Login / Signup
Role Model Optimization for Secure Role-Based Identity Management.
Ludwig Fuchs
Michael Kunz
Günther Pernul
Published in:
ECIS (2014)
Keyphrases
</>
identity management
access control
role model
personal information
cloud computing
user centric
user privacy
security policies
trust relationships
database
social networks
end to end