Login / Signup
Security Policies to Mitigate Insider Threat in the Document Control Domain.
Suranjan Pramanik
Vidyaraman Sankaranarayanan
Shambhu J. Upadhyaya
Published in:
ACSAC (2004)
Keyphrases
</>
security policies
security architecture
insider threat
access control
network security
distributed systems
security requirements
control system
network management
access control systems
email
database
real time
data sets
data leakage prevention