| PDF (5MB) |
- URN zum Zitieren dieses Dokuments:
- urn:nbn:de:bvb:355-epub-151293
- DOI zum Zitieren dieses Dokuments:
- 10.5283/epub.15129
Zusammenfassung
To avoid insider computer misuse, identity and authorization data referring to the legitimate users of the systems must be properly organized and constantly and systematically analyzed and evaluated. In order to support this, a methodology for structured Identity Management has been developed. This methodology includes gathering of identity data spread among different applications, systematic ...
Nur für Besitzer und Autoren: Kontrollseite des Eintrags