Login / Signup
Provision of Trusted Identity Management Using Trust Credentials.
Siani Pearson
Marco Casassa Mont
Published in:
iTrust (2006)
Keyphrases
</>
trust relationships
identity management
trust negotiation
access control
user privacy
personal information
user centric
cloud computing
case study
access control policies
design choices
databases
business processes
distributed environment