Login / Signup
Secure Identity Management for Pseudo-Anonymous Service Access.
Michael Hitchens
Judy Kay
Bob Kummerfeld
Ajay Brar
Published in:
SPC (2005)
Keyphrases
</>
identity management
access control
cloud computing
personal information
security mechanisms
service providers
user centric
directory service
management system
web services
peer to peer
security policies
user privacy
mobile agents
data management
social media
trade off
metadata
trust relationships