| PDF (845kB) |
- URN to cite this document:
- urn:nbn:de:bvb:355-epub-255482
- DOI to cite this document:
- 10.5283/epub.25548
Alternative links to fulltext:DOI
Abstract
To avoid insider computer misuse, identity, and authorization data referring to the legitimate users of systems must be properly organized, constantly and systematically analyzed, and evaluated. In order to support this, structured and secure Identity Management is required. A comprehensive methodology supporting Identity Management within organizations has been developed, including gathering of ...

Owner only: item control page