| PDF (5MB) |
- URN to cite this document:
- urn:nbn:de:bvb:355-epub-151293
- DOI to cite this document:
- 10.5283/epub.15129
Abstract
To avoid insider computer misuse, identity and authorization data referring to the legitimate users of the systems must be properly organized and constantly and systematically analyzed and evaluated. In order to support this, a methodology for structured Identity Management has been developed. This methodology includes gathering of identity data spread among different applications, systematic ...
Owner only: item control page