Contents
1.4Applications of Stream Data Analytics for Insider Threat Detection
1.5Experimental BDMA and BDSP Systems
1.6Next Steps in BDMA and BDSP
Part ISupporting Technologies for BDMA and BDSP
Chapter 2Data Security and Privacy
2.2.1.1Authorization-Based Access Control Policies
2.2.1.2Role-Based Access Control
2.2.1.4Attribute-Based Access Control
2.2.3Identification and Authentication
Get Big Data Analytics with Applications in Insider Threat Detection now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.