Introduction Insiders and the Insider Threat Trust and Trustworthi- ness Access Control and Trustwor- thiness
Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?
Jason Crampton1 Michael Huth2
1Information Security Group
Royal Holloway, University of London
2Department of Computing