Sciweavers

76 search results - page 16 / 16
» Modelling Dynamic Access Control Policies for Web-Based Coll...
Sort
View
ISI
2004
Springer
13 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho