Advanced search options
Language: English ❌
You searched for subject:(ZUGRIFFSKONTROLLE BETRIEBSSYSTEME )
.
Showing records 1 – 12 of
12 total matches.
▼ Search Limiters
ETH Zürich
1. Lüssi, Cécile. Signature-based extrusion detection.
Degree: 2008, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/150670
Subjects/Keywords: ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Lüssi, C. (2008). Signature-based extrusion detection. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/150670
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Lüssi, Cécile. “Signature-based extrusion detection.” 2008. Thesis, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/150670.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Lüssi, Cécile. “Signature-based extrusion detection.” 2008. Web. 05 Mar 2021.
Vancouver:
Lüssi C. Signature-based extrusion detection. [Internet] [Thesis]. ETH Zürich; 2008. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/150670.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Lüssi C. Signature-based extrusion detection. [Thesis]. ETH Zürich; 2008. Available from: http://hdl.handle.net/20.500.11850/150670
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
ETH Zürich
2. Werthmüller, Tanja. Efficient evaluation of PBel access control policies.
Degree: 2013, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/153956
Subjects/Keywords: SPEZIELLE PROGRAMMIERMETHODEN; ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); SPECIAL PROGRAMMING METHODS; ACCESS CONTROL (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Werthmüller, T. (2013). Efficient evaluation of PBel access control policies. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/153956
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Werthmüller, Tanja. “Efficient evaluation of PBel access control policies.” 2013. Thesis, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/153956.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Werthmüller, Tanja. “Efficient evaluation of PBel access control policies.” 2013. Web. 05 Mar 2021.
Vancouver:
Werthmüller T. Efficient evaluation of PBel access control policies. [Internet] [Thesis]. ETH Zürich; 2013. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/153956.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Werthmüller T. Efficient evaluation of PBel access control policies. [Thesis]. ETH Zürich; 2013. Available from: http://hdl.handle.net/20.500.11850/153956
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
ETH Zürich
3. Danev, Boris D. Physical-Layer Identification of Wireless Devices.
Degree: 2011, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/72822
Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); AUTHENTIFICATION (OPERATING SYSTEMS); AUTHENTIFIKATION (BETRIEBSSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Danev, B. D. (2011). Physical-Layer Identification of Wireless Devices. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72822
Chicago Manual of Style (16th Edition):
Danev, Boris D. “Physical-Layer Identification of Wireless Devices.” 2011. Doctoral Dissertation, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/72822.
MLA Handbook (7th Edition):
Danev, Boris D. “Physical-Layer Identification of Wireless Devices.” 2011. Web. 05 Mar 2021.
Vancouver:
Danev BD. Physical-Layer Identification of Wireless Devices. [Internet] [Doctoral dissertation]. ETH Zürich; 2011. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/72822.
Council of Science Editors:
Danev BD. Physical-Layer Identification of Wireless Devices. [Doctoral Dissertation]. ETH Zürich; 2011. Available from: http://hdl.handle.net/20.500.11850/72822
ETH Zürich
4. Jotterand, Arnaud. Usage control in secure messaging.
Degree: 2008, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/150366
Subjects/Keywords: NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Jotterand, A. (2008). Usage control in secure messaging. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/150366
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Jotterand, Arnaud. “Usage control in secure messaging.” 2008. Thesis, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/150366.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Jotterand, Arnaud. “Usage control in secure messaging.” 2008. Web. 05 Mar 2021.
Vancouver:
Jotterand A. Usage control in secure messaging. [Internet] [Thesis]. ETH Zürich; 2008. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/150366.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Jotterand A. Usage control in secure messaging. [Thesis]. ETH Zürich; 2008. Available from: http://hdl.handle.net/20.500.11850/150366
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
ETH Zürich
5. Raftopoulos, Ilias. Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections.
Degree: 2014, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/91060
Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); COMPUTER CRIMINALITY + CYBERCRIMINALITY (CRIMINAL LAW); COMPUTERKRIMINALITÄT + CYBERKRIMINALITÄT (STRAFRECHT); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Raftopoulos, I. (2014). Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/91060
Chicago Manual of Style (16th Edition):
Raftopoulos, Ilias. “Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections.” 2014. Doctoral Dissertation, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/91060.
MLA Handbook (7th Edition):
Raftopoulos, Ilias. “Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections.” 2014. Web. 05 Mar 2021.
Vancouver:
Raftopoulos I. Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/91060.
Council of Science Editors:
Raftopoulos I. Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/91060
ETH Zürich
6. Lai, Willy. Data Warehouse Query Log Analysis using MapReduce.
Degree: 2011, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/41270
Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); DATABASE MANAGEMENT + DATABASE ADMINISTRATION (INFORMATION SYSTEMS); ABFRAGEN (INFORMATIONSSYSTEME); QUERIES (INFORMATION SYSTEMS); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENBANKVERWALTUNG + DATENBANKADMINISTRATION (INFORMATIONSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Lai, W. (2011). Data Warehouse Query Log Analysis using MapReduce. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/41270
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Lai, Willy. “Data Warehouse Query Log Analysis using MapReduce.” 2011. Thesis, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/41270.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Lai, Willy. “Data Warehouse Query Log Analysis using MapReduce.” 2011. Web. 05 Mar 2021.
Vancouver:
Lai W. Data Warehouse Query Log Analysis using MapReduce. [Internet] [Thesis]. ETH Zürich; 2011. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/41270.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Lai W. Data Warehouse Query Log Analysis using MapReduce. [Thesis]. ETH Zürich; 2011. Available from: http://hdl.handle.net/20.500.11850/41270
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
ETH Zürich
7. Meier, Daniela. Realizing and Implementing Location-based Access Control Policies.
Degree: 2013, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/154153
Subjects/Keywords: ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); ACCESS CONTROL (OPERATING SYSTEMS); NETWORK MONITORING (COMPUTER SYSTEMS); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Meier, D. (2013). Realizing and Implementing Location-based Access Control Policies. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/154153
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Meier, Daniela. “Realizing and Implementing Location-based Access Control Policies.” 2013. Thesis, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/154153.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Meier, Daniela. “Realizing and Implementing Location-based Access Control Policies.” 2013. Web. 05 Mar 2021.
Vancouver:
Meier D. Realizing and Implementing Location-based Access Control Policies. [Internet] [Thesis]. ETH Zürich; 2013. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/154153.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Meier D. Realizing and Implementing Location-based Access Control Policies. [Thesis]. ETH Zürich; 2013. Available from: http://hdl.handle.net/20.500.11850/154153
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
ETH Zürich
8. Frank, Mario. Probabilistic Role Mining.
Degree: 2011, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/72860
Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); ASSIGNMENT PROBLEMS (LINEAR PROGRAMMING); STOCHASTIC MODELS + STOCHASTIC SIMULATION (PROBABILITY THEORY); STOCHASTISCHE MODELLE + STOCHASTISCHE SIMULATION (WAHRSCHEINLICHKEITSRECHNUNG); ZUORDNUNGSPROBLEME (LINEARE OPTIMIERUNG); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Frank, M. (2011). Probabilistic Role Mining. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72860
Chicago Manual of Style (16th Edition):
Frank, Mario. “Probabilistic Role Mining.” 2011. Doctoral Dissertation, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/72860.
MLA Handbook (7th Edition):
Frank, Mario. “Probabilistic Role Mining.” 2011. Web. 05 Mar 2021.
Vancouver:
Frank M. Probabilistic Role Mining. [Internet] [Doctoral dissertation]. ETH Zürich; 2011. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/72860.
Council of Science Editors:
Frank M. Probabilistic Role Mining. [Doctoral Dissertation]. ETH Zürich; 2011. Available from: http://hdl.handle.net/20.500.11850/72860
ETH Zürich
9. Lamprakis, Pavlos. Human or malware? Detection of malicious Web requests.
Degree: 2016, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/155852
Subjects/Keywords: NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); INTERNET + WORLD WIDE WEB (COMPUTERSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); ACCESS CONTROL (OPERATING SYSTEMS); INTERNET + WORLD WIDE WEB (COMPUTER SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Lamprakis, P. (2016). Human or malware? Detection of malicious Web requests. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/155852
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Lamprakis, Pavlos. “Human or malware? Detection of malicious Web requests.” 2016. Thesis, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/155852.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Lamprakis, Pavlos. “Human or malware? Detection of malicious Web requests.” 2016. Web. 05 Mar 2021.
Vancouver:
Lamprakis P. Human or malware? Detection of malicious Web requests. [Internet] [Thesis]. ETH Zürich; 2016. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/155852.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Lamprakis P. Human or malware? Detection of malicious Web requests. [Thesis]. ETH Zürich; 2016. Available from: http://hdl.handle.net/20.500.11850/155852
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
10. Tsankov, Petar. Access Control with Formal Security Guarantees.
Degree: 2016, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/125291
Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Tsankov, P. (2016). Access Control with Formal Security Guarantees. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/125291
Chicago Manual of Style (16th Edition):
Tsankov, Petar. “Access Control with Formal Security Guarantees.” 2016. Doctoral Dissertation, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/125291.
MLA Handbook (7th Edition):
Tsankov, Petar. “Access Control with Formal Security Guarantees.” 2016. Web. 05 Mar 2021.
Vancouver:
Tsankov P. Access Control with Formal Security Guarantees. [Internet] [Doctoral dissertation]. ETH Zürich; 2016. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/125291.
Council of Science Editors:
Tsankov P. Access Control with Formal Security Guarantees. [Doctoral Dissertation]. ETH Zürich; 2016. Available from: http://hdl.handle.net/20.500.11850/125291
ETH Zürich
11. Ben-Porat, Ehud. On the Vulnerability of Network Mechanisms to Sophisticated Attacks.
Degree: 2014, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/91062
Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Ben-Porat, E. (2014). On the Vulnerability of Network Mechanisms to Sophisticated Attacks. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/91062
Chicago Manual of Style (16th Edition):
Ben-Porat, Ehud. “On the Vulnerability of Network Mechanisms to Sophisticated Attacks.” 2014. Doctoral Dissertation, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/91062.
MLA Handbook (7th Edition):
Ben-Porat, Ehud. “On the Vulnerability of Network Mechanisms to Sophisticated Attacks.” 2014. Web. 05 Mar 2021.
Vancouver:
Ben-Porat E. On the Vulnerability of Network Mechanisms to Sophisticated Attacks. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/91062.
Council of Science Editors:
Ben-Porat E. On the Vulnerability of Network Mechanisms to Sophisticated Attacks. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/91062
ETH Zürich
12. Dubovitskaya, Maria. Cryptographic Protocols for Privacy-Preserving Access Control in Databases.
Degree: 2014, ETH Zürich
URL: http://hdl.handle.net/20.500.11850/154670
Subjects/Keywords: NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); CODIERUNG (INFORMATIONSTHEORIE); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENBANKVERWALTUNG + DATENBANKADMINISTRATION (INFORMATIONSSYSTEME); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); CODING (INFORMATION THEORY); ACCESS CONTROL (OPERATING SYSTEMS); DATABASE MANAGEMENT + DATABASE ADMINISTRATION (INFORMATION SYSTEMS); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Dubovitskaya, M. (2014). Cryptographic Protocols for Privacy-Preserving Access Control in Databases. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/154670
Chicago Manual of Style (16th Edition):
Dubovitskaya, Maria. “Cryptographic Protocols for Privacy-Preserving Access Control in Databases.” 2014. Doctoral Dissertation, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/154670.
MLA Handbook (7th Edition):
Dubovitskaya, Maria. “Cryptographic Protocols for Privacy-Preserving Access Control in Databases.” 2014. Web. 05 Mar 2021.
Vancouver:
Dubovitskaya M. Cryptographic Protocols for Privacy-Preserving Access Control in Databases. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/154670.
Council of Science Editors:
Dubovitskaya M. Cryptographic Protocols for Privacy-Preserving Access Control in Databases. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/154670