Login / Signup
Research on Security Architecture for Defending Insider Threat.
Hui Wang
Heli Xu
Bibo Lu
Zihao Shen
Published in:
IAS (2009)
Keyphrases
</>
security architecture
insider threat
access control
security model
security policies
security mechanisms
simulation platform
data integrity
intrusion detection system
database
data mining
data management
intrusion detection
electronic commerce
security requirements
data protection