Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
456837 | Infosecurity | 2007 | 4 Pages |
Abstract
Identity and access management are becoming more important, and with user accounts proliferating, it may be time to start joining things up. Cath Everett reports
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Cath Everett,