Sign in

Minimizing insider misuse through secure Identity Management.

Ludwig FuchsGünther Pernul
Published in: Secur. Commun. Networks (2012)
Keyphrases
  • identity management
  • access control
  • personal information
  • user centric
  • personal data
  • cloud computing
  • anomaly detection
  • intrusion detection system
  • user privacy
  • user behavior
  • security policies