Login / Signup
Continuing the GPO Trust Relationship through Authentication.
Robin Haun-Mohamed
Gil Baldwin
Virginia Wiese
Published in:
IASSIST Conference (2008)
Keyphrases
</>
trust relationships
access control
identity management
trust model
data exchange
multi party
ad hoc networks
trust negotiation
cloud computing