| PDF - Published Version (470kB) |
- URN to cite this document:
- urn:nbn:de:bvb:355-epub-549246
- DOI to cite this document:
- 10.5283/epub.54924
Abstract
Nowadays, the use of identity and access management systems is the norm in large organizations. Therefore, great efforts are made in science and practice to ensure that these systems will cope with their tasks in the future. However, from a scientific point of view, an important part of the systems has been neglected so far: the user who uses the systems for ordering software or authorizations ...

Owner only: item control page

Download Statistics