| PDF (845kB) |
- URN zum Zitieren dieses Dokuments:
- urn:nbn:de:bvb:355-epub-255482
- DOI zum Zitieren dieses Dokuments:
- 10.5283/epub.25548
Alternative Links zum Volltext:DOI
Zusammenfassung
To avoid insider computer misuse, identity, and authorization data referring to the legitimate users of systems must be properly organized, constantly and systematically analyzed, and evaluated. In order to support this, structured and secure Identity Management is required. A comprehensive methodology supporting Identity Management within organizations has been developed, including gathering of ...
![plus plus](/style/images/plus.png)
Nur für Besitzer und Autoren: Kontrollseite des Eintrags