//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
type_genre:"Aufsatz im Buch"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Berechtigungskontrolle"
Narrow search
Delete all filters
| 1 applied filter
Year of publication
From:
To:
Subject
All
User access control
42
Zutrittskontrolle
42
Data security
26
Datensicherheit
26
Theorie
10
Theory
10
IT crime
8
IT-Kriminalität
8
Computer network
6
Computernetz
6
Biometrics
5
Biometrie
5
Database
3
Datenbank
3
Deutschland
3
Digitale Dienste
3
E-commerce
3
Electronic Banking
3
Electronic Commerce
3
Electronic banking
3
Germany
3
Großbritannien
3
Internet
3
United Kingdom
3
Web-based service
3
Algorithm
2
Algorithmus
2
Bank
2
Benutzerschnittstelle
2
Computerized method
2
Computerunterstützung
2
Information management
2
Informationsmanagement
2
Mobile Anwendung
2
Mobile Business
2
Mobile application
2
Mobile business
2
Mobile communications
2
Mobilkommunikation
2
Personalisierung
2
more ...
less ...
Online availability
All
Undetermined
4
Type of publication
All
Article
42
Type of publication (narrower categories)
All
Aufsatz im Buch
Article in journal
44
Aufsatz in Zeitschrift
44
Book section
42
Graue Literatur
8
Non-commercial literature
8
Arbeitspapier
7
Working Paper
7
Hochschulschrift
4
Case study
3
Fallstudie
3
Thesis
3
Collection of articles of several authors
2
Sammelwerk
2
Aufsatzsammlung
1
Conference paper
1
Conference proceedings
1
Forschungsbericht
1
Konferenzbeitrag
1
Konferenzschrift
1
more ...
less ...
Language
All
English
36
German
6
Author
All
Stepien, Bernard
2
Adi, Kamel
1
Arshad, Junaid
1
Baldimtsi, F.
1
Bar-Josef, Noa
1
Barz, Christiane
1
Baumgärtner, Frank
1
Bayliss, Christopher
1
Bistarelli, Stefano
1
Bouzida, Yacine
1
Božović, Vladimir
1
Böttcher, Stefan
1
Cai, Hongxia
1
Carullo, Giuliana
1
Chalkias, K.
1
Chandra, Satish
1
Colantonio, Alessandro
1
Debbabi, Mourad
1
Deters, Ralph
1
Dyachuk, Dmytro
1
Ege, Raimund K.
1
Fang, Minglun
1
Felty, Amy
1
Ferrante, Alberto
1
Ferrucci, Filomena
1
Fürst, Franz Thomas
1
Gilbert-Rolfe, Cyrus
1
Gupta, Ruchika
1
Halang, Wolfgang A.
1
Hardy, Keith
1
Hattak, Ikhlass
1
Hristu-Varsakelis, D.
1
JayaMangalam, Vasugi
1
Jie, Wei
1
Johnson, M.Eric
1
Jorga, Frank Stefan
1
Kang, Yin
1
Kedjar, Saadia
1
Kiyomoto, Shinsaku
1
Koblensky, Mingyur
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
10
E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings
3
Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems
3
Digital identity management : perspectives on the technological, business and social implications
2
E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers
2
Information diffusion management and knowledge sharing ; volume 1
2
Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten
2
Wissen - Märkte - Geistiges Eigentum
2
Business analytics and cyber security management in organizations
1
Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz
1
Emerging methods in predictive analytics : risk management and decision-making
1
Enterprise applications and services in the finance industry : 3. international workshop, FinanceCom 2007, Montreal, Canada, December 8, 2007 ; revised papers
1
Ideas, insights and innovation on management research : an international perspective
1
Information resources management ; Vol. 2
1
Information systems and new applications in the service sector : models and methods
1
Innovations in SMEs and conducting e-business : technologies, trends and solutions
1
Internetworked world : 15th Workshop on e-Business, WeB 2016, Dublin, Ireland, December 10, 2016 : revised selected papers
1
Knowledge enterprise: intelligent strategies in product design, manufacturing, and management : proceedings of PROLAMAT 2006, IFIP TC5 international conference, June 15-17 2006, Shanghai, China
1
Managing business risk : a practical guide to protecting your business
1
Mobile and ubiquitous commerce : advanced E-business methods
1
Multi- und Omnichannel-Management in Banken und Sparkassen : Wege in eine erfolgreiche Zukunft
1
Professionelles Sales & Service Management : Vorsprung durch konsequente Kundenorientierung
1
The secure online business handbook : a practical guide to risk management and business continuity
1
Web information systems and technologies : third international conference ; WEBIST 2007, Barcelona, Spain, March 3 - 6, 2007 ; revised selected papers
1
more ...
less ...
Source
All
ECONIS (ZBW)
42
Showing
1
-
42
of
42
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
Access control and information flow control for web services security
Kedjar, Saadia
;
Tari, Abdelkamel
-
2020
Persistent link: https://www.econbiz.de/10012169730
Saved in:
2
Analysis of healthcare workflows in accordance with access control policies
Lakaraju, Sandeep
;
Xu, Dianxiang
;
Wang, Yong
-
2020
Persistent link: https://www.econbiz.de/10012169745
Saved in:
3
Customer perception and behavioral intention to use biometric-enabled e-banking services in India
Varma, Siddharth
;
Gupta, Ruchika
- In:
Business analytics and cyber security management in …
,
(pp. 137-146)
.
2017
Persistent link: https://www.econbiz.de/10011586306
Saved in:
4
Continuous user authentication on touch-screen mobile phones : toward more secure and usable m-commerce
Zhang, Dongsong
;
Kang, Yin
;
Zhou, Lina
;
Lai, Jianwei
- In:
Internetworked world : 15th Workshop on e-Business, WeB …
,
(pp. 225-236)
.
2017
Persistent link: https://www.econbiz.de/10011758993
Saved in:
5
Onlineidentifikation : medienbruchfreies Multikanalmanagement
Fürst, Franz Thomas
;
Jorga, Frank Stefan
- In:
Multi- und Omnichannel-Management in Banken und …
,
(pp. 363-375)
.
2015
Persistent link: https://www.econbiz.de/10011305192
Saved in:
6
Biometric authentication : verifying a user's identity using a frequentist probability model of keystroke intervals
Voloshin, Mikhail
- In:
Emerging methods in predictive analytics : risk …
,
(pp. 254-269)
.
2014
Persistent link: https://www.econbiz.de/10010367399
Saved in:
7
Negotiation of weighted RTML credentials on mobile devices
Bistarelli, Stefano
;
Martinelli, Fabio
;
Roperti, Francesco
- In:
Information systems : crossroads for organization, …
,
(pp. 429-438)
.
2012
Persistent link: https://www.econbiz.de/10009577615
Saved in:
8
Prioritizing role engineering objectives using the analytic hierarchy process
Colantonio, Alessandro
- In:
Information systems : crossroads for organization, …
,
(pp. 419-427)
.
2012
Persistent link: https://www.econbiz.de/10009577617
Saved in:
9
Towards improving usability of authentication systesm using smartphones for logical and physical resource access in a single sign-on environment
Carullo, Giuliana
;
Ferrucci, Filomena
;
Sarro, Federica
- In:
Information systems : crossroads for organization, …
,
(pp. 145-153)
.
2012
Persistent link: https://www.econbiz.de/10009577680
Saved in:
10
Sicherheit für Banken in einer vernetzen Welt
Martini, Ullrich
- In:
Web 2.0 und soziale Netzwerke - Risiko oder …
,
(pp. 413-432)
.
2011
Persistent link: https://www.econbiz.de/10009389939
Saved in:
11
Sicherheitsstrategien für das Online-Angebot von Banken
Kraus, Hans-Peter
- In:
Web 2.0 und soziale Netzwerke - Risiko oder …
,
(pp. 389-412)
.
2011
Persistent link: https://www.econbiz.de/10009389949
Saved in:
12
Semantic mapping for access control model
Zhao, Yi
;
Halang, Wolfgang A.
- In:
Innovations in SMEs and conducting e-business : …
,
(pp. 247-262)
.
2011
Persistent link: https://www.econbiz.de/10009405587
Saved in:
13
The design, development and application of a proxy credential auditing infrastructure for collaborative research
Bayliss, Christopher
;
Sinnott, Richard O.
;
Jie, Wei
; …
- In:
E-technologies: transformation in a connected world : …
,
(pp. 211-226)
.
2011
Persistent link: https://www.econbiz.de/10009012913
Saved in:
14
A systematic approach to web application penetration testing using TTCN-3
Stepien, Bernard
;
Xiong, Pulei
;
Peyton, Liam
- In:
E-technologies: transformation in a connected world : …
,
(pp. 1-16)
.
2011
Persistent link: https://www.econbiz.de/10009012927
Saved in:
15
Access control method with XML databases
Sun, Lili
;
Li, Yan
;
Wang, Hua
- In:
Information systems and new applications in the service …
,
(pp. 227-239)
.
2011
Persistent link: https://www.econbiz.de/10009124082
Saved in:
16
Neue Chancen im Service Management durch Sprachbiometrie
Baumgärtner, Frank
- In:
Professionelles Sales & Service Management : Vorsprung …
,
(pp. 233-258)
.
2010
Persistent link: https://www.econbiz.de/10003973413
Saved in:
17
Trust-based usage control in collaborative environment
Yang, Li
;
Phuong, Chang
;
Novobilski, Andy
;
Ege, Raimund K.
-
2010
Persistent link: https://www.econbiz.de/10003977700
Saved in:
18
The role of access control in risk management
Hardy, Keith
- In:
Managing business risk : a practical guide to …
,
(pp. 215-219)
.
2010
Persistent link: https://www.econbiz.de/10003947035
Saved in:
19
Information security : a study on the impact and its significance on Internet filtering
Radhakrishnan, KalaiVani
;
T., Murugan
;
JayaMangalam, Vasugi
- In:
Ideas, insights and innovation on management research : …
,
(pp. 156-171)
.
2010
Persistent link: https://www.econbiz.de/10009130849
Saved in:
20
Technische Schutzmaßnahmen und "Zugangsrechte"
Riesenhuber, Karl
- In:
Wissen - Märkte - Geistiges Eigentum
,
(pp. 141-185)
.
2010
Persistent link: https://www.econbiz.de/10014564615
Saved in:
21
Vertragliche Dispositionen über Schranken des geistigen Eigentums
Zech, Herbert
- In:
Wissen - Märkte - Geistiges Eigentum
,
(pp. 187-202)
.
2010
Persistent link: https://www.econbiz.de/10014564616
Saved in:
22
Strong authentication for financial services : PTDs as a compromise between security and usability
Me, Gianluigi
;
Pirro, Daniele
;
Sarrecchia, Roberto
- In:
Mobile and ubiquitous commerce : advanced E-business methods
,
(pp. 101-114)
.
2009
Persistent link: https://www.econbiz.de/10003885209
Saved in:
23
A non-technical user-oriented display notation for XACML conditions
Stepien, Bernard
;
Felty, Amy
;
Matwin, Stan
- In:
E-technologies: innovation in an open world : 4th …
,
(pp. 53-64)
.
2009
Persistent link: https://www.econbiz.de/10003844937
Saved in:
24
Typing for conflict detection in access control policies
Adi, Kamel
;
Bouzida, Yacine
;
Hattak, Ikhlass
;
Logrippo, …
- In:
E-technologies: innovation in an open world : 4th …
,
(pp. 212-226)
.
2009
Persistent link: https://www.econbiz.de/10003844971
Saved in:
25
TwoStep: an authentication method combining text and graphical passwords
Oorschot, P. C. van
;
Wan, Tao
- In:
E-technologies: innovation in an open world : 4th …
,
(pp. 233-239)
.
2009
Persistent link: https://www.econbiz.de/10003844975
Saved in:
26
Timing to block scanning malwares by using combinatorics proliferation model
Omote, Kazumasa
;
Shimoyama, Takeshi
;
Torii, Satoru
- In:
E-business and telecommunications : 4th international …
,
(pp. 125-138)
.
2008
Persistent link: https://www.econbiz.de/10003803785
Saved in:
27
Securing biometric templates where similarity is measured with set intersection
Socek, Daniel
;
Božović, Vladimir
;
Ćulibrk, Dubravko
- In:
E-business and telecommunications : 4th international …
,
(pp. 139-151)
.
2008
Persistent link: https://www.econbiz.de/10003803793
Saved in:
28
Remote algorithmic complexity attacks against randomized hash tables
Bar-Josef, Noa
;
Wool, Avishai
- In:
E-business and telecommunications : 4th international …
,
(pp. 162-174)
.
2008
Persistent link: https://www.econbiz.de/10003803877
Saved in:
29
IPSec database query acceleration
Ferrante, Alberto
;
Chandra, Satish
;
Piuri, Vincenzo
- In:
E-business and telecommunications : 4th international …
,
(pp. 188-200)
.
2008
Persistent link: https://www.econbiz.de/10003803886
Saved in:
30
Detection of spoofed MAC adresses in 802.11 wireless networks
Tao, Kai
;
Li, Jing
;
Sampalli, Srinivas
- In:
E-business and telecommunications : 4th international …
,
(pp. 201-213)
.
2008
Persistent link: https://www.econbiz.de/10003803905
Saved in:
31
K2 stream cipher
Kiyomoto, Shinsaku
;
Tanaka, Toshiaki
;
Sakurai, Kouichi
- In:
E-business and telecommunications : 4th international …
,
(pp. 214-226)
.
2008
Persistent link: https://www.econbiz.de/10003803906
Saved in:
32
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
33
Reliable intersection computation within malicious environments
Böttcher, Stefan
;
Obermeier, Sebastian
- In:
E-business and telecommunications : 4th international …
,
(pp. 239-253)
.
2008
Persistent link: https://www.econbiz.de/10003803927
Saved in:
34
A security hardening language based on aspect-orientation
Mourad, Azzam
;
Laverdière, Marc-André
;
Debbabi, Mourad
- In:
E-business and telecommunications : 4th international …
,
(pp. 254-266)
.
2008
Persistent link: https://www.econbiz.de/10003803946
Saved in:
35
Design of a password-based EAP method
Manganaro, Andrea
;
Koblensky, Mingyur
;
Loreti, Michele
- In:
E-business and telecommunications : 4th international …
,
(pp. 343-355)
.
2008
Persistent link: https://www.econbiz.de/10003804268
Saved in:
36
Information risk in financial institutions : field study and research roadmap
Sinclair, Sara
;
Smith, Sean W.
;
Trudeau, Stephanie
; …
- In:
Enterprise applications and services in the finance …
,
(pp. 165-180)
.
2008
Persistent link: https://www.econbiz.de/10003721799
Saved in:
37
Transparent admission control and scheduling of e-commerce web services
Dyachuk, Dmytro
;
Deters, Ralph
- In:
Web information systems and technologies : third …
,
(pp. 124-136)
.
2008
Persistent link: https://www.econbiz.de/10003752150
Saved in:
38
Risk-sensitive decision support for admission control
Barz, Christiane
;
Waldmann, Karl-Heinz
- In:
Business intelligence : methods and applications ; …
,
(pp. 165-174)
.
2007
Persistent link: https://www.econbiz.de/10003764546
Saved in:
39
Radio-frequency identification
Gilbert-Rolfe, Cyrus
- In:
Digital identity management : perspectives on the …
,
(pp. 63-67)
.
2007
Persistent link: https://www.econbiz.de/10003614057
Saved in:
40
Practical action : federation and mobility
Miller, Paul
- In:
Digital identity management : perspectives on the …
,
(pp. 73-88)
.
2007
Persistent link: https://www.econbiz.de/10003614060
Saved in:
41
Firewalls and viruses
Rogers, Mark
- In:
The secure online business handbook : a practical guide …
,
(pp. 83-90)
.
2006
Persistent link: https://www.econbiz.de/10003641325
Saved in:
42
Access control model of Manufacturing Grid
Cai, Hongxia
;
Yu, Ta
;
Fang, Minglun
- In:
Knowledge enterprise: intelligent strategies in product …
,
(pp. 938-943)
.
2006
Persistent link: https://www.econbiz.de/10003408477
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->