Login / Signup

Different Approaches to In-House Identity Management - Justification of an Assumption.

Ludwig FuchsChristian BroserGünther Pernul
Published in: ARES (2009)
Keyphrases
  • identity management
  • access control
  • databases
  • data mining
  • machine learning
  • computational intelligence