//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~subject:"Betriebliches Informationssystem"
~subject:"Database"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Elektronische Zutrittskontrolle"
Narrow search
Delete all filters
| 2 applied filters
Year of publication
From:
To:
Subject
All
Betriebliches Informationssystem
Database
User access control
109
Zutrittskontrolle
109
Data security
54
Datensicherheit
54
IT crime
22
IT-Kriminalität
22
Theorie
16
Theory
16
Biometrics
15
Biometrie
15
Data protection
12
Datenschutz
12
USA
9
United States
9
Computer network
8
Computernetz
8
E-commerce
8
Electronic Commerce
8
Deutschland
7
Electronic Banking
7
Electronic banking
7
Germany
7
Internet
7
Information management
6
Informationsmanagement
6
Authentifikation
5
Social costs
5
Soziale Kosten
5
Business intelligence system
4
Datenbank
4
Digitale Dienste
4
Economics of crime
4
Innovation adoption
4
Innovationsakzeptanz
4
Kriminalitätsökonomik
4
Web-based service
4
Airport
3
Alcohol consumption
3
more ...
less ...
Type of publication
All
Article
8
Book / Working Paper
1
Type of publication (narrower categories)
All
Article in journal
4
Aufsatz im Buch
4
Aufsatz in Zeitschrift
4
Book section
4
Hochschulschrift
1
Thesis
1
Language
All
English
6
German
3
Author
All
Li, Yan
2
Sun, Lili
2
Böttcher, Stefan
1
Chandra, Satish
1
Esswein, Werner
1
Ferrante, Alberto
1
Füller, Marlon
1
Juhrisch, Martin
1
Obermeier, Sebastian
1
Omote, Kazumasa
1
Padayachee, Keshnee
1
Piuri, Vincenzo
1
Shimoyama, Takeshi
1
Sowa, Aleksandra
1
Torii, Satoru
1
Wakaba, Ntobeko
1
Wang, Hua
1
Weller, Jens
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
3
Berichte aus der Wirtschaftsinformatik
1
ERP-Management : Auswahl, Einführung und Betrieb von ERP-Systemen
1
HMD : Praxis der Wirtschaftsinformatik
1
Information systems and new applications in the service sector : models and methods
1
International journal of information systems in the service sector : IJISSS ; an official publication of the Information Resources Management Association
1
Review of business information systems
1
more ...
less ...
Source
All
ECONIS (ZBW)
9
Showing
1
-
9
of
9
Sort
Relevance
Date (newest first)
Date (oldest first)
1
Methodenunterstützte Berechtigungsvergabe : Neugestaltung und Anpassung bestehender Berechtigungskonzepte auf Basis realer Anforderungen
Füller, Marlon
-
2013
-
1., Aufl
Persistent link: https://www.econbiz.de/10009722033
Saved in:
2
Access control method with XML databases
Sun, Lili
;
Li, Yan
;
Wang, Hua
- In:
Information systems and new applications in the service …
,
(pp. 227-239)
.
2011
Persistent link: https://www.econbiz.de/10009124082
Saved in:
3
Using usage control to access XML databases
Sun, Lili
;
Li, Yan
- In:
International journal of information systems in the …
1
(
2009
)
3
,
pp. 32-44
Persistent link: https://www.econbiz.de/10003872441
Saved in:
4
Modellgestützte Konfiguration von Identitätsmanagementsystemen
Juhrisch, Martin
;
Esswein, Werner
;
Weller, Jens
- In:
ERP-Management : Auswahl, Einführung und Betrieb von …
4
(
2008
)
4
,
pp. 20-23
Persistent link: https://www.econbiz.de/10003786358
Saved in:
5
Timing to block scanning malwares by using combinatorics proliferation model
Omote, Kazumasa
;
Shimoyama, Takeshi
;
Torii, Satoru
- In:
E-business and telecommunications : 4th international …
,
(pp. 125-138)
.
2008
Persistent link: https://www.econbiz.de/10003803785
Saved in:
6
IPSec database query acceleration
Ferrante, Alberto
;
Chandra, Satish
;
Piuri, Vincenzo
- In:
E-business and telecommunications : 4th international …
,
(pp. 188-200)
.
2008
Persistent link: https://www.econbiz.de/10003803886
Saved in:
7
Reliable intersection computation within malicious environments
Böttcher, Stefan
;
Obermeier, Sebastian
- In:
E-business and telecommunications : 4th international …
,
(pp. 239-253)
.
2008
Persistent link: https://www.econbiz.de/10003803927
Saved in:
8
A taxonomy of aspect-oriented security
Padayachee, Keshnee
;
Wakaba, Ntobeko
- In:
Review of business information systems
12
(
2008
)
1
,
pp. 89-102
Persistent link: https://www.econbiz.de/10003768174
Saved in:
9
IT-Sicherheit durch Zugriffs- und Zugangskontrollen
Sowa, Aleksandra
- In:
HMD : Praxis der Wirtschaftsinformatik
45
(
2008
)
263
,
pp. 78-88
Persistent link: https://www.econbiz.de/10003763068
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->