Digital Library


Search: "[ keyword: IM-ACM ]" (2)
    An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach
    Jung-Ho Eom, Vol. 21, No. 3, pp. 67-74, Jun. 2011
    10.13089/JKIISC.2011.21.3.67
    Keywords: IM-ACM, Insider threat, access control

    An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider
    Jung-Ho Eom, Seon-Ho Park, Tai-M. Chung, Vol. 20, No. 5, pp. 59-68, Oct. 2010
    10.13089/JKIISC.2010.20.5.59
    Keywords: IM-ACM, Insider threat, access control