Učitavanje...

Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple...

Cijeli opis

Spremljeno u:
Bibliografski detalji
Izdano u:J Wirel Mob Netw Ubiquitous Comput Dependable Appl
Glavni autori: Mell, Peter, Shook, James, Harang, Richard, Gavrila, Serban
Format: Artigo
Jezik:Inglês
Izdano: 2017
Teme:
Online pristup:https://ncbi.nlm.nih.gov/pmc/articles/PMC5528852/
https://ncbi.nlm.nih.gov/pubmed/28758045
Oznake: Dodaj oznaku
Bez oznaka, Budi prvi tko označuje ovaj zapis!