Login / Signup

Addressing insider threat using "where you are" as fourth factor authentication.

Sung ChoiDavid Zage
Published in: ICCST (2012)
Keyphrases
  • insider threat
  • factor authentication
  • email
  • security architecture
  • data streams
  • databases
  • database
  • mobile terminals