Login / Signup
Introduction to identity management risk metrics.
Gunnar Peterson
Published in:
IEEE Secur. Priv. (2006)
Keyphrases
</>
identity management
access control
user centric
personal information
cloud computing
risk management
decision making
user privacy
multimedia
risk factors
database
evaluation metrics
risk assessment
third party
trust relationships
computational intelligence
query processing
trade off
case study
databases