Login / Signup
A Survey on Identity Management Protocols and Standards.
Teruko Miyata
Yuzo Koga
Paul Madsen
Shin-ichi Adachi
Yoshitsugu Tsuchiya
Yasuhisa Sakamoto
Kenji Takahashi
Published in:
IEICE Trans. Inf. Syst. (2006)
Keyphrases
</>
low level
identity management
high level
access control
personal information
cloud computing
user centric
widely accepted
user privacy
web services
security protocols
trust relationships
metadata
sensor networks
user interface
design choices
databases
database