Login / Signup
Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access.
Diana Berbecaru
Antonio Lioy
Marco Domenico Aime
Published in:
TrustBus (2011)
Keyphrases
</>
identity management
access control
trust relationships
personal information
privacy enhancing
internet access
mobile users
wireless technologies
cloud computing
access points
wireless networks
internet services
wireless communication
user centric
mobile devices
data management
trade off
artificial intelligence