Using identity credential usage logs to detect anomalous service accesses

Daisuke Mashima, Mustaque Ahamad. Using identity credential usage logs to detect anomalous service accesses. In Elisa Bertino, Thomas Groß, Kenji Takahashi, editors, Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009l. pages 73-80, ACM, 2009. [doi]

Abstract

Abstract is missing.