메뉴 건너뛰기




Volumn , Issue , 2012, Pages 387-394

Insider threats to cloud computing: Directions for new research challenges

Author keywords

Cloud; Insider; Security

Indexed keywords

CLOUD SERVICES; CLOUD SYSTEMS; INSIDER; INSIDER THREAT; RESEARCH CHALLENGES; SECURITY; SERVICE PROVIDER;

EID: 84870826258     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2012.113     Document Type: Conference Paper
Times cited : (102)

References (25)
  • 2
    • 79952065844 scopus 로고    scopus 로고
    • Top threats to cloud computing, version 1.0
    • March, [Online], Available
    • C. S. Alliance, "Top threats to cloud computing, version 1.0, " Cloud Security Alliance, Tech. Rep., March 2010. [Online]. Available: http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.
    • (2010) Cloud Security Alliance, Tech. Rep.
    • Alliance, C.S.1
  • 3
    • 84870821223 scopus 로고    scopus 로고
    • Star-205 cloud security alliance - top threats to cloud computing v2.0.pdf
    • [Online], Available
    • C. S. Alliance, "Star-205 cloud security alliance - top threats to cloud computing v2.0.pdf, " in RSA Conference Europe, 2010. [Online]. Available: http://365.rsaconference.com/docs/DOC-2819.
    • (2010) RSA Conference Europe
    • Alliance, C.S.1
  • 4
    • 84976699318 scopus 로고
    • The byzantine generals problem
    • Jul. [Online], Available
    • L. Lamport, R. Shostak, and M. Pease, "The byzantine generals problem, " ACM Trans. Program. Lang. Syst., vol. 4, no. 3, pp. 382-401, Jul. 1982. [Online]. Available: http://doi.acm.org/10.1145/357172.357176.
    • (1982) ACM Trans. Program. Lang. Syst. , vol.4 , Issue.3 , pp. 382-401
    • Lamport, L.1    Shostak, R.2    Pease, M.3
  • 10
    • 0347380518 scopus 로고
    • Separation of duties in computerized information systems
    • North-Holland
    • R. Sandhu, "Separation of duties in computerized information systems, " in In Database Security IV: Status and Prospects. North-Holland, 1990, pp. 179-189.
    • (1990) Database Security IV: Status and Prospects , pp. 179-189
    • Sandhu, R.1
  • 12
    • 84863262023 scopus 로고    scopus 로고
    • Toward rolebased provisioning and access control for infrastructure as a service (IaaS)
    • D. Shin, H. Akkan, W. Claycomb, and K. Kim, "Toward rolebased provisioning and access control for infrastructure as a service (IaaS), " J. Internet Services and Applications, vol. 2, no. 3, pp. 243-255, 2011.
    • (2011) J. Internet Services and Applications , vol.2 , Issue.3 , pp. 243-255
    • Shin, D.1    Akkan, H.2    Claycomb, W.3    Kim, K.4
  • 14
    • 84857963677 scopus 로고    scopus 로고
    • Modeling human behavior to anticipate insider attacks
    • F. Greitzer and R. Hohimer, "Modeling human behavior to anticipate insider attacks, " Journal of Strategic Security, vol. 4, no. 2, 2011.
    • (2011) Journal of Strategic Security , vol.4 , Issue.2
    • Greitzer, F.1    Hohimer, R.2
  • 15
    • 51249123658 scopus 로고    scopus 로고
    • Common sense guide to prevention and detection of insider threats 3rd edition version 3.1
    • January, [Online], Available
    • D. Cappelli, A. Moore, R. Trzeciak, and T. J. Shimeall, "Common sense guide to prevention and detection of insider threats 3rd edition version 3.1, " Carnegie Mellon University/SEI, Tech. Rep., January 2009. [Online]. Available: http://www.cert.org/archive/pdf/CSG-V3.pdf.
    • (2009) Carnegie Mellon University/SEI, Tech. Rep.
    • Cappelli, D.1    Moore, A.2    Trzeciak, R.3    Shimeall, T.J.4
  • 17
    • 84870838067 scopus 로고    scopus 로고
    • Risk assessment for personnel security: A guide
    • C. for the Protection of National Infrastructure (CPNI)
    • C. for the Protection of National Infrastructure (CPNI), "Risk assessment for personnel security: A guide, " Centre for the Protection of National Infrastructure (CPNI), Tech. Rep., 2010.
    • (2010) Centre for the Protection of National Infrastructure (CPNI), Tech. Rep.
  • 19
    • 84870789066 scopus 로고    scopus 로고
    • Preemployment screening: A good practice guide
    • C. for the Protection of National Infrastructure (CPNI), September
    • C. for the Protection of National Infrastructure (CPNI), "Preemployment screening: A good practice guide, " Centre for the Protection of National Infrastructure (CPNI), Tech. Rep., September 2011.
    • (2011) Centre for the Protection of National Infrastructure (CPNI), Tech. Rep.
  • 20
    • 80053417419 scopus 로고    scopus 로고
    • Deriving candidate technical controls and indicators of insider attack from socio-technical models and data
    • January, [Online]. Available
    • M. Hanley, "Deriving candidate technical controls and indicators of insider attack from socio-technical models and data, " Carnegie Mellon University/SEI, Tech. Rep., January 2011. [Online]. Available: http://www.cert.org/archive/pdf/11tn003.pdf.
    • (2011) Carnegie Mellon University/SEI, Tech. Rep.
    • Hanley, M.1
  • 21
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • mar
    • K. Ilgun, R. Kemmerer, and P. Porras, "State transition analysis: a rule-based intrusion detection approach, " Software Engineering, IEEE Transactions on, vol. 21, no. 3, pp. 181 -199, mar 1995.
    • (1995) Software Engineering, IEEE Transactions on , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.3
  • 22
    • 55549097262 scopus 로고    scopus 로고
    • Subverting vista kernel for fun and profit
    • [Online], Available
    • J. Rotkowska, "Subverting vista kernel for fun and profit, " Black Hat USA, Tech. Rep., 2006. [Online]. Available: http://blackhat.com/ presentations/bh-usa-06/BH-US-06-Rutkowska.pdf.
    • (2006) Black Hat USA, Tech. Rep.
    • Rotkowska, J.1
  • 23
    • 79952411124 scopus 로고    scopus 로고
    • Cloudburst: A vmware guest to host escape story
    • [Online], Available
    • K. Kortchinsky, "Cloudburst: A vmware guest to host escape story, " Black Hat USA, Tech. Rep., 2009. [Online]. Available: http://www.blackhat.com/presentations/bh-usa-09/KORTCHINSKY/BHUSA09-Kortchinsky- Cloudburst-PAPER.pdf.
    • (2009) Black Hat USA, Tech. Rep.
    • Kortchinsky, K.1
  • 24
    • 84870768352 scopus 로고    scopus 로고
    • May, [Online], Available
    • Federal Bureau of Investigations, "Economic espionage: How to spot a possible insider threat, " May 2012. [Online]. Available: http://www.fbi.gov/news/stories/2012/may/insider051112/insider051112.
    • (2012) Economic Espionage: How to Spot a Possible Insider Threat
  • 25
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • nov.-dec.
    • H. Takabi, J. Joshi, and G. Ahn, "Security and privacy challenges in cloud computing environments, " Security Privacy, IEEE, vol. 8, no. 6, pp. 24 -31, nov.-dec. 2010.
    • (2010) Security Privacy, IEEE , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.2    Ahn, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.