Login / Signup
Reconciling value-based objectives for security and identity management.
Kane Smith
Gurpreet Dhillon
Karin Hedström
Published in:
Inf. Comput. Secur. (2018)
Keyphrases
</>
identity management
access control
personal information
cloud computing
user centric
security policies
security requirements
business goals
databases
trust relationships
user privacy
multimedia
digital libraries