Login / Signup
Privacy policy enforcement in enterprises with identity management solutions.
Marco Casassa Mont
Robert Thyne
Published in:
PST (2006)
Keyphrases
</>
identity management
access control
policy enforcement
personal information
user centric
business goals
cloud computing
security management
context sensitive
security policies
user privacy
database
neural network
trade off
third party
enterprise network