New Search

If you are not happy with the results below please do another search

1 search result for:

1

What contemporary identity management must fulfil

With increasing data protection requirements, it is becoming more and more important to take the data sovereignty of users into account. Therefore, user-centric approaches are being discussed in identity management that ensure user privacy in addition to overall system security. An identity holder should disclose as little information as possible to an auditing service and, […]