-
1
-
-
84870830353
-
-
ser. SEI Series in Software Engineering, Addison-Wesley Professional
-
D. Cappelli, A. Moore, and R. Trzeciak, The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud), ser. SEI Series in Software Engineering. Addison-Wesley Professional, 2012.
-
(2012)
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
-
-
Cappelli, D.1
Moore, A.2
Trzeciak, R.3
-
2
-
-
79952065844
-
Top threats to cloud computing, version 1.0
-
March, [Online], Available
-
C. S. Alliance, "Top threats to cloud computing, version 1.0, " Cloud Security Alliance, Tech. Rep., March 2010. [Online]. Available: http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.
-
(2010)
Cloud Security Alliance, Tech. Rep.
-
-
Alliance, C.S.1
-
3
-
-
84870821223
-
Star-205 cloud security alliance - top threats to cloud computing v2.0.pdf
-
[Online], Available
-
C. S. Alliance, "Star-205 cloud security alliance - top threats to cloud computing v2.0.pdf, " in RSA Conference Europe, 2010. [Online]. Available: http://365.rsaconference.com/docs/DOC-2819.
-
(2010)
RSA Conference Europe
-
-
Alliance, C.S.1
-
4
-
-
84976699318
-
The byzantine generals problem
-
Jul. [Online], Available
-
L. Lamport, R. Shostak, and M. Pease, "The byzantine generals problem, " ACM Trans. Program. Lang. Syst., vol. 4, no. 3, pp. 382-401, Jul. 1982. [Online]. Available: http://doi.acm.org/10.1145/357172.357176.
-
(1982)
ACM Trans. Program. Lang. Syst.
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
5
-
-
84855181760
-
A preliminary model of insider theft of intellectual property
-
A. P. Moore, D. M. Capelli, T. C. Caron, E. Shaw, D. Spooner, and R. F. Trzeciak, "A preliminary model of insider theft of intellectual property, " Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, no. 1, 2011.
-
(2011)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, vol.2
, Issue.1
-
-
Moore, A.P.1
Capelli, D.M.2
Caron, T.C.3
Shaw, E.4
Spooner, D.5
Trzeciak, R.F.6
-
7
-
-
84870849331
-
Casvid: Application level monitoring for SLA violation detection in clouds
-
V. C. Emeakaroha, T. C. Ferreto, M. A. S. Netto, I. Brandic, and C. A. F. De Rose, "Casvid: Application level monitoring for SLA violation detection in clouds." in IEEE Computer Software and Applications Conference (COMPSAC 2012), 2012.
-
(2012)
IEEE Computer Software and Applications Conference (COMPSAC 2012)
-
-
Emeakaroha, V.C.1
Ferreto, T.C.2
Netto, M.A.S.3
Brandic, I.4
De Rose, C.A.F.5
-
8
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: management of access control evolution on outsourced data, " in Proceedings of the 33rd international conference on Very large data bases, 2007.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
77950587463
-
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
-
Dec
-
W. Itani, A. Kayssi, and A. Chehab, "Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures, " in Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on, Dec. 2009.
-
(2009)
Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
10
-
-
0347380518
-
Separation of duties in computerized information systems
-
North-Holland
-
R. Sandhu, "Separation of duties in computerized information systems, " in In Database Security IV: Status and Prospects. North-Holland, 1990, pp. 179-189.
-
(1990)
Database Security IV: Status and Prospects
, pp. 179-189
-
-
Sandhu, R.1
-
12
-
-
84863262023
-
Toward rolebased provisioning and access control for infrastructure as a service (IaaS)
-
D. Shin, H. Akkan, W. Claycomb, and K. Kim, "Toward rolebased provisioning and access control for infrastructure as a service (IaaS), " J. Internet Services and Applications, vol. 2, no. 3, pp. 243-255, 2011.
-
(2011)
J. Internet Services and Applications
, vol.2
, Issue.3
, pp. 243-255
-
-
Shin, D.1
Akkan, H.2
Claycomb, W.3
Kim, K.4
-
14
-
-
84857963677
-
Modeling human behavior to anticipate insider attacks
-
F. Greitzer and R. Hohimer, "Modeling human behavior to anticipate insider attacks, " Journal of Strategic Security, vol. 4, no. 2, 2011.
-
(2011)
Journal of Strategic Security
, vol.4
, Issue.2
-
-
Greitzer, F.1
Hohimer, R.2
-
15
-
-
51249123658
-
Common sense guide to prevention and detection of insider threats 3rd edition version 3.1
-
January, [Online], Available
-
D. Cappelli, A. Moore, R. Trzeciak, and T. J. Shimeall, "Common sense guide to prevention and detection of insider threats 3rd edition version 3.1, " Carnegie Mellon University/SEI, Tech. Rep., January 2009. [Online]. Available: http://www.cert.org/archive/pdf/CSG-V3.pdf.
-
(2009)
Carnegie Mellon University/SEI, Tech. Rep.
-
-
Cappelli, D.1
Moore, A.2
Trzeciak, R.3
Shimeall, T.J.4
-
17
-
-
84870838067
-
Risk assessment for personnel security: A guide
-
C. for the Protection of National Infrastructure (CPNI)
-
C. for the Protection of National Infrastructure (CPNI), "Risk assessment for personnel security: A guide, " Centre for the Protection of National Infrastructure (CPNI), Tech. Rep., 2010.
-
(2010)
Centre for the Protection of National Infrastructure (CPNI), Tech. Rep.
-
-
-
18
-
-
84857971086
-
Identifying at-risk employees: Modeling psychosocial precursors of potential insider threats
-
January
-
F. Greitzer, L. Kangas, C. Noonan, A. Dalton, and R. Hohimer, "Identifying at-risk employees: Modeling psychosocial precursors of potential insider threats, " in 45th Hawaii International Conference on System Science (HICSS), January 2012.
-
(2012)
45th Hawaii International Conference on System Science (HICSS)
-
-
Greitzer, F.1
Kangas, L.2
Noonan, C.3
Dalton, A.4
Hohimer, R.5
-
19
-
-
84870789066
-
Preemployment screening: A good practice guide
-
C. for the Protection of National Infrastructure (CPNI), September
-
C. for the Protection of National Infrastructure (CPNI), "Preemployment screening: A good practice guide, " Centre for the Protection of National Infrastructure (CPNI), Tech. Rep., September 2011.
-
(2011)
Centre for the Protection of National Infrastructure (CPNI), Tech. Rep.
-
-
-
20
-
-
80053417419
-
Deriving candidate technical controls and indicators of insider attack from socio-technical models and data
-
January, [Online]. Available
-
M. Hanley, "Deriving candidate technical controls and indicators of insider attack from socio-technical models and data, " Carnegie Mellon University/SEI, Tech. Rep., January 2011. [Online]. Available: http://www.cert.org/archive/pdf/11tn003.pdf.
-
(2011)
Carnegie Mellon University/SEI, Tech. Rep.
-
-
Hanley, M.1
-
21
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
mar
-
K. Ilgun, R. Kemmerer, and P. Porras, "State transition analysis: a rule-based intrusion detection approach, " Software Engineering, IEEE Transactions on, vol. 21, no. 3, pp. 181 -199, mar 1995.
-
(1995)
Software Engineering, IEEE Transactions on
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
22
-
-
55549097262
-
Subverting vista kernel for fun and profit
-
[Online], Available
-
J. Rotkowska, "Subverting vista kernel for fun and profit, " Black Hat USA, Tech. Rep., 2006. [Online]. Available: http://blackhat.com/ presentations/bh-usa-06/BH-US-06-Rutkowska.pdf.
-
(2006)
Black Hat USA, Tech. Rep.
-
-
Rotkowska, J.1
-
23
-
-
79952411124
-
Cloudburst: A vmware guest to host escape story
-
[Online], Available
-
K. Kortchinsky, "Cloudburst: A vmware guest to host escape story, " Black Hat USA, Tech. Rep., 2009. [Online]. Available: http://www.blackhat.com/presentations/bh-usa-09/KORTCHINSKY/BHUSA09-Kortchinsky- Cloudburst-PAPER.pdf.
-
(2009)
Black Hat USA, Tech. Rep.
-
-
Kortchinsky, K.1
-
24
-
-
84870768352
-
-
May, [Online], Available
-
Federal Bureau of Investigations, "Economic espionage: How to spot a possible insider threat, " May 2012. [Online]. Available: http://www.fbi.gov/news/stories/2012/may/insider051112/insider051112.
-
(2012)
Economic Espionage: How to Spot a Possible Insider Threat
-
-
-
25
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
nov.-dec.
-
H. Takabi, J. Joshi, and G. Ahn, "Security and privacy challenges in cloud computing environments, " Security Privacy, IEEE, vol. 8, no. 6, pp. 24 -31, nov.-dec. 2010.
-
(2010)
Security Privacy, IEEE
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.2
Ahn, G.3
|