Login / Signup
Privacy with Delegation of Rights by Identity Management.
Sven Wohlgemuth
Günter Müller
Published in:
ETRICS (2006)
Keyphrases
</>
identity management
access control
trust relationships
personal information
security policies
cloud computing
user centric
data security
access control systems
role based access control
user privacy
digital content
conflict resolution
privacy issues
trade off
access rights
data model