Login / Signup

Applying role based access control and genetic algorithms to insider threat detection.

Ning HuPhillip G. BradfordJun Liu
Published in: ACM Southeast Regional Conference (2006)
Keyphrases
  • role based access control
  • access control
  • insider threat
  • security architecture
  • database