Login / Signup
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats.
Joon S. Park
Shuyuan Mary Ho
Published in:
ISI (2004)
Keyphrases
</>
insider threat
monitoring system
access control
real time
computational properties
information security
early warning
database
decision support
expressive power
data acquisition
countermeasures