: https://www.econbiz.de/10014564615
Saved in:
21
Vertragliche Dispositionen über Schranken des geistigen Eigentums
Zech, Herbert
- In:
Wissen - Märkte - Geistiges Eigentum
,
(pp. 187-202)
.
2010
Persistent link: https://www.econbiz.de/10014564616
Saved in:
22
Strong authentication for financial services : PTDs as a compromise between security and usability
Me, Gianluigi
;
Pirro, Daniele
;
Sarrecchia, Roberto
- In:
Mobile and ubiquitous commerce : advanced E-business methods
,
(pp. 101-114)
.
2009
Persistent link: https://www.econbiz.de/10003885209
Saved in:
23
A non-technical user-oriented display notation for XACML conditions
Stepien, Bernard
;
Felty, Amy
;
Matwin, Stan
- In:
E-technologies: innovation in an open world : 4th …
,
(pp. 53-64)
.
2009
Persistent link: https://www.econbiz.de/10003844937
Saved in:
24
Typing for conflict detection in access control policies
Adi, Kamel
;
Bouzida, Yacine
;
Hattak, Ikhlass
;
Logrippo, …
- In:
E-technologies: innovation in an open world : 4th …
,
(pp. 212-226)
.
2009
Persistent link: https://www.econbiz.de/10003844971
Saved in:
25
TwoStep: an authentication method combining text and graphical passwords
Oorschot, P. C. van
;
Wan, Tao
- In:
E-technologies: innovation in an open world : 4th …
,
(pp. 233-239)
.
2009
Persistent link: https://www.econbiz.de/10003844975
Saved in:
26
Timing to block scanning malwares by using combinatorics proliferation model
Omote, Kazumasa
;
Shimoyama, Takeshi
;
Torii, Satoru
- In:
E-business and telecommunications : 4th international …
,
(pp. 125-138)
.
2008
Persistent link: https://www.econbiz.de/10003803785
Saved in:
27
Securing biometric templates where similarity is measured with set intersection
Socek, Daniel
;
Božović, Vladimir
;
Ćulibrk, Dubravko
- In:
E-business and telecommunications : 4th international …
,
(pp. 139-151)
.
2008
Persistent link: https://www.econbiz.de/10003803793
Saved in:
28
Remote algorithmic complexity attacks against randomized hash tables
Bar-Josef, Noa
;
Wool, Avishai
- In:
E-business and telecommunications : 4th international …
,
(pp. 162-174)
.
2008
Persistent link: https://www.econbiz.de/10003803877
Saved in:
29
IPSec database query acceleration
Ferrante, Alberto
;
Chandra, Satish
;
Piuri, Vincenzo
- In:
E-business and telecommunications : 4th international …
,
(pp. 188-200)
.
2008
Persistent link: https://www.econbiz.de/10003803886
Saved in:
30
Detection of spoofed MAC adresses in 802.11 wireless networks
Tao, Kai
;
Li, Jing
;
Sampalli, Srinivas
- In:
E-business and telecommunications : 4th international …
,
(pp. 201-213)
.
2008
Persistent link: https://www.econbiz.de/10003803905
Saved in:
31
K2 stream cipher
Kiyomoto, Shinsaku
;
Tanaka, Toshiaki
;
Sakurai, Kouichi
- In:
E-business and telecommunications : 4th international …
,
(pp. 214-226)
.
2008
Persistent link: https://www.econbiz.de/10003803906
Saved in:
32
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
33
Reliable intersection computation within malicious environments
Böttcher, Stefan
;
Obermeier, Sebastian
- In:
E-business and telecommunications : 4th international …
,
(pp. 239-253)
.
2008
Persistent link: https://www.econbiz.de/10003803927
Saved in:
34
A security hardening language based on aspect-orientation
Mourad, Azzam
;
Laverdière, Marc-André
;
Debbabi, Mourad
- In:
E-business and telecommunications : 4th international …
,
(pp. 254-266)
.
2008
Persistent link: https://www.econbiz.de/10003803946
Saved in:
35
Design of a password-based EAP method
Manganaro, Andrea
;
Koblensky, Mingyur
;
Loreti, Michele
- In:
E-business and telecommunications : 4th international …
,
(pp. 343-355)
.
2008
Persistent link: https://www.econbiz.de/10003804268
Saved in:
36
Information risk in financial institutions : field study and research roadmap
Sinclair, Sara
;
Smith, Sean W.
;
Trudeau, Stephanie
; …
- In:
Enterprise applications and services in the finance …
,
(pp. 165-180)
.
2008
Persistent link: https://www.econbiz.de/10003721799
Saved in:
37
Transparent admission control and scheduling of e-commerce web services
Dyachuk, Dmytro
;
Deters, Ralph
- In:
Web information systems and technologies : third …
,
(pp. 124-136)
.
2008
Persistent link: https://www.econbiz.de/10003752150
Saved in:
38
Risk-sensitive decision support for admission control
Barz, Christiane
;
Waldmann, Karl-Heinz
- In:
Business intelligence : methods and applications ; …
,
(pp. 165-174)
.
2007
Persistent link: https://www.econbiz.de/10003764546
Saved in:
39
Radio-frequency identification
Gilbert-Rolfe, Cyrus
- In:
Digital identity management : perspectives on the …
,
(pp. 63-67)
.
2007
Persistent link: https://www.econbiz.de/10003614057
Saved in:
40
Practical action : federation and mobility
Miller, Paul
- In:
Digital identity management : perspectives on the …
,
(pp. 73-88)
.
2007
Persistent link: https://www.econbiz.de/10003614060
Saved in:
41
Firewalls and viruses
Rogers, Mark
- In:
The secure online business handbook : a practical guide …
,
(pp. 83-90)
.
2006
Persistent link: https://www.econbiz.de/10003641325
Saved in:
42
Access control model of Manufacturing Grid
Cai, Hongxia
;
Yu, Ta
;
Fang, Minglun
- In:
Knowledge enterprise: intelligent strategies in product …
,
(pp. 938-943)
.
2006
Persistent link: https://www.econbiz.de/10003408477
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->