A carregar...
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple...
Na minha lista:
Publicado no: | J Wirel Mob Netw Ubiquitous Comput Dependable Appl |
---|---|
Main Authors: | , , , |
Formato: | Artigo |
Idioma: | Inglês |
Publicado em: |
2017
|
Assuntos: | |
Acesso em linha: | https://ncbi.nlm.nih.gov/pmc/articles/PMC5528852/ https://ncbi.nlm.nih.gov/pubmed/28758045 |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|