Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
116 | Debin Liu, XiaoFeng Wang 0001, L. Jean Camp |
Mitigating Inadvertent Insider Threats with Incentives. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Incentive Engineering, Game Theory, Insider Threat, Human Subject |
93 | Bert Valenzuela |
The insider: the web site that brought Mesa's williams campus together. |
SIGUCCS |
2003 |
DBLP DOI BibTeX RDF |
Arizona State University, IIS, Williams Campus, active desktop, insider, collaboration, database, web, participation, intranet, channel, ASP, newspaper |
82 | Chik How Tan |
Signcryption Scheme in Multi-user Setting without Random Oracles. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
decisional bilinear Diffie-Hellman assumption, Signcryption |
73 | Robert Willison, Mikko T. Siponen |
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Kevin S. Killourhy, Roy A. Maxion |
Toward Realistic and Artifact-Free Insider-Threat Data. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
73 | Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
Security Policies to Mitigate Insider Threat in the Document Control Domain. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
70 | William R. Claycomb, Dongwan Shin |
Detecting insider activity using enhanced directory virtualization. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
70 | Dawn M. Cappelli |
Using empirical insider threat case data to design a mitigation strategy. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
70 | Suraj Nellikar, David M. Nicol, Jai J. Choi |
Role-based differentiation for insider detection algorithms. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
69 | Steve Donoho |
Early detection of insider trading in option markets. |
KDD |
2004 |
DBLP DOI BibTeX RDF |
insider trading, data mining, fraud detection, behavior detection |
61 | Hui Wang 0071, Heli Xu, Bibo Lu, Zihao Shen |
Research on Security Architecture for Defending Insider Threat. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Chik How Tan |
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo 0001, Shambhu J. Upadhyaya |
Towards a Theory of Insider Threat Assessment. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin |
Developing an Insider Threat Model Using Functional Decomposition. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
58 | L. Jean Camp |
Hardening the Network from the Friend Within. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
58 | Dick Brackney, Terrance Goan, Allen Ott, Lockheed Martin |
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
58 | Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad, David F. Andersen, Thomas R. Stewart |
A behavioral theory of insider-threat risks: A system dynamics approach. |
ACM Trans. Model. Comput. Simul. |
2008 |
DBLP DOI BibTeX RDF |
behavioral theory, judgment and decision making, signal detection theory, system dynamics modeling, risk, security modeling, Insider threat, policy analysis |
58 | Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo 0001, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew |
Insider Threat Analysis Using Information-Centric Modeling. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
capability acquisition graphs, key challenge graphs, Insider threats |
58 | Daniel A. Ray, Phillip G. Bradford |
An Integrated System for Insider Threat Detection. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
proactive forensics, anomaly detection, Insider threats |
58 | Michael D. Carroll |
Information security: examining and managing the insider threat. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
insider threat |
58 | Jonathan Katz, Ji Sun Shin |
Modeling insider attacks on group key-exchange protocols. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
universal composability, group key exchange, insider attacks |
58 | Yang Yu, Tzi-cker Chiueh |
Display-only file server: a solution against information theft due to insider attack. |
Digital Rights Management Workshop |
2004 |
DBLP DOI BibTeX RDF |
information theft, access, digital rights management, insider attack |
56 | Ehab Al-Shaer, Brent Lagesse, Craig A. Shue (eds.) |
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010 |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
56 | George Magklaras, Steven Furnell |
Insider Threat Specification as a Threat Mitigation Technique. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop |
Aspects of Insider Threats. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Lizzie Coles-Kemp, Marianthi Theoharidou |
Insider Threat and Information Security Management. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen |
A Risk Management Approach to the "Insider Threat". |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Peter G. Neumann |
Combatting Insider Threats. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Brian M. Bowen, Malek Ben Salem 0001, Angelos D. Keromytis, Salvatore J. Stolfo |
Monitoring Technologies for Mitigating Insider Threats. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Frank L. Greitzer, Deborah A. Frincke |
Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Jason Crampton, Michael Huth 0001 |
Towards an Access-Control Framework for Countering Insider Threats. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
56 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
56 | John Tuttle, Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine |
Reverse engineering for mobile systems forensics with Ares. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici |
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Emil Stefanov, Mikhail Atallah |
Duress detection for authentication attacks against multiple administrators. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Ruj Akavipat, Apurv Dhadphale, Apu Kapadia, Matthew Wright 0001 |
ReDS: reputation for directory services in P2P systems. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici |
Detecting data misuse by applying context-based data linkage. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
56 | Sara Sinclair, Sean W. Smith |
Preventative Directions For Insider Threat Mitigation Via Access Control. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Virgil D. Gligor, C. Sekar Chandersekaran |
Surviving Insider Attacks: A Call for System Experiments. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Charles P. Pfleeger |
Reflections on the Insider Threat. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Jeffrey Hunker |
Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Steven M. Bellovin |
The Insider Attack Problem Nature and Scope. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Malek Ben Salem 0001, Shlomo Hershkop, Salvatore J. Stolfo |
A Survey of Insider Attack Detection Research. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Michael McCormick |
Data Theft: A Prototypical Insider Threat. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Ravishankar K. Iyer, Paul Dabrowski, Nithin Nakka, Zbigniew Kalbarczyk |
Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Andrew P. Moore, Dawn M. Cappelli, Randall F. Trzeciak |
The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann |
08302 Summary - Countering Insider Threats. |
Countering Insider Threats |
2008 |
DBLP BibTeX RDF |
|
56 | Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
08302 Abstracts Collection - Countering Insider Threats. |
Countering Insider Threats |
2008 |
DBLP BibTeX RDF |
|
49 | Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
Discovering Application-Level Insider Attacks Using Symbolic Execution. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Qussai Yaseen, Brajendra Panda |
Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Qutaibah Althebyan, Brajendra Panda |
A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Eugene Santos Jr., Hien Nguyen 0001, Fei Yu 0002, Keum Joo Kim, Deqing Li, John Thomas Wilkinson, Adam Olson, Russell Jacob |
Intent-Driven Insider Threat Detection in Intelligence Analyses. |
IAT |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Frederic Stumpf, Patrick Röder, Claudia Eckert 0001 |
An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Joon S. Park, Joseph Giordano |
Role-based profile analysis for scalable and accurate insider-anomaly detection. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Robert S. Garfinkel, Ram D. Gopal, Daniel O. Rice |
New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
49 | James S. Okolica, Gilbert L. Peterson, Robert F. Mills |
Using Author Topic to Detect Insider Threats from Email Traffic. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Joon S. Park, Joseph Giordano |
Access Control Requirements for Preventing Insider Threats. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Brian Vetter, Feiyi Wang, Shyhtsun Felix Wu |
An experimental study of insider attacks for OSPF routing protocol. |
ICNP |
1997 |
DBLP DOI BibTeX RDF |
|
47 | Wei Yu 0003, Zhu Ji, K. J. Ray Liu |
Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach |
Analysis of an Electronic Voting System. |
S&P |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Dattatraya S. Bhilare, Ashwini K. Ramani, Sanjay K. Tanwani |
Protecting intellectual property and sensitive information in academic campuses from trusted insiders: leveraging active directory. |
SIGUCCS |
2009 |
DBLP DOI BibTeX RDF |
audit automation, real time action, insider threat, active directory, user identification |
43 | Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin |
Database Intrusion Detection Using Role Profiling with Role Hierarchy. |
Secure Data Management |
2009 |
DBLP DOI BibTeX RDF |
Role profiling, Intrusion detection, RBAC, Database security, Insider threats |
43 | Dijiang Huang, Deep Medhi |
Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. |
ACM Trans. Sens. Networks |
2007 |
DBLP DOI BibTeX RDF |
node fabrication, selective node capture, Sensor, insider attack |
43 | Kevin Borders, Xin Zhao 0016, Atul Prakash 0001 |
Securing sensitive content in a view-only file system. |
Digital Rights Management Workshop |
2006 |
DBLP DOI BibTeX RDF |
insider abuse, virtual machines, file systems, digital rights management, information leakage |
41 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) |
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010 |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
41 | Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann |
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Ulrich Flegel, Julien Vayssière, Gunter Bitz |
A State of the Art Survey of Fraud Detection Technology. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) |
Countering Insider Threats, 20.07. - 25.07.2008 |
Countering Insider Threats |
2008 |
DBLP BibTeX RDF |
|
41 | Ravi Sahita, Uday R. Savagaonkar |
Towards a Virtualization-enabled Framework for Information Traceability (VFIT). |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Angelos D. Keromytis |
Hard Problems and Research Challenges Concluding Remarks. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Angelos D. Keromytis |
Hard Problems and Research Challenges. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Kevin S. Killourhy, Roy A. Maxion |
Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Ulrich Flegel, Julien Vayssière, Gunter Bitz |
Fraud Detection from a Business Perspective: Future Directions and Challenges. |
Countering Insider Threats |
2008 |
DBLP BibTeX RDF |
|
41 | Ulrich Flegel, Florian Kerschbaum, Richard Wacker |
Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality. |
Countering Insider Threats |
2008 |
DBLP BibTeX RDF |
|
38 | Yu Zhang 0034, Xingshe Zhou 0001, Yee Wei Law, Marimuthu Palaniswami |
Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull |
Combating the Insider Cyber Threat. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Imad M. Abbadi, Muntaha Alawneh |
Preventing Insider Information Leakage for Enterprises. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Chik How Tan |
Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Signcryption KEM scheme, Signcryption Tag-KEM scheme |
38 | Nan Zhang 0004, Wei Yu 0002, Xinwen Fu, Sajal K. Das 0001 |
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. |
ICPADS |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Sanmay Das |
Learning to trade with insider information. |
ICEC |
2007 |
DBLP DOI BibTeX RDF |
computational finance, market microstructure |
38 | Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park |
Countering Insider Threats in Personal Devices. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad, David F. Andersen |
Modeling the emergence of insider threat vulnerabilities. |
WSC |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Christian W. Probst, René Rydhof Hansen, Flemming Nielson |
Where Can an Insider Attack? |
Formal Aspects in Security and Trust |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Alexander W. Dent |
Hybrid Signcryption Schemes with Insider Security. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Dieter Gollmann |
Insider Fraud (Position Paper). |
Security Protocols Workshop |
1998 |
DBLP DOI BibTeX RDF |
|
35 | Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt |
Efficient Constructions of Signcryption Schemes and Signcryption Composability. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
multi-user security, signcryption, generic construction |
34 | Yair Amir |
The insider threat in scalable distributed systems: algorithms, metrics and gaps. |
STC |
2007 |
DBLP DOI BibTeX RDF |
distributed system, insider threat |
32 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Insider Attacks, Key Compromise Impersonation |
32 | Xuejun Zhuo, Jianguo Hao, Duo Liu, Yiqi Dai |
Removal of misbehaving insiders in anonymous VANETs. |
MSWiM |
2009 |
DBLP DOI BibTeX RDF |
misbehaving insider, anonymity, VANET, revocation |
32 | Aaron Walters, David Zage, Cristina Nita-Rotaru |
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
security, adaptivity, overlay networks, insider attacks |
32 | Manuel Barbosa, Pooya Farshim |
Certificateless signcryption. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
insider security, signcryption, certificateless |
32 | Zhiyao Liang, Rakesh M. Verma |
Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
insider, authentication, formal method, cryptographic protocol, undecidability, secrecy |
32 | Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
Inferring Sources of Leaks in Document Management Systems. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
information leaks, insider threat, Document management system |
32 | Marcus A. Maloof, Gregory D. Stephens |
elicit: A System for Detecting Insiders Who Violate Need-to-Know. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
anomaly detection, insider threat, misuse |
32 | C. Corzo, F. Corzo S., Ning Zhang 0001, Andy Carpenter |
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
financial fraud, Data integrity, Security architecture, Insider threats |
32 | Wei-Chi Ku, Shuai-Min Chen |
Cryptanalysis of a flexible remote user authentication scheme using smart cards. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
privileged insider's attack, reparability, user eviction, authentication, password |
32 | Nazli Goharian, Ling Ma 0001 |
On off-topic access detection in information systems. |
CIKM |
2005 |
DBLP DOI BibTeX RDF |
security, detection, insider threat, unauthorized access, misuse |
32 | Simon D. Byers, Lorrie Faith Cranor, David P. Kormann, Patrick D. McDaniel, Eric Cronin |
Analysis of security vulnerabilities in the movie production and distribution process. |
Digital Rights Management Workshop |
2003 |
DBLP DOI BibTeX RDF |
multimedia, policy, digital rights management, file sharing, physical security, insider attacks |