메뉴 건너뛰기




Volumn 39, Issue , 2008, Pages 165-193

Preventative Directions For Insider Threat Mitigation Via Access Control

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84875548700     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-77322-3_10     Document Type: Article
Times cited : (36)

References (25)
  • 1
    • 84882771957 scopus 로고    scopus 로고
    • Insurance: Medicare and Medicaid
    • American Dental Association
    • American Dental Association. "Insurance: Medicare and Medicaid," ADA Official Website. http://www.ada.org/public/manage/insurance/medicare.asp.
    • ADA Official Website
  • 3
    • 84982899264 scopus 로고    scopus 로고
    • The Role of Trust Management in Distributed Systems
    • Springer-Verlag LNCS
    • Blaze, M; Feigenbaum, J.; Ioannidis, J.; and Keromytis, A. "The Role of Trust Management in Distributed Systems." Secure Internet Programming. Springer-Verlag LNCS 1603, pp 185-210. 1999.
    • (1999) Secure Internet Programming , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 5
    • 84855202936 scopus 로고    scopus 로고
    • British Broadcasting Corporation, BBC News, UK Edition, April 20
    • British Broadcasting Corporation. "Passwords Revealed by Sweet Deal." BBC News, UK Edition, April 20, 2004. http://news.bbc.co.uk/1/hi/technology/3639679.stm.
    • (2004) Passwords Revealed By Sweet Deal
  • 6
    • 0027549942 scopus 로고    scopus 로고
    • Adoption and Abandonment of Matrix Management Programs: Effects on Organizational Characteristics and Inter-organizational Networks
    • Burns, L. R. and Wholey, D. R. "Adoption and Abandonment of Matrix Management Programs: Effects on Organizational Characteristics and Inter-organizational Networks." Academy of Management Journal, Vol. 36, 1, 106-139.
    • Academy of Management Journal , vol.36 , pp. 106-139
    • Burns, L.R.1    Wholey, D.R.2
  • 9
    • 0037362986 scopus 로고    scopus 로고
    • Role-Based Access Control with X.509 Attribute Certificates
    • March-April
    • Chadwick, D.; Otenko, A.; and Ball, E. "Role-Based Access Control with X.509 Attribute Certificates." IEEE Internet Computing. March-April 2003.
    • (2003) IEEE Internet Computing
    • Chadwick, D.1    Otenko, A.2    Ball, E.3
  • 18
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • September
    • Neuman, B. C. and Ts'O, T. "Kerberos: An Authentication Service for Computer Networks." IEEE Communications,. 32(9):33-38. September 1994
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'O, T.2
  • 22
    • 34250012541 scopus 로고    scopus 로고
    • Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems
    • May/June
    • Sasse, M.A. "Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems." IEEE Security and Privacy. 5(3): 78-81. May/June 2007.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 78-81
    • Sasse, M.A.1
  • 23
    • 18044373726 scopus 로고    scopus 로고
    • Probing End-User IT Security Practices---via Homework
    • November
    • Smith, S. W. "Probing End-User IT Security Practices---via Homework." The Educause Quarterly. 24 (4): 68-71. November 2004.
    • (2004) The Educause Quarterly , vol.24 , Issue.4 , pp. 68-71
    • Smith, S.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.