Equitable Security: Optimizing Distribution of Nudges and Resources.
Elissa M. RedmilesJohn P. DickersonKrishna P. GummadiMichelle L. MazurekPublished in: CCS (2018)
Keyphrases
- access control
- information security
- limited resources
- security issues
- resource management
- intrusion detection
- resource allocation
- security policies
- network security
- resource constraints
- information assurance
- computer security
- computing resources
- spatial distribution
- statistical databases
- web resources
- random variables
- probability distribution
- security requirements
- metadata
- security systems
- security problems
- data mining