Login / Signup

Mobile Identity Management: An Enacted View.

George RoussosDon PetersonUma Patel
Published in: Int. J. Electron. Commer. (2003)
Keyphrases
  • identity management
  • cloud computing
  • personal information
  • user centric
  • mobile devices
  • access control
  • mobile phone
  • context aware
  • mobile applications
  • database
  • mobile learning
  • multimedia
  • high level
  • trust relationships