Login / Signup
Privacy policy enforcement in enterprises with identity management solutions.
Marco Casassa Mont
Robert Thyne
Published in:
J. Comput. Secur. (2008)
Keyphrases
</>
identity management
access control
policy enforcement
personal information
user centric
cloud computing
security policies
enterprise network
user privacy
business goals
security management
security issues
virtual enterprise
database
mobile devices
trade off
database systems