![]() |
Volumn , Issue , 2012, Pages 125-128
|
Fog computing: Mitigating insider data theft attacks in the cloud
|
Author keywords
Decoys; Fog Computing; Insider Threat; User Behavior Profiling
|
Indexed keywords
ABNORMAL DATA;
BUSINESS INFORMATION;
CHALLENGE QUESTIONS;
CLOUD PROVIDERS;
DATA ACCESS;
DATA PROTECTION;
DATA THEFTS;
DECOYS;
INSIDER THREAT;
SECURITY CHALLENGES;
USER BEHAVIORS;
BEHAVIORAL RESEARCH;
COMPUTER CRIME;
CRIME;
PERSONAL COMPUTERS;
SECURITY OF DATA;
|
EID: 84864275237
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/SPW.2012.19 Document Type: Conference Paper |
Times cited : (201)
|
References (11)
|