Login / Signup
Applying role based access control and genetic algorithms to insider threat detection.
Ning Hu
Phillip G. Bradford
Jun Liu
Published in:
ACM Southeast Regional Conference (2006)
Keyphrases
</>
role based access control
access control
insider threat
security architecture
database