Return to "Complex IT Environments: The Need For Transparent Access Management" cloud identity management2 Previous