In this chapter, application scenarios for identity management systems will be discussed in order to identify requirements which should be or already are considered in the design and implementation of privacy-enhancing technologies (PETs). © 2011 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Pötzsch, S., Borcea-Pfitzmann, K., Hansen, M., Liesebach, K., Pfitzmann, A., & Steinbrecher, S. (2011). Requirements for identity management from the perspective of multilateral interactions. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6545, 609–626. https://doi.org/10.1007/978-3-642-19050-6_22
Mendeley helps you to discover research relevant for your work.