A

Access control

content-based, 478

manager, 399

model, 282283

and policy ontology modeling, 326

system, 408

Access control policies, 15, 16

attribute-based access control, 19

authorization-based access control policies, 1618

role-based access control, 1819

usage control, 19

Access Token List (AT-list), 283

Access Tokens (AT), 282

assignment, 283284

Access Token Tuples (ATT), 282

Accuracy-weighted classifier ensembles (AWEs), 343

Actual data, 357

ADABOOST. PL algorithms, 193

ADCi., see Aggregated dissimilarity count

“Added error”, 117

Administration policies, 20; see also Access control policies

Advanced CPT system, 382383, 384

Advanced Encryption Standard (AES), 331, 333, 336

Adversaries, 403

adversarial data miner, 400

Aerosol ...

Get Big Data Analytics with Applications in Insider Threat Detection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.