Login / Signup
Managing Insider Security Threats (MIST 2012 Volume 1).
Kouichi Sakurai
Dieter Gollmann
Published in:
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2012)
Keyphrases
</>
security threats
sensitive data
security issues
security mechanisms
key management
data storage
security risks
resource constrained
smart card
privacy protection
privacy preserving
data access
operating system
computer systems
access control
data processing
response time