@inproceedings{4db16f51e22347d3870e3470e936e54b,
title = "Access control requirements for preventing insider threats",
abstract = "Today the Intelligence Community (IC) has faced increasing challenges of insider threats. It is generally accepted that the cost of insider threats exceeds that of outsider threats. Although the currently available access control approaches have a great potential for preventing insider threats, there are still critical obstacles to be solved, especially in large-scale computing environments. In this paper we discuss those requirements with respect to scalability, granularity, and context-awareness. For each requirement we discussed related problems, techniques, and basic approaches to the corresponding countermeasures. Detailed solutions and implementations are not described in this paper.",
author = "Park, {Joon S.} and Joseph Giordano",
year = "2006",
doi = "10.1007/11760146_52",
language = "English (US)",
isbn = "3540344780",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "529--534",
booktitle = "Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings",
note = "IEEE International Conference on Intelligence and Security Informatics, ISI 2006 ; Conference date: 23-05-2006 Through 24-05-2006",
}