EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Access control"
Narrow search

Narrow search

Year of publication
Subject
All
User access control 114 Zutrittskontrolle 114 Data security 64 Datensicherheit 64 Access control 28 Theorie 20 Theory 20 Datenschutz 19 IT crime 18 IT-Kriminalität 18 Zugriffskontrolle 18 Data protection 17 Access Control 14 Biometrics 14 Biometrie 13 Betriebliches Informationssystem 11 Information management 11 Informationsmanagement 11 Internet 11 United States 10 access control 10 Computer network 9 Computernetz 9 Security 9 USA 9 E-commerce 8 Electronic Commerce 8 Cloud Computing 7 Deutschland 7 Germany 7 Identitätsverwaltung 7 Business intelligence system 6 Computer security 6 Datensicherung 6 Electronic Banking 6 Electronic banking 6 Privacy 6 RBAC 6 RFID 6 Algorithm 5
more ... less ...
Online availability
All
Undetermined 43 Free 24
Type of publication
All
Article 126 Book / Working Paper 44 Other 6
Type of publication (narrower categories)
All
Article in journal 56 Aufsatz in Zeitschrift 56 Aufsatz im Buch 43 Book section 43 Graue Literatur 9 Non-commercial literature 9 Hochschulschrift 8 Thesis 8 research-article 8 Arbeitspapier 7 Working Paper 7 Case study 3 Collection of articles of several authors 3 Congress Report 3 Fallstudie 3 Sammelwerk 3 Aufsatzsammlung 2 Dissertation u.a. Prüfungsschriften 2 Forschungsbericht 2 Bibliographie 1 Conference paper 1 Conference proceedings 1 Konferenzbeitrag 1 Konferenzschrift 1 Lehrbuch 1 case-report 1 conceptual-paper 1 review-article 1
more ... less ...
Language
All
English 137 German 26 Undetermined 13
Author
All
Bertino, Elisa 6 Bellou, Andriana 3 Gaudin, Germain 3 Hatzinakos, Dimitrios 3 Mohammadian, Masoud 3 Roberds, William 3 Wang, Hua 3 White, Alexander 3 Bagchi, Aditya 2 Bhatt, Rachana 2 Dawson, Edward 2 Eckert, Claudia 2 Fuchs, Ludwig 2 Kedjar, Saadia 2 Li, Ninghui 2 Li, Yan 2 Lin, Dan 2 Mazumdar, Chandan 2 Mookerjee, Vijay S. 2 Pal, Pinakpani 2 Rao, Prathima 2 Royer, Denis 2 Schreft, Stacey L. 2 Sowa, Aleksandra 2 Stepien, Bernard 2 Sun, Lili 2 Tari, Abdelkamel 2 Aali, Nawal Ait 1 Abbasi, Hasan 1 Abdullah, Matin Saad 1 Abrishami, Saied 1 Adi, Kamel 1 Adl, Rosa Karimi 1 Ahmed, Waseem 1 Ajam, Nabil 1 Akar, Gulsah 1 Al-Harby, Fahad 1 Alfaro, Luis Alfredo 1 Amine, Abdelmalek 1 Ansari, Zahid A. 1
more ... less ...
Institution
All
ICETE <4, 2007, Barcelona> 1 Organisation for Economic Co-operation and Development 1 Verlag Dr. Kovač 1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers 10 Information & Computer Security 4 E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings 3 HMD : Praxis der Wirtschaftsinformatik 3 Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems 3 Journal of organizational computing and electronic commerce 3 Berichte aus der Wirtschaftsinformatik 2 Decision support systems : DSS ; the international journal 2 Digital identity management : perspectives on the technological, business and social implications 2 Discussion paper series / IZA 2 Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste 2 E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers 2 Information diffusion management and knowledge sharing ; volume 1 2 International Journal of Electronic Finance 2 International Journal of Information Security and Privacy (IJISP) 2 International journal of business information systems : IJBIS 2 International journal of networking and virtual organisations : IJNVO 2 Journal of air transport management 2 Journal of internet commerce 2 Journal of payments strategy & systems 2 Managerial Auditing Journal 2 SpringerLink / Bücher 2 Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten 2 Wissen - Märkte - Geistiges Eigentum 2 Advances in multimedia and interactive technologies 1 American economic journal 1 Banking and information technology : BIT ; a strategic report for top management 1 Business & Information Systems Engineering 1 Business analytics and cyber security management in organizations 1 Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz 1 Communications in computer and information science 1 Contemporary economic policy : a journal of Western Economic Association International 1 De Gruyter Oldenbourg Studium 1 Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research 1 ERP-Management : Auswahl, Einführung und Betrieb von ERP-Systemen 1 Edition <kes> 1 Electronic markets : the international journal on networked business 1 Emerging methods in predictive analytics : risk management and decision-making 1 Enterprise applications and services in the finance industry : 3. international workshop, FinanceCom 2007, Montreal, Canada, December 8, 2007 ; revised papers 1 European economic review : EER 1
more ... less ...
Source
All
ECONIS (ZBW) 131 Other ZBW resources 20 BASE 11 USB Cologne (EcoSocSci) 10 RePEc 4
Showing 1 - 50 of 176
Cover Image
Digitale Identitäten als Fundament des Web 3.0
Puhl, Pirmin; Roloff, Malte; Märkel, Christian; … - 2023
Die Evolution des World Wide Web führt zu einem verstärkten Wunsch nach und Bedarf an dezentralen, selbstverwalteten Digitalen Identitäten, auch als Self-Sovereign Identities (SSI) bekannt. Im Gegensatz zu gegenwärtig verbreiteten zentralisierten und föderierten Digitalen Identitäten...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014441893
Saved in:
Cover Image
Research on secure storage data access control of smart TV based on blockchain
Qiu, Jianxin - In: International journal of product development : IJPD 27 (2023) 4, pp. 384-396
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015065221
Saved in:
Cover Image
Cybersecurity : Technology and Governance
Jøsang, Audun - 2025
Chapter 1 Basic concepts of cybersecurity -- Chapter 2 Attack vectors and malware -- Chapter 3 System security -- Chapter 4 Cryptography -- Chapter 5 Key management and PKI -- Chapter 6 Network security -- Chapter 7 Wireless Security -- Chapter 8 User authentication -- Chapter 9 IAM – Identity...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015135607
Saved in:
Cover Image
Access control system for RFID-tagged documents in supply chain management
Nowicki, Tadeusz; Kiedrowicz, Maciej; Waszkowski, Robert; … - In: LogForum : elektroniczne czasopismo naukowe z dziedziny … 13 (2017) 1, pp. 91-101
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011808610
Saved in:
Cover Image
Analysis of security and privacy issues of information management of big data in B2B based healthcare systems
Gupta, Brij; Gaurav, Akshat; Panigrahi, Prabin Kumar - In: Journal of business research : JBR 162 (2023), pp. 1-15
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014299359
Saved in:
Cover Image
Vertical Agreements and User Access
Gaudin, Germain; White, Alexander - 2020
Platforms acting as sales channels for producers often charge users for access, via a subscription fee or a markup on hardware. We compare two common forms of vertical pricing agreement that platforms use with sellers: per-­unit and proportional fees. In particular, we analyze the critical role...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014033182
Saved in:
Cover Image
Vertical Agreements and User Access
Gaudin, Germain - 2020
Platforms acting as sales channels for producers often charge users for access, via a subscription fee or a markup on hardware. We compare two common forms of vertical pricing agreement that platforms use with sellers: per-unit and proportional fees. In particular, we analyze the critical role...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012826139
Saved in:
Cover Image
Development of Trust Based Access Control Models Using Fuzzy Logic in Cloud Computing
Kesarwani, Abhishek - 2020
Cloud computing is the technology that provides different types of services as a useful resource on the Internet. Resource trust value will help the cloud users to select the services of a cloud provider for processing and storing their essential information. Also, service providers can give...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014091143
Saved in:
Cover Image
Media access, bias and public opinion
Ozerturk, Saltuk - In: European economic review : EER 147 (2022), pp. 1-27
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013348975
Saved in:
Cover Image
Vertical agreements and user access
Gaudin, Germain; White, Alexander - In: American economic journal 13 (2021) 3, pp. 328-371
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012655814
Saved in:
Cover Image
Using classification for role-based access control management
Badar, Nazia; Vaidya, Jaideep; Vijayalakshmi, Alturi; … - In: International journal of technology, policy and … 16 (2016) 1, pp. 45-78
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011607564
Saved in:
Cover Image
A Clark-Wilson and ANSI role-based access control model
Tsegaye, Tamir; Flowerday, Stephen - In: Information & Computer Security 28 (2020) 3, pp. 373-395
Purpose An electronic health record (EHR) enables clinicians to access and share patient information electronically and has the ultimate goal of improving the delivery of healthcare. However, this can create security and privacy risks to patient information. This paper aims to present a model...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014754816
Saved in:
Cover Image
Enhance the security properties and information flow control
El Moussaid, Nadya; El Azhari, Maryam - In: International journal of electronic business : IJEB 15 (2020) 3, pp. 249-274
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012271210
Saved in:
Cover Image
Enabling attribute revocation for fine-grained access control in blockchain-IoT systems
Yu, Guangsheng; Zha, Xuan; Wang, Xu; Ni, Wei; Yu, Kan; … - In: IEEE transactions on engineering management : EM 67 (2020) 4, pp. 1213-1230
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012387941
Saved in:
Cover Image
Access control and information flow control for web services security
Kedjar, Saadia; Tari, Abdelkamel - 2020
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012169730
Saved in:
Cover Image
Analysis of healthcare workflows in accordance with access control policies
Lakaraju, Sandeep; Xu, Dianxiang; Wang, Yong - 2020
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012169745
Saved in:
Cover Image
Rentabilität von Identity und Access Management im digitalen Wandel
Messerschmidt, Phillip - 2020
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012250969
Saved in:
Cover Image
Awareness of password management and adoption of digital banking services in rural India
Bansal, Nitin - In: Finance India : the quarterly journal of Indian … 34 (2020) 2, pp. 861-874
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012792311
Saved in:
Cover Image
A conceptual framework that monitors port facility access through integrated Port Community Systems and improves port and terminal security performance
Koliousis, Ioannis - In: International journal of shipping and transport … 12 (2020) 4, pp. 251-283
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012256829
Saved in:
Cover Image
Unified enterprise modelling language-based interoperability for collaborative access control framework in critical infrastructures
Baina, Amine; Benali, Khalid; Bellafkih, Mostafa; Aali, … - In: International journal of networking and virtual … 22 (2020) 1, pp. 75-100
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012178096
Saved in:
Cover Image
A privacy protection method for health care big data management based on risk access control
Shi, Mingyue; Jiang, Rong; Hu, Xiaohan; Shang, Jingwei - In: Health care management science : a new journal serving … 23 (2020) 3, pp. 427-442
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012291203
Saved in:
Cover Image
Broadband industry structure and cybercrime : an empirical analysis
Gideon, Carolyn; Hogendorn, Christiaan - 2015 - Preliminary draft, Draft 2.0
Prior studies have shown that while ISPs are well positioned to provide residential and SME users critical protection from cybercrime, their incentives to do so are often insufficient. The presence of competition in providing broadband service is a factor we might expect to impact such...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011526783
Saved in:
Cover Image
Investigating radio-frequency identification usage behaviours and organisational performance according to factors of user perception
Tang, Linglang; Chan, Ya-wen; Shen, Sheng-Lun - In: International journal of services technology and management 25 (2019) 3/4, pp. 199-214
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012101600
Saved in:
Cover Image
Data Breaches and Identity Theft
Roberds, William - 2014
This paper presents a monetary-theoretic model to study the implications of networks' collection of personal identifying data and data security on each other's incidence and costs of identity theft. To facilitate trade, agents join clubs (networks) that compile and secure data. Too much data...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012708651
Saved in:
Cover Image
Parallel Access Control Model in Cross-Domain Grid Computing Environment
Namane, Sarra; Ghoualmi, Nassira - In: International Journal of Embedded and Real-Time … 9 (2018) 1, pp. 50-65
Despite the various attractive features that grid computing has to offer, it has many great security challenges, such as access control. With the expansion of the network scale, a large number of authorization requests have to be treated; on the other hand, the multi-domain nature of grid...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012044698
Saved in:
Cover Image
Access Control Framework Using Multi-Factor Authentication in Cloud Computing
Patel, Subhash Chandra; Jaiswal, Sumit; Singh, Ravi Shankar - In: International Journal of Green Computing (IJGC) 9 (2018) 2, pp. 1-15
The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012044942
Saved in:
Cover Image
Generic Access Control Model and Semantic Mapping Between Heterogeneous Policies
Haguouche, Samira; Jarir, Zahi - In: International Journal of Technology Diffusion (IJTD) 9 (2018) 4, pp. 52-65
This article aims to ensure a dynamic set up of access control policies across collaborating organizations where these organizations adopt heterogeneous access control models. To attain this objective, this contribution started with a survey on existing access control models, and their...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012048398
Saved in:
Cover Image
FRABAC: a new hybrid access control model for the heterogeneous multi-domain systems
Ben Attia, Hasiba; Kahloul, Laid; Benharzallah, Saber - In: International journal of management and decision making … 17 (2018) 3, pp. 245-278
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011971578
Saved in:
Cover Image
Data across control in data exchanging supporting big data area
Jia, Haoyang; Sheng, Yimin; Han, Weili; Wang, X. Sean - In: Journal of management analytics 5 (2018) 3, pp. 155-169
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011889307
Saved in:
Cover Image
IT-Sicherheit : Konzepte - Verfahren - Protokolle
Eckert, Claudia - 2018 - 10. Auflage
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011821990
Saved in:
Cover Image
Reducing Underage Alcohol and Tobacco Use : Evidence from the Introduction of Vertical Identification Cards
Bellou, Andriana - 2012
From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued licenses that are vertically oriented, whereas...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013098816
Saved in:
Cover Image
Reducing underage alcohol and tobacco use : evidence from the introduction of vertical identification cards
Bellou, Andriana; Bhatt, Rachana - 2012
From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued licenses that are vertically oriented, whereas...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009656636
Saved in:
Cover Image
Privacy Aware Access Control: A Literature Survey and Novel Framework
Bhatia, Rekha; Gujral, Manpreet Singh - In: International Journal of Information Technologies and … 10 (2017) 2, pp. 17-30
Due to the ever increasing number of web services available through the Internet, the privacy as a fundamental human right is endangered. Informed consent and collection of information are two important aspects while interacting on the Internet through web services. The ease of data access and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012046064
Saved in:
Cover Image
Goal Modelling for Security Problem Matching and Pattern Enforcement
Washizaki, Hironori; Yu, Yijun; Kaiya, Haruhiko; … - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 3, pp. 42-57
This article describes how earlier detection of security problems and the implementation of solutions would be a cost-effective approach for developing secure software systems. Developing, gathering and sharing similar repeatable programming knowledge and solutions has led to the introduction of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012048088
Saved in:
Cover Image
Continuous user authentication on touch-screen mobile phones : toward more secure and usable m-commerce
Zhang, Dongsong; Kang, Yin; Zhou, Lina; Lai, Jianwei - In: Internetworked world : 15th Workshop on e-Business, WeB …, (pp. 225-236). 2017
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011758993
Saved in:
Cover Image
Customer perception and behavioral intention to use biometric-enabled e-banking services in India
Varma, Siddharth; Gupta, Ruchika - In: Business analytics and cyber security management in …, (pp. 137-146). 2017
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011586306
Saved in:
Cover Image
Mobile application development, usability, and security
Mukherjea, Sougata (ed.) - 2017
"This book provides a thorough overview on the different facets of mobile technology management and its integration into modern society, highlighting issues related to analytics, cloud computing, and different types of application development"--Provided by publisher.
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012395070
Saved in:
Cover Image
Fine-grained integration of access control policies
Rao, Prathima; Lin, Dan; Bertino, Elisa; Li, Ninghui; … - 2011
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009430552
Saved in:
Cover Image
A conditional purpose-based access control model with dynamic roles
Kabir, Enamul; Wang, Hua; Bertino, Elisa - 2011
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited purpose in the model. It allows users using some data for certain purpose with conditions. The structure of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009430806
Saved in:
Cover Image
Hierarchy Similarity Analyser-An Approach to Securely Share Electronic Health Records
Bhartiya, Shalini; Mehrotra, Deepti; Girdhar, Anup - In: International Journal of E-Health and Medical … 7 (2016) 2, pp. 14-29
Health professionals need an access to various dimensions of Electronic Health Records (EHR). Depending on technical constraints, each organization defines its own access control schema exhibiting heterogeneity in organizational rules and policies. Achieving interoperability between such schemas...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012044418
Saved in:
Cover Image
Combination of Access Control and De-Identification for Privacy Preserving in Big Data
Rahmani, Amine; Amine, Abdelmalek; Hamou, Reda Mohamed - In: International Journal of Information Security and … 10 (2016) 1, pp. 1-27
Despite of its emergence and advantages in various domains, big data still suffers from major disadvantages. Timeless, scalability, and privacy are the main problems that hinder the advance of big data. Privacy preserving has become a wide search era within the scientific community. This paper...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012045669
Saved in:
Cover Image
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing
Moradbeikie, Azin; Abrishami, Saied; Abbasi, Hasan - In: International Journal of Information Security and … 10 (2016) 4, pp. 44-57
Nowadays, Cloud Computing is considered one of the important fields in both research and industry. Users enjoy membership of cloud providing effective services called time-limited services. This paper addresses time-limited services offering an attribute-based access control method and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012045683
Saved in:
Cover Image
Access Control and Information Flow Control for Web Services Security
Kedjar, Saadia; Tari, Abdelkamel; Bertok, Peter - In: International Journal of Information Technology and Web … 11 (2016) 1, pp. 44-76
With the advancement of web services technology, security has become an increasingly important issue. Various security standards have been developed to secure web services at the transport and message level, but application level has received less attention. The security solutions at the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012046078
Saved in:
Cover Image
Gesture-based animated CAPTCHA
Shumilov, Artem; Philippovich, Andrey - In: Information & Computer Security 24 (2016) 3, pp. 242-254
Purpose This paper aims to describe the development of a new experimental CAPTCHA (completely automated public turing test to tell computers and humans apart), which is supposed to provide better protection against spam bots compared to the existing captcha solutions. Design/methodology/approach...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014754907
Saved in:
Cover Image
Towards a game theoretic authorisation model
Salim, Farzad; Reid, Jason; Dulleck, Uwe; Dawson, Edward - 2010
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users? access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009483459
Saved in:
Cover Image
Modelling a Trusted Mechanism for Knowledge Sharing
PETRESCU, Marius; POPESCU, Delia Mioara; SIRBU, Nicoleta - In: REVISTA DE MANAGEMENT COMPARAT INTERNATIONAL/REVIEW OF … 11 (2010) 5, pp. 799-806
Knowledge sharing has been identified as a major focus area for knowledge management. Efforts are made with a view to identify the most effective ways to share knowledge, as a step towards improving organizational performance. In this striving, various factors have been identified as impediments...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10008852699
Saved in:
Cover Image
An algebra for fine-grained integration of XACML policies
Rao, Prathima; Lin, Dan; Bertino, Elisa; Li, Ninghui - 2009
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009430789
Saved in:
Cover Image
Specification and enforcement of flexible security policy for active cooperation
Sun, Yuqing; Gong, Bin; Meng, Xiangxu; Lin, Zongkai; … - 2009
Interoperation and services sharing among different systems are becoming new paradigms for enterprise collaboration. To keep ahead in strong competition environments, an enterprise should provide flexible and comprehensive services to partners and support active collaborations with partners and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009430798
Saved in:
Cover Image
Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking
Butler, Martin; Butler, Rika - In: Information & Computer Security 23 (2015) 4, pp. 421-434
Purpose – The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk profile. Online security remains a challenge to ensure safe transacting on the Internet. User authentication,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014754867
Saved in:
Cover Image
Security evaluation of the OAuth 2.0 framework
Ferry, Eugene; O Raw, John; Curran, Kevin - In: Information & Computer Security 23 (2015) 1, pp. 73-101
Purpose – The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014754902
Saved in:
  • 1
  • 2
  • 3
  • 4
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...