-
1
-
-
33846512571
-
Bedeutung der politischen und rechtlichen rahmenbedingungen für biometrische identifikationssysteme
-
Behrens, M. et al. Ed., Vieweg, Wiesbaden
-
Albrecht, A.; Probst, T. (2001). Bedeutung der politischen und rechtlichen Rahmenbedingungen für biometrische Identifikationssysteme. In Biometrische Identifikation: Grundlagen, Verfahren, Perspektiven. (Behrens, M. et al. Ed.), 27-54 Vieweg, Wiesbaden.
-
(2001)
Biometrische Identifikation: Grundlagen, Verfahren, Perspektiven
, pp. 27-54
-
-
Albrecht, A.1
Probst, T.2
-
4
-
-
85001819535
-
On the design of an authentication system based on keystroke dynamics using a predefined input text
-
Bartmann, D.; Bakdi, I.; Achatz, M. (2007). On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text, In International Journal of Information Security and Privacy, 1(2), 1-12.
-
(2007)
International Journal of Information Security and Privacy
, vol.1
, Issue.2
, pp. 1-12
-
-
Bartmann, D.1
Bakdi, I.2
Achatz, M.3
-
6
-
-
84869471724
-
-
Grundlagen, Verfahren, Perspektiven (Behrens, M. et al. Ed.), Vieweg, Wiesbaden
-
Behrens, M.; Roth, R. (2001). Biometrische Identifikation aus Nutzerperspektive. Grundlagen, Verfahren, Perspektiven (Behrens, M. et al. Ed.), 195-220. Vieweg, Wiesbaden.
-
(2001)
Biometrische Identifikation Aus Nutzerperspektive
, pp. 195-220
-
-
Behrens, M.1
Roth, R.2
-
7
-
-
84869471725
-
Fingerbilderkennung
-
Behrens, M. et al. Ed., Vieweg, Wiesbaden
-
Behrens, M.; Heumann, B. (2001). Fingerbilderkennung. In Biometrische Identifikation: Grundlagen, Verfahren, Perspektiven (Behrens, M. et al. Ed.), 81-104. Vieweg, Wiesbaden.
-
(2001)
Biometrische Identifikation: Grundlagen, Verfahren, Perspektiven
, pp. 81-104
-
-
Behrens, M.1
Heumann, B.2
-
9
-
-
71749119798
-
Access control of cloud service based on UCON
-
Springer, Berlin
-
Danwei, C.; Xiuli, H.; Xunyi, R. (2009). Access Control of Cloud Service Based on UCON. In LCNS 5931, 559-564. Springer, Berlin.
-
(2009)
LCNS
, vol.5931
, pp. 559-564
-
-
Danwei, C.1
Xiuli, H.2
Xunyi, R.3
-
11
-
-
67651154561
-
Evaluation of inter-organizational business process solutions: A conceptual model-based approach
-
Ghattas, J.; Soffer, P. (2009). Evaluation of inter-organizational business process solutions: A conceptual model-based approach. In Information Systems Frontiers, 11 (3), 273-291.
-
(2009)
Information Systems Frontiers
, vol.11
, Issue.3
, pp. 273-291
-
-
Ghattas, J.1
Soffer, P.2
-
12
-
-
77951622591
-
-
Jain, A.K. et al. Ed., Springer, New York
-
Gonzáles-Rodrígues, J.; Toledano, D.T.; Ortega-Garcia, J. (2009). In Handbook of Biometrics (Jain, A.K. et al. Ed.), 151-170. Springer, New York.
-
(2009)
Handbook of Biometrics
, pp. 151-170
-
-
Gonzáles-Rodrígues, J.1
Toledano, D.T.2
Ortega-Garcia, J.3
-
15
-
-
78149472443
-
Introduction to biometrics
-
Jain, A.K. et al. Ed., Springer, New York
-
Jain, A.K.; Ross, A. (2007). Introduction to Biometrics. In Handbook of Biometrics (Jain, A.K. et al. Ed.), 1-22. Springer, New York.
-
(2007)
Handbook of Biometrics
, pp. 1-22
-
-
Jain, A.K.1
Ross, A.2
-
16
-
-
34250159086
-
Requirements for scalable access control and security management architectures
-
n.p
-
Keromytis, A.D.; Smith, J.M. (2007). Requirements for Scalable Access Control and Security Management Architectures. In ACM Transactions on Internet Technologies 7(4), n.p.
-
(2007)
ACM Transactions on Internet Technologies
, vol.7
, Issue.4
-
-
Keromytis, A.D.1
Smith, J.M.2
-
17
-
-
57849097281
-
Towards systematic achievement of compliance in service-orientied architectures: The master approach
-
Lotz, V.; Pigout, E.; Fischer, P.M.; Kossmann, D.; Massacci, F.;, Pretschner, A. (2008). Towards Systematic Achievement of Compliance in Service-Orientied Architectures: The MASTER Approach. In Wirtschaftsinformatik 50(5), 383-391.
-
(2008)
Wirtschaftsinformatik
, vol.50
, Issue.5
, pp. 383-391
-
-
Lotz, V.1
Pigout, E.2
Fischer, P.M.3
Kossmann, D.4
Massacci, F.5
Pretschner, A.6
-
19
-
-
1342275940
-
-
2nd Edition. Springer, London
-
Maltoni, D.; Maio, D.; Jain, A.K.; Prabhakar, S. (2009). Handbook of Fingerprint Recognition. 2nd Edition. Springer, London.
-
(2009)
Handbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
20
-
-
77954727171
-
-
Konzepte und Anforderungen. Springer, Berlin
-
Müller, T. (2008). Trusted Computing Systeme. Konzepte und Anforderungen. Springer, Berlin.
-
(2008)
Trusted Computing Systeme
-
-
Müller, T.1
-
21
-
-
70350630603
-
Remote attestation of attribute updates and information flows in a UCON system
-
55471, Springer, Berlin
-
Nauman et al. (2009). Remote Attestation of Attribute Updates and Information Flows in a UCON System. In 2009, LCNS 55471, 63-80. Springer, Berlin.
-
(2009)
2009, LCNS
, pp. 63-80
-
-
Nauman1
-
22
-
-
84870638934
-
-
last access: 2010-01-12
-
OASIS (2005). XACML Version 2.0. http://docs.oasis-open.org/xacml/2.0/ access-control-xacml-2.0-core-spec-os.pdf. last access: 2010-01-12.
-
(2005)
XACML Version 2.0
-
-
-
26
-
-
33749374853
-
Biometrie: Wie einsetzen und wie keinesfalls
-
Pfitzmann, A. (2006). Biometrie: wie einsetzen und wie keinesfalls. In Informatik Spektrum 29(5), 353-356.
-
(2006)
Informatik Spektrum
, vol.29
, Issue.5
, pp. 353-356
-
-
Pfitzmann, A.1
-
29
-
-
33748543201
-
Distributed usage control
-
Pretschner, A.; Hilty, M.; Basin, D. (2006). Distributed usage control. In Communications of the ACM 49(9), 39-44.
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
36
-
-
84994436127
-
Password exhaustion: Predicting the end of password usefulness
-
Bagchi, A. and Atluri, V. Ed., Springer, Heidelberg
-
St. Clair, L.; Johansen, L.; Enck, W.; Pirretti, M.; Traynor, P.; McDaniel Patrick-Jaeger, T. (2006) Password Exhaustion: Predicting the End of Password Usefulness. In LNCS 432, (Bagchi, A. and Atluri, V. Ed.), 37-55. Springer, Heidelberg.
-
(2006)
LNCS
, vol.432
, pp. 37-55
-
-
Clair, L.1
Johansen, L.2
Enck, W.3
Pirretti, M.4
Traynor, P.5
McDaniel, P.-J.T.6
-
39
-
-
18944384049
-
-
Workflow Management Coalition. WFMC, Winchester
-
Workflow Management Coalition (1999). Terminology & Glossary. WFMC, Winchester.
-
(1999)
Terminology & Glossary
-
-
-
40
-
-
50949130846
-
Security enforcement model for distributed usage control
-
Zhang, X. and Seifert, J.P. (2008). Security Enforcement Model for Distributed Usage Control. In IEEE International Conference on Sensor Networks, Ubiquitous, Trustworthy Computing, 10-18.
-
(2008)
IEEE International Conference on Sensor Networks, Ubiquitous, Trustworthy Computing
, pp. 10-18
-
-
Zhang, X.1
Seifert, J.P.2
|