Login / Signup
An Approach to Identity Management in Clouds without Trusted Third Parties.
Akram Sarhan
Leszek Lilien
Published in:
CoRR (2019)
Keyphrases
</>
identity management
third party
cloud computing
personal information
trust relationships
outsourced databases
service providers
access control
sensitive information
mashup
user centric
data management
sensitive data
data privacy