Login / Signup

Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders.

Debin LiuL. Jean CampXiaoFeng WangLusha Wang
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2010)
Keyphrases
  • decision making
  • risk management
  • effectively manage
  • search algorithm
  • risk assessment
  • data sets
  • image segmentation
  • image sequences
  • evolutionary algorithm
  • risk factors
  • risk analysis