메뉴 건너뛰기




Volumn , Issue , 2012, Pages 857-862

Insider attacks in cloud computing

Author keywords

Cloud Computing; Cloud Computing Security; Insider Attacks; Insider Threat; Malicious Insider

Indexed keywords

AMOUNT OF INFORMATION; COMPUTING ECOSYSTEMS; COMPUTING SECURITY; INSIDER ATTACK; INSIDER THREAT; MALICIOUS INSIDERS; RAPID GROWTH;

EID: 84868152765     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2012.188     Document Type: Conference Paper
Times cited : (96)

References (24)
  • 1
    • 84855919430 scopus 로고    scopus 로고
    • International Data Corporation (IDC), June
    • International Data Corporation (IDC), "The 2011 digital universe: Extracting value from chaos," Online, June 2011, http://www.emc.com/ collateral/demos/microsites/emc-digital-universe-2011/index.htm.
    • (2011) "The 2011 Digital Universe: Extracting Value from Chaos," Online
  • 2
    • 84868097776 scopus 로고    scopus 로고
    • 10 Valid reasons to choose cloud hosting for your business
    • Online, 14 February
    • Ants Magazine, "10 valid reasons to choose cloud hosting for your business," Online, 14 February 2012, http://www.antsmagazine.com/articles/ 10-valid-reasons-to-choose-cloud-hosting-for-your-business.
    • (2012) Ants Magazine
  • 7
    • 33644904044 scopus 로고    scopus 로고
    • The role of behavioral research and profiling in malicious cyber insider investigations
    • [Online]. Available
    • D. Eric and Shaw, "The role of behavioral research and profiling in malicious cyber insider investigations," Digital Investigation, vol. 3, no. 1, pp. 20-31, 2006. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S1742287606000090
    • (2006) Digital Investigation , vol.3 , Issue.1 , pp. 20-31
    • Eric, D.1    Shaw2
  • 8
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • [Online]. Available
    • E. Eugene and Schultz, "A framework for understanding and predicting insider attacks," Computers and Security, vol. 21, no. 6, pp. 526-531, 2002. [Online]. Available: http://www.sciencedirect.com/science/article/pii/ S016740480201009X
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Eugene, E.1    Schultz2
  • 14
    • 84975527458 scopus 로고    scopus 로고
    • 12, March Last Accessed 23 August, 2011
    • S. Nicholas J. Percoco, "Data exfiltration: How data gets out," Online, 12, March 2010, http://www.networksunlimited.com/site/Portals/0/Data\ %20Exfiltration\%20How\%20Data\%20Gets\%20Out.pdf Last Accessed 23 August, 2011.
    • (2010) "Data Exfiltration: How Data Gets Out," Online
    • Nicholas, S.1    Percoco, J.2
  • 17
    • 38949094508 scopus 로고    scopus 로고
    • Taming virtualization
    • Jan.-Feb.
    • M. Carbone, W. Lee, and D. Zamboni, "Taming virtualization," Security Privacy, IEEE, vol. 6, no. 1, pp. 65-67, Jan.-Feb. 2008.
    • (2008) Security Privacy, IEEE , vol.6 , Issue.1 , pp. 65-67
    • Carbone, M.1    Lee, W.2    Zamboni, D.3
  • 18
  • 23
    • 84856897107 scopus 로고    scopus 로고
    • Cloud computing: Challenges and future directions
    • K. Choo, "Cloud computing: challenges and future directions," Trends & issues in crime and criminal justice, no. 400, pp. 381-400, 2010.
    • (2010) Trends & Issues in Crime and Criminal Justice , Issue.400 , pp. 381-400
    • Choo, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.