共 24 条
[1]
Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
[2]
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[4]
Cappelli D., 2006, Common sense guide to prevention and detection of insider threats [PDF document]
[5]
Choi C., 2012, J Internet Serv Inf Secur, V2, P54
[6]
Corradi A., 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference. COMPSAC 2004, P444, DOI 10.1109/CMPSAC.2004.1342877
[7]
Fakushima K., 2011, J INTERNET SERVICES, V1, P4
[8]
Ferraiolo DF, 2003, ARTECH H COMP SEC LI
[9]
Finin T, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P73
[10]
Han WL, 2005, Fifth International Conference on Computer and Information Technology - Proceedings, P757