Login / Signup
Minimizing insider misuse through secure Identity Management.
Ludwig Fuchs
Günther Pernul
Published in:
Secur. Commun. Networks (2012)
Keyphrases
</>
identity management
access control
personal information
user centric
personal data
cloud computing
anomaly detection
intrusion detection system
user privacy
user behavior
security policies