Contents
1.4Applications of Stream Data Analytics for Insider Threat Detection
1.5Experimental BDMA and BDSP Systems
1.6Next Steps in BDMA and BDSP
Part ISupporting Technologies for BDMA and BDSP
Chapter 2Data Security and Privacy
2.2.1.1Authorization-Based Access Control Policies
2.2.1.2Role-Based Access Control
2.2.1.4Attribute-Based Access Control
2.2.3Identification and Authentication
Get Big Data Analytics with Applications in Insider Threat Detection now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.