What user-controlled identity management should learn from communities.
Katrin Borcea-PfitzmannMarit HansenKatja LiesebachAndreas PfitzmannSandra SteinbrecherPublished in: Inf. Secur. Tech. Rep. (2006)
Keyphrases
- identity management
- user centric
- user interface
- user privacy
- access control
- user interaction
- user preferences
- recommender systems
- social media
- collaborative filtering
- personal information
- cloud computing
- social communities
- context dependent
- knowledge sharing
- artificial intelligence
- relevance feedback
- end users
- trade off