메뉴 건너뛰기




Volumn , Issue , 2012, Pages 125-128

Fog computing: Mitigating insider data theft attacks in the cloud

Author keywords

Decoys; Fog Computing; Insider Threat; User Behavior Profiling

Indexed keywords

ABNORMAL DATA; BUSINESS INFORMATION; CHALLENGE QUESTIONS; CLOUD PROVIDERS; DATA ACCESS; DATA PROTECTION; DATA THEFTS; DECOYS; INSIDER THREAT; SECURITY CHALLENGES; USER BEHAVIORS;

EID: 84864275237     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SPW.2012.19     Document Type: Conference Paper
Times cited : (201)

References (11)
  • 1
    • 79952065844 scopus 로고    scopus 로고
    • March [Online]. Available
    • Cloud Security Alliance, "Top Threat to Cloud Computing V1.0," March 2010. [Online]. Available: https://cloudsecurityalliance.org/topthreats/ csathreats.v1.0.pdf
    • (2010) Top Threat to Cloud Computing V1.0
  • 6
    • 84864210455 scopus 로고    scopus 로고
    • Lucy in the sky without diamonds: Stealing confidential data in the cloud
    • Proceedings of the First International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments, Hong Kong, ser. June
    • F. Rocha and M. Correia, "Lucy in the sky without diamonds: Stealing confidential data in the cloud," in Proceedings of the First International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments, Hong Kong, ser. DCDV '11, June 2011.
    • (2011) DCDV '11
    • Rocha, F.1    Correia, M.2
  • 7
    • 84969931080 scopus 로고    scopus 로고
    • On the impossibility of cryptography alone for privacy-preserving cloud computing
    • Proceedings of the 5th USENIX conference on Hot topics in security, ser. Berkeley, CA, USA: USENIX Association, [Online]. Available
    • M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing," in Proceedings of the 5th USENIX conference on Hot topics in security, ser. HotSec'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-8. [Online]. Available: http://dl.acm.org/ citation.cfm?id=1924931.1924934
    • (2010) HotSec'10 , pp. 1-8
    • Van Dijk, M.1    Juels, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.