Login / Signup
Different Approaches to In-House Identity Management - Justification of an Assumption.
Ludwig Fuchs
Christian Broser
Günther Pernul
Published in:
ARES (2009)
Keyphrases
</>
identity management
access control
databases
data mining
machine learning
computational intelligence