Towards an Access-Control Framework for Countering Insider Threats. / Crampton, J.; Huth, M.
Insider Threats in Cyber Security and Beyond. ed. / M. Bishop; D. Gollmann; J. Hunker; C. Probst. Springer, 2010.Research output: Chapter in Book/Report/Conference proceeding › Chapter
Original language | English |
---|---|
Title of host publication | Insider Threats in Cyber Security and Beyond |
Editors | M. Bishop, D. Gollmann, J. Hunker, C. Probst |
Publisher | Springer |
Publication status | Published - 2010 |
ID: 1274372