| PDF (845kB) |
- URN zum Zitieren dieses Dokuments:
- urn:nbn:de:bvb:355-epub-255482
- DOI zum Zitieren dieses Dokuments:
- 10.5283/epub.25548
Zusammenfassung
To avoid insider computer misuse, identity, and authorization data referring to the legitimate users of systems must be properly organized, constantly and systematically analyzed, and evaluated. In order to support this, structured and secure Identity Management is required. A comprehensive methodology supporting Identity Management within organizations has been developed, including gathering of ...
Nur für Besitzer und Autoren: Kontrollseite des Eintrags