1. Introduction
As our communication infrastructure has become more ubiquitous, we have shifted the implementation of our business processes increasingly to this information infrastructure. Things that in the past required a phone call are now available over email, chat, or solid media. Documents have moved from filing cabinets to file shares, customer rolodexes to databases, and accounting books to spreadsheets. A filing cabinet, however, is often much less accessible than a networked server. The network security industry has therefore been profiting handsomely from the sale of access control and security solutions, which work very well[2] as long as the insider is trustworthy.