메뉴 건너뛰기




Volumn 6983 LNCS, Issue , 2013, Pages 93-103

The insider threat in cloud computing

Author keywords

Cloud Computing; Insider Threat; Security Measures

Indexed keywords

COMPUTATIONAL RESOURCES; EMERGING TECHNOLOGIES; INSIDER THREAT; IT INFRASTRUCTURES; MALICIOUS INSIDERS; POTENTIAL PROBLEMS; SECURITY AND PRIVACY; SECURITY MEASURE;

EID: 84885822769     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-41476-3_8     Document Type: Conference Paper
Times cited : (50)

References (32)
  • 1
    • 24644470542 scopus 로고    scopus 로고
    • The insider threat to Information Systems and the effectiveness of ISO 17799
    • Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E.: The insider threat to Information Systems and the effectiveness of ISO 17799. Computers & Security 24(6), 472-484 (2005)
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 472-484
    • Theoharidou, M.1    Kokolakis, S.2    Karyda, M.3    Kiountouzis, E.4
  • 3
    • 0010886652 scopus 로고
    • The insider threat to information systems: The psychology of the dangerous insider
    • Shaw, E., Ruby, K., Post, J.: The insider threat to information systems: The psychology of the dangerous insider. Security Awareness Bulletin 2, 1-10 (1988)
    • (1988) Security Awareness Bulletin , vol.2 , pp. 1-10
    • Shaw, E.1    Ruby, K.2    Post, J.3
  • 7
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz, E.: A framework for understanding and predicting insider attacks. Computers & Security 21(6), 526-531 (2002)
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.1
  • 12
    • 0034226287 scopus 로고    scopus 로고
    • A Revised Taxonomy for Intrusion Detection Systems
    • Debar, H., Dacier, M., Wespi, A.: A Revised Taxonomy for Intrusion Detection Systems. Annales des Teecommunications 55(7-8), 361-378 (2000)
    • (2000) Annales des Teecommunications , vol.55 , Issue.7-8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 15
    • 0036173202 scopus 로고    scopus 로고
    • Insider Threat Prediction Tool: Evaluating the probability of IT misuse
    • Magklaras, G., Furnell, S.: Insider Threat Prediction Tool: Evaluating the probability of IT misuse. Computers & Security 21(1), 62-73 (2002)
    • (2002) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.1    Furnell, S.2
  • 16
    • 24344460927 scopus 로고    scopus 로고
    • A preliminary model of end user sophistication for insider threat prediction in it systems
    • Magklaras, G., Furnell, S.: A preliminary model of end user sophistication for insider threat prediction in it systems. Computers and Security 24, 371-380 (2005)
    • (2005) Computers and Security , vol.24 , pp. 371-380
    • Magklaras, G.1    Furnell, S.2
  • 17
  • 21
    • 84885692728 scopus 로고    scopus 로고
    • Yet another intrusion detection system against insider attacks
    • Mun, H., Han, K., Yeun, C., Kim, K.: Yet another intrusion detection system against insider attacks. In: Proc. of the SCIS 2008 (2008)
    • (2008) Proc. of the SCIS 2008
    • Mun, H.1    Han, K.2    Yeun, C.3    Kim, K.4
  • 22
    • 78049354490 scopus 로고    scopus 로고
    • An Insider Threat Prediction Model
    • Katsikas, S., Lopez, J., Soriano, M. (eds.) TrustBus 2010. Springer, Heidelberg
    • Kandias, M., Mylonas, A., Virvilis, N., Theoharidou, M., Gritzalis, D.: An Insider Threat Prediction Model. In: Katsikas, S., Lopez, J., Soriano, M. (eds.) TrustBus 2010. LNCS, vol. 6264, pp. 26-37. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6264 , pp. 26-37
    • Kandias, M.1    Mylonas, A.2    Virvilis, N.3    Theoharidou, M.4    Gritzalis, D.5
  • 23
    • 84885826007 scopus 로고    scopus 로고
    • Legal Issues in Grid and Cloud Computing
    • Stanoevska-Slabeva, K., Wozniak, T., Ristol, R. (eds.) Springer, Berlin
    • Parrilli, D.: Legal Issues in Grid and Cloud Computing. In: Stanoevska-Slabeva, K., Wozniak, T., Ristol, R. (eds.) Grid and Cloud Computing: A Business Perspective on Technology and Applications, pp. 97-118. Springer, Berlin (2010)
    • (2010) Grid and Cloud Computing: A Business Perspective on Technology and Applications , pp. 97-118
    • Parrilli, D.1
  • 24
    • 1142282727 scopus 로고    scopus 로고
    • (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
    • Claessens, J., Preneel, B., Vandewalle, J. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ACM Transactions on Internet Technology 3(1), 28-48 (2003)
    • (2003) ACM Transactions on Internet Technology , vol.3 , Issue.1 , pp. 28-48
    • Claessens, J.1    Preneel, B.2    Vandewalle, J.3
  • 30
  • 31
    • 84885179321 scopus 로고    scopus 로고
    • Risk-Based Criticality Analysis
    • Palmer, C., Shenoi, S. (eds.) Critical Infrastructure Protection III. Springer, Heidelberg
    • Theoharidou, M., Kotzanikolaou, P., Gritzalis, D.: Risk-Based Criticality Analysis. In: Palmer, C., Shenoi, S. (eds.) Critical Infrastructure Protection III. IFIP AICT, vol. 311, pp. 35-49. Springer, Heidelberg (2009)
    • (2009) IFIP AICT , vol.311 , pp. 35-49
    • Theoharidou, M.1    Kotzanikolaou, P.2    Gritzalis, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.