//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~subject:"Computernetz"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Zugriffskontrolle"
Narrow search
Delete all filters
| 1 applied filter
Year of publication
From:
To:
Subject
All
Computernetz
User access control
109
Zutrittskontrolle
109
Data security
57
Datensicherheit
57
IT crime
22
IT-Kriminalität
22
Zugriffskontrolle
20
Theorie
18
Theory
18
Biometrics
15
Biometrie
15
Datenschutz
15
Data protection
12
Betriebliches Informationssystem
10
USA
9
United States
9
Computer network
8
E-commerce
8
Electronic Commerce
8
Deutschland
7
Electronic Banking
7
Electronic banking
7
Germany
7
Identitätsverwaltung
7
Information management
7
Informationsmanagement
7
Internet
7
Datensicherung
6
Authentifikation
5
Business intelligence system
5
Computersicherheit
5
Database
5
Social costs
5
Soziale Kosten
5
Airport
4
Datenbank
4
Digitale Dienste
4
Economics of crime
4
Flughafen
4
more ...
less ...
Type of publication
All
Article
6
Book / Working Paper
2
Type of publication (narrower categories)
All
Aufsatz im Buch
6
Book section
6
Collection of articles of several authors
2
Sammelwerk
2
Aufsatzsammlung
1
Case study
1
Conference proceedings
1
Fallstudie
1
Konferenzschrift
1
more ...
less ...
Language
All
English
8
Author
All
Arshad, Junaid
1
Baldimtsi, F.
1
Bayliss, Christopher
1
Birch, David G. W.
1
Cai, Hongxia
1
Chalkias, K.
1
Debbabi, Mourad
1
Fang, Minglun
1
Felty, Amy
1
Filipe, Joaquim
1
Hristu-Varsakelis, D.
1
Jie, Wei
1
Koblensky, Mingyur
1
Laverdière, Marc-André
1
Loreti, Michele
1
Manganaro, Andrea
1
Matwin, Stan
1
Mourad, Azzam
1
Sinnott, Richard O.
1
Stephanides, G.
1
Stepien, Bernard
1
Yu, Ta
1
more ...
less ...
Institution
All
ICETE <4, 2007, Barcelona>
1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
3
Communications in computer and information science
1
E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings
1
E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers
1
Knowledge enterprise: intelligent strategies in product design, manufacturing, and management : proceedings of PROLAMAT 2006, IFIP TC5 international conference, June 15-17 2006, Shanghai, China
1
Source
All
ECONIS (ZBW)
8
Showing
1
-
8
of
8
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
The design, development and application of a proxy credential auditing infrastructure for collaborative research
Bayliss, Christopher
;
Sinnott, Richard O.
;
Jie, Wei
; …
- In:
E-technologies: transformation in a connected world : …
,
(pp. 211-226)
.
2011
Persistent link: https://www.econbiz.de/10009012913
Saved in:
2
A non-technical user-oriented display notation for XACML conditions
Stepien, Bernard
;
Felty, Amy
;
Matwin, Stan
- In:
E-technologies: innovation in an open world : 4th …
,
(pp. 53-64)
.
2009
Persistent link: https://www.econbiz.de/10003844937
Saved in:
3
E-business and telecommunications : 4th international conference ; revised selected papers
Filipe, Joaquim
(
ed.
)
-
2008
Persistent link: https://www.econbiz.de/10003789227
Saved in:
4
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
5
A security hardening language based on aspect-orientation
Mourad, Azzam
;
Laverdière, Marc-André
;
Debbabi, Mourad
- In:
E-business and telecommunications : 4th international …
,
(pp. 254-266)
.
2008
Persistent link: https://www.econbiz.de/10003803946
Saved in:
6
Design of a password-based EAP method
Manganaro, Andrea
;
Koblensky, Mingyur
;
Loreti, Michele
- In:
E-business and telecommunications : 4th international …
,
(pp. 343-355)
.
2008
Persistent link: https://www.econbiz.de/10003804268
Saved in:
7
Digital identity management : perspectives on the technological, business and social implications
Birch, David G. W.
(
ed.
)
-
2007
Persistent link: https://www.econbiz.de/10003355602
Saved in:
8
Access control model of Manufacturing Grid
Cai, Hongxia
;
Yu, Ta
;
Fang, Minglun
- In:
Knowledge enterprise: intelligent strategies in product …
,
(pp. 938-943)
.
2006
Persistent link: https://www.econbiz.de/10003408477
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->