Login / Signup
The Identity Management Challenge.
Heather A. Smith
James D. McKeen
Published in:
Commun. Assoc. Inf. Syst. (2011)
Keyphrases
</>
identity management
access control
personal information
cloud computing
user centric
database systems
digital libraries
trade off
user interface
context sensitive
trust relationships
user privacy