//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
subject:"Computernetz"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Berechtigungskontrolle"
Narrow search
Delete all filters
| 1 applied filter
Year of publication
From:
To:
Subject
All
Computernetz
User access control
109
Zutrittskontrolle
109
Data security
54
Datensicherheit
54
IT crime
22
IT-Kriminalität
22
Theorie
16
Theory
16
Biometrics
15
Biometrie
15
Data protection
12
Datenschutz
12
USA
9
United States
9
Computer network
8
E-commerce
8
Electronic Commerce
8
Deutschland
7
Electronic Banking
7
Electronic banking
7
Germany
7
Internet
7
Information management
6
Informationsmanagement
6
Authentifikation
5
Betriebliches Informationssystem
5
Social costs
5
Soziale Kosten
5
Business intelligence system
4
Database
4
Datenbank
4
Digitale Dienste
4
Economics of crime
4
Innovation adoption
4
Innovationsakzeptanz
4
Kriminalitätsökonomik
4
Web-based service
4
Airport
3
Alcohol consumption
3
more ...
less ...
Type of publication
All
Article
6
Book / Working Paper
2
Type of publication (narrower categories)
All
Aufsatz im Buch
6
Book section
6
Collection of articles of several authors
2
Sammelwerk
2
Aufsatzsammlung
1
Case study
1
Conference proceedings
1
Fallstudie
1
Konferenzschrift
1
more ...
less ...
Language
All
English
8
Author
All
Arshad, Junaid
1
Baldimtsi, F.
1
Bayliss, Christopher
1
Birch, David G. W.
1
Cai, Hongxia
1
Chalkias, K.
1
Debbabi, Mourad
1
Fang, Minglun
1
Felty, Amy
1
Filipe, Joaquim
1
Hristu-Varsakelis, D.
1
Jie, Wei
1
Koblensky, Mingyur
1
Laverdière, Marc-André
1
Loreti, Michele
1
Manganaro, Andrea
1
Matwin, Stan
1
Mourad, Azzam
1
Sinnott, Richard O.
1
Stephanides, G.
1
Stepien, Bernard
1
Yu, Ta
1
more ...
less ...
Institution
All
ICETE <4, 2007, Barcelona>
1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
3
Communications in computer and information science
1
E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings
1
E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers
1
Knowledge enterprise: intelligent strategies in product design, manufacturing, and management : proceedings of PROLAMAT 2006, IFIP TC5 international conference, June 15-17 2006, Shanghai, China
1
Source
All
ECONIS (ZBW)
8
Showing
1
-
8
of
8
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
The design, development and application of a proxy credential auditing infrastructure for collaborative research
Bayliss, Christopher
;
Sinnott, Richard O.
;
Jie, Wei
; …
- In:
E-technologies: transformation in a connected world : …
,
(pp. 211-226)
.
2011
Persistent link: https://www.econbiz.de/10009012913
Saved in:
2
A non-technical user-oriented display notation for XACML conditions
Stepien, Bernard
;
Felty, Amy
;
Matwin, Stan
- In:
E-technologies: innovation in an open world : 4th …
,
(pp. 53-64)
.
2009
Persistent link: https://www.econbiz.de/10003844937
Saved in:
3
E-business and telecommunications : 4th international conference ; revised selected papers
Filipe, Joaquim
(
ed.
)
-
2008
Persistent link: https://www.econbiz.de/10003789227
Saved in:
4
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
5
A security hardening language based on aspect-orientation
Mourad, Azzam
;
Laverdière, Marc-André
;
Debbabi, Mourad
- In:
E-business and telecommunications : 4th international …
,
(pp. 254-266)
.
2008
Persistent link: https://www.econbiz.de/10003803946
Saved in:
6
Design of a password-based EAP method
Manganaro, Andrea
;
Koblensky, Mingyur
;
Loreti, Michele
- In:
E-business and telecommunications : 4th international …
,
(pp. 343-355)
.
2008
Persistent link: https://www.econbiz.de/10003804268
Saved in:
7
Digital identity management : perspectives on the technological, business and social implications
Birch, David G. W.
(
ed.
)
-
2007
Persistent link: https://www.econbiz.de/10003355602
Saved in:
8
Access control model of Manufacturing Grid
Cai, Hongxia
;
Yu, Ta
;
Fang, Minglun
- In:
Knowledge enterprise: intelligent strategies in product …
,
(pp. 938-943)
.
2006
Persistent link: https://www.econbiz.de/10003408477
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->