


default search action
EMISA Forum, Band 10, 2000
Band 10, Heft 1, 2000
- Roland H. Kaschek:
Schwachstellen einer Analyse des Modellbegriffs. EMISA Forum 10(1) (2000) - Petra Wohlmacher:
Sicherheitsanforderungen und Sicherheitsmechanismen bei IT-Systemen. EMISA Forum 10(1) (2000)
Band 10, Heft 2, 2000
- Reinhard Schütte:
Realitätsbezug von Informationsmodellen - Eine Erwiderung auf Kritik. EMISA Forum 10(2): 14-21 (2000)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.