Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- xml (extensible markup language) 9 Treffer
- online information services 3 Treffer
- public key cryptography 3 Treffer
- saml 3 Treffer
- security systems 3 Treffer
-
45 weitere Werte:
- web services 3 Treffer
- data protection 2 Treffer
- document markup languages 2 Treffer
- electronic records 2 Treffer
- java programming language 2 Treffer
- soap protocol 2 Treffer
- timestamp 2 Treffer
- web service 2 Treffer
- ws-security 2 Treffer
- xkms protocol 2 Treffer
- xml-security 2 Treffer
- application software 1 Treffer
- authentication and authorization infrastructure 1 Treffer
- client/server computing 1 Treffer
- computer network security 1 Treffer
- computer security 1 Treffer
- computer software industry 1 Treffer
- data encryption 1 Treffer
- digital certificates 1 Treffer
- digital signatures 1 Treffer
- electronic commerce 1 Treffer
- government communication systems 1 Treffer
- government websites 1 Treffer
- grid computing 1 Treffer
- identity management 1 Treffer
- identity management systems 1 Treffer
- information technology security 1 Treffer
- internet 1 Treffer
- internet servers 1 Treffer
- microsoft corp. 1 Treffer
- mobile communication systems software 1 Treffer
- mobile computing 1 Treffer
- pki 1 Treffer
- privacy 1 Treffer
- public key infrastructure (computer security) 1 Treffer
- saml (document markup language) 1 Treffer
- service-oriented architecture (computer science) 1 Treffer
- standards 1 Treffer
- technology 1 Treffer
- user interfaces 1 Treffer
- validation services 1 Treffer
- verisign inc. 1 Treffer
- wireless communications 1 Treffer
- xacml 1 Treffer
- xkms 1 Treffer
Verlag
Publikation
Sprache
11 Treffer
-
In: Journal of Systems Architecture, Jg. 55 (2009-04-01), Heft 4, S. 289-297academicJournalZugriff:
-
In: Network World, Jg. 20 (2003-09-08), Heft 36, S. 39-39Online serialPeriodicalZugriff:
-
In: International Journal of Information Security, Jg. 12 (2013-06-01), Heft 3, S. 173-200Online academicJournalZugriff:
-
In: Logic Journal of the IGPL, Jg. 21 (2013-08-01), Heft 4, S. 680-691Online academicJournalZugriff:
-
In: Information Systems Management, Jg. 27 (2010-09-01), Heft 4, S. 320-333Online academicJournalZugriff:
-
In: Computer Communications, Jg. 29 (2006-02-01), Heft 3, S. 291-305academicJournalZugriff:
-
In: Journal of Systems & Software, Jg. 81 (2008-10-01), Heft 10, S. 1715-1724academicJournalZugriff:
-
In: InfoWorld, Jg. 24 (2002-09-16), Heft 37, S. 16-16Online serialPeriodicalZugriff:
-
In: Network World, Jg. 18 (2001-04-16), Heft 16, S. 14-14Online serialPeriodicalZugriff:
-
In: Network World, Jg. 17 (2000-12-04), Heft 49, S. 10-10Online serialPeriodicalZugriff:
-
In: Computerworld, Jg. 34 (2000-12-04), Heft 49, S. 10-10Online serialPeriodicalZugriff: