Login / Signup
Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders.
Debin Liu
L. Jean Camp
XiaoFeng Wang
Lusha Wang
Published in:
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2010)
Keyphrases
</>
decision making
risk management
effectively manage
search algorithm
risk assessment
data sets
image segmentation
image sequences
evolutionary algorithm
risk factors
risk analysis