Login / Signup

Evaluating identity management architectures.

Christopher StaiteRami Bahsoon
Published in: ISARCS (2012)
Keyphrases
  • identity management
  • access control
  • cloud computing
  • personal information
  • user centric
  • search algorithm
  • data management
  • trust relationships
  • high level
  • third party