Author of the publication

Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders.

, , , and . JoWUA, 1 (1): 29-45 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy data envelopment analysis models with assurance regions: A note., , , , and . Expert Syst. Appl., 39 (2): 2227-2231 (2012)Beyond Risk-Based Access Control: Towards Incentive-Based Access Control., , , and . Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, page 102-112. Springer, (2011)Tensor-Enabled Communication-Efficient and Trustworthy Federated Learning for Heterogeneous Intelligent Space-Air-Ground-Integrated IoT., , , and . IEEE Internet Things J., 10 (23): 20285-20296 (December 2023)Security Risk Management Using Incentives., , , and . IEEE Secur. Priv., 9 (6): 20-28 (2011)Combining convolutional neural network and self-adaptive algorithm to defeat synthetic multi-digit text-based CAPTCHA., , , , , and . ICIT, page 980-985. IEEE, (2017)Plug-and-Play Multi-class Lane Detection Module., , , , and . AMC-SME, page 19-23. ACM, (2023)Game Cross Efficiency for Systems with Two-Stage Structures., , , , and . J. Appl. Math., (2014)Phishing IQ Tests Measure Fear, Not Ability., , , , and . Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, page 362-366. Springer, (2007)An Efficient Tensor-Based Transformer for Industrial Internet of Things., , , , and . IEEE Trans. Netw. Sci. Eng., 11 (3): 2574-2585 (May 2024)Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders., , , and . JoWUA, 1 (1): 29-45 (2010)