Abstract
We develop a formal nondeterministic game model for secure team composition to counter cyber-espionage and to protect organizational secrets against an attacker who tries to sidestep technical securitymechanisms by offering a bribe to a project team member. The game captures the adversarial interaction between the attacker and the project manager who has a secret she wants to protect but must share with a team of individuals selected from within her organization. Our interdisciplinary work is important in the face of the multipronged approaches utilized by well-motivated attackers to circumvent the fortifications of otherwise well-defended targets.
| Original language | English (US) |
|---|---|
| Article number | 2663499 |
| Journal | ACM Transactions on Internet Technology |
| Volume | 14 |
| Issue number | 2-3 |
| DOIs | |
| State | Published - Oct 1 2014 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
Fingerprint
Dive into the research topics of 'Secure team composition to thwart insider threats and cyber-espionage'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver