Login / Signup
Evaluating identity management architectures.
Christopher Staite
Rami Bahsoon
Published in:
ISARCS (2012)
Keyphrases
</>
identity management
access control
cloud computing
personal information
user centric
search algorithm
data management
trust relationships
high level
third party