Login / Signup
User-centric identity management using trusted modules.
Jan Vossaert
Jorn Lapon
Bart De Decker
Vincent Naessens
Published in:
Math. Comput. Model. (2013)
Keyphrases
</>
user centric
identity management
trust relationships
personal information
cognitive radio networks
network centric
context awareness
context dependent
clickstream data
digital content
flow management
context sensitive
trade off
database
access control
data analysis
information retrieval