File sharing has become an indispensable part of our daily lives. Some of the shared files are sensitive, thus, their confidentially, integrity and availability should be protected. This paper investigates the protection re-quirements and the activities of file sharing from the perspective of the insider threat problem. It addresses three fundamental questions to the design of a protec-tion mechanism against insider misuses: who is the insider, what are the insider misuses, and how the ac-tivity of file sharing can be performed. This paper proposes a new approach for classifying the insider threat problem into different categories and then fo-cuses on one category that is related to file sharing. It characterises the protection required by ...
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are...
Ever since people first began to communicate, they have implemented technologies to support the exch...
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a ...
File sharing has become an indispensable part of our daily lives. Some of the shared files are sensi...
File sharing has become an indispensable part of our daily lives. The shared files might be sensitiv...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
One of the most fundamental problems in computer security is protecting sensitive digital informatio...
As data represent a key asset for today\u27s organizations, the problem of how to protect this data ...
© 2015 Chinese Automation and Computing Society in the UK - CACS. The main concern of most security ...
Insider threat is a significant problem for both governmental and private organizations. Individuals...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
Prior work on insider threat classification has adopted a range of definitions, constructs, and term...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
This paper is aimed at discussing on how the so called privileged users place the important data at ...
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are...
Ever since people first began to communicate, they have implemented technologies to support the exch...
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a ...
File sharing has become an indispensable part of our daily lives. Some of the shared files are sensi...
File sharing has become an indispensable part of our daily lives. The shared files might be sensitiv...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharin...
One of the most fundamental problems in computer security is protecting sensitive digital informatio...
As data represent a key asset for today\u27s organizations, the problem of how to protect this data ...
© 2015 Chinese Automation and Computing Society in the UK - CACS. The main concern of most security ...
Insider threat is a significant problem for both governmental and private organizations. Individuals...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
Prior work on insider threat classification has adopted a range of definitions, constructs, and term...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
This paper is aimed at discussing on how the so called privileged users place the important data at ...
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are...
Ever since people first began to communicate, they have implemented technologies to support the exch...
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a ...