A
Access control
content-based, 478
manager, 399
and policy ontology modeling, 326
system, 408
Access control policies, 15, 16
attribute-based access control, 19
authorization-based access control policies, 16–18
role-based access control, 18–19
usage control, 19
Access Token List (AT-list), 283
Access Tokens (AT), 282
Access Token Tuples (ATT), 282
Accuracy-weighted classifier ensembles (AWEs), 343
Actual data, 357
ADABOOST. PL algorithms, 193
ADCi., see Aggregated dissimilarity count
“Added error”, 117
Administration policies, 20; see also Access control policies
Advanced CPT system, 382–383, 384
Advanced Encryption Standard (AES), 331, 333, 336
Adversaries, 403
adversarial data miner, 400
Aerosol ...
Get Big Data Analytics with Applications in Insider Threat Detection now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.