Login / Signup

Reconciling value-based objectives for security and identity management.

Kane SmithGurpreet DhillonKarin Hedström
Published in: Inf. Comput. Secur. (2018)
Keyphrases
  • identity management
  • access control
  • personal information
  • cloud computing
  • user centric
  • security policies
  • security requirements
  • business goals
  • databases
  • trust relationships
  • user privacy
  • multimedia
  • digital libraries