Building A System For Insider Security.
Felicia DuranStephen H. ConradGregory N. ConradDavid P. DugganEdward Bruce HeldPublished in: IEEE Secur. Priv. (2009)
Keyphrases
- sensitive data
- intrusion detection
- security requirements
- security issues
- security threats
- security problems
- information security
- network security
- real time
- security policies
- data sets
- statistical databases
- access control
- risk analysis
- key management
- authentication protocol
- database
- security management
- security vulnerabilities