Skip to main content
Chapter
Licensed
Unlicensed Requires Authentication

6 Sicherheitsmodelle

Become an author with De Gruyter Brill
IT-Sicherheit
This chapter is in the book IT-Sicherheit
Downloaded on 2.5.2026 from https://www.degruyterbrill.com/document/doi/10.1524/9783486735871.261/html?lang=en
Scroll to top button