Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Safety, Risk, Reliability and Quality
Reference71 articles.
1. Accenture (2022) Elevating the cybersecurity discussion: why CEOs need to get more involved in securing the business. [Online]. Available: https://www.accenture.com/content/dam/accenture/final/acom-migration/custom/us-en/invest-cyber-resilience/pdf/AccentureElevating-the-Cybersecurity-Discussion.pdf#zoom=40
2. Aftab MU, Qin Z, Quadri SF, Zakria Javed A, Nie X (2019) Role-based ABAC model for implementing least privileges. In: Proceedings of the 2019 8th international conference on software and computer applications. pp. 467–471
3. Agrafiotis I, Nurse JR, Goldsmith M, Creese S, Upton D (2018) A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. J Cybersecur 4(1):tyy006
4. Ahng J, Sandhu R (2000) Role-based authorization constraints specification. ACM Trans Inf Syst Secur 3(4):207–226
5. Aivazpour Z, Valecha R, Chakraborty R (2018) The impact of data breach severity on post-breach online shopping intention
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献