Login / Signup
An autonomic approach for managing security and identity management policies in enterprises.
Alan Ganek
Anthony J. Nadalin
Nataraj Nagaratnam
Dinesh Verma
Published in:
J. High Speed Networks (2006)
Keyphrases
</>
identity management
access control
access control policies
role based access control
personal information
cloud computing
user centric
trust relationships
security policies
optimal policy
user privacy
security requirements
social networks
privacy policies
third party
trade off
artificial intelligence