Login / Signup
Nutzerkontrollierte Verkettung - Pseudonyme, Credentials, Protokolle für Identitätsmanagement.
Marit Hansen
Martin Rost
Published in:
Datenschutz und Datensicherheit (2003)
Keyphrases
</>
access control
trust negotiation
private data
critical information
access control policies
trade off
user privacy
security policies
fine grained
data analysis
artificial intelligence
data sets
high dimensional
distributed environment
reinforcement learning
database systems
feature selection
data mining
real world