On new security mechanisms for identity management: Recognizing and meeting telecom operator and enterprise needs.
Igor FaynbergMark A. HartmanHui-Lan LuDouglas W. VarneyPublished in: Bell Labs Tech. J. (2010)
Keyphrases
- identity management
- security mechanisms
- access control
- security systems
- security problems
- security issues
- security requirements
- cloud computing
- business goals
- security policies
- resource constrained
- security management
- personal information
- smart card
- information systems
- knowledge management
- database
- trade off
- user centric
- data management
- artificial intelligence