Rethinking the Prevailing Security Paradigm: Can User Empowerment with Traceability Reduce the Rate of Security Policy Circumvention?
Soohyun JeonAnat HovavJinyoung HanSteven AlterPublished in: Data Base (2018)
Keyphrases
- security policies
- access control
- network security
- security requirements
- security management
- ubiquitous computing environments
- security concerns
- distributed systems
- security measures
- security architecture
- network management
- home network
- access control systems
- multilevel secure
- cyber attacks
- access control policies
- access control mechanism
- access rights
- computer security
- end users
- event logs
- data security
- data mining
- intrusion detection system
- ambient intelligence
- software engineering
- information systems