Login / Signup
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider.
Golnaz Elahi
Zeev Lieber
Eric S. K. Yu
Published in:
COMPSAC (2008)
Keyphrases
</>
identity management
trade off
management system
access control
complex systems
personal information
database systems
computational intelligence
language model
cloud computing
computer aided
computing environments
digital content