Also, Star
Student Project with cloud computing initiatives, the scope of insider
threats, a major source of data theft and privacy breaches, is no longer
limited to the organizational perimeter. Revealing sensitive information in identity
attributes to proxies that grant them authorization to access the data on
behalf of clients is not an attractive solution.
organizational perimeter.