Načítá se...

Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:J Wirel Mob Netw Ubiquitous Comput Dependable Appl
Hlavní autoři: Mell, Peter, Shook, James, Harang, Richard, Gavrila, Serban
Médium: Artigo
Jazyk:Inglês
Vydáno: 2017
Témata:
On-line přístup:https://ncbi.nlm.nih.gov/pmc/articles/PMC5528852/
https://ncbi.nlm.nih.gov/pubmed/28758045
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!