Towards an Access-Control Framework for Countering Insider Threats

J. Crampton, M. Huth

Research output: Chapter in Book/Report/Conference proceedingChapter

Original languageEnglish
Title of host publicationInsider Threats in Cyber Security and Beyond
EditorsM. Bishop, D. Gollmann, J. Hunker, C. Probst
PublisherSpringer
Publication statusPublished - 2010

Cite this