메뉴 건너뛰기




Volumn , Issue , 2013, Pages 137-144

PEP-side caching: An insider threat port

Author keywords

Access Control; Cloud Computing; Insider Threat; PEP Side caching; Relational Databases

Indexed keywords

CLOUD COMPUTING; INFORMATION USE;

EID: 84891106463     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IRI.2013.6642464     Document Type: Conference Paper
Times cited : (15)

References (26)
  • 2
    • 84891115101 scopus 로고    scopus 로고
    • The Value of Corporate Secrets[Jan 25, 2012.
    • "The Value of Corporate Secrets", Internet:http://www.download. microsoft.com, [Jan 25, 2012].
  • 3
    • 84891123480 scopus 로고    scopus 로고
    • 2007 E-Crime Watch Survey[Jan 25, 2012
    • "2007 E-Crime Watch Survey," Internet:http://www.cert.org/ archive/pdf/ecrimesummary07.pdf, [Jan 25, 2012].
  • 4
    • 78650385129 scopus 로고    scopus 로고
    • Organizing access privileges: Maximizing the availability and mitigating the threat ofinsiders knowledgebase
    • Q. Yaseen, B. Panda, "Organizing Access Privileges:Maximizing the Availability and Mitigating the Threat ofInsiders Knowledgebase," Proc. NSS'2010, 2010, pp.312-317.
    • (2010) Proc. NSS'2010 , pp. 312-317
    • Yaseen, Q.1    Panda, B.2
  • 5
    • 78649286322 scopus 로고    scopus 로고
    • Predicting and preventinginsider threat in relational database systems
    • Q. Yaseen and B. Panda, "Predicting and PreventingInsider Threat in Relational Database Systems", Proc.WISTP, 2010, pp.368-383.
    • (2010) Proc. WISTP , pp. 368-383
    • Yaseen, Q.1    Panda, B.2
  • 6
    • 78649280543 scopus 로고    scopus 로고
    • Malicious modification attacksby insiders in relational databases: Prediction andprevention
    • Q. Yaseen and B. Panda, "Malicious Modification Attacksby Insiders in Relational Databases: Prediction andPrevention", Proc. IEEE SocialCom/PASSAT, 2010,pp.849-856.
    • (2010) Proc. IEEE SocialCom/PASSAT , pp. 849-856
    • Yaseen, Q.1    Panda, B.2
  • 7
    • 45949091693 scopus 로고    scopus 로고
    • TheInference problem and updates in relational databases
    • C. Farkas, T.S. Toland, and C.M. Eastman, "TheInference Problem and Updates in Relational Databases",Proc. DBSec, 2001, pp.181-194.
    • (2001) Proc. DBSec , pp. 181-194
    • Farkas, C.1    Toland, T.S.2    Eastman, C.M.3
  • 8
    • 84874233485 scopus 로고    scopus 로고
    • Tackling insider threat inrelational database systems
    • Chicago, IL, USA
    • Q. Yaseen and B. Panda, "Tackling Insider Threat inRelational Database Systems", Proc. ACM/IEEEUCC2012, Chicago, IL, USA, 2012.
    • (2012) Proc. ACM/IEEEUCC2012
    • Yaseen, Q.1    Panda, B.2
  • 11
    • 84891109655 scopus 로고    scopus 로고
    • OMG. CORBA services: Common object servicesspecification, security service specification v1. 8, 2002
    • OMG. CORBA services: Common object servicesspecification, security service specification v1.8, 2002.
  • 12
    • 84891069625 scopus 로고    scopus 로고
    • Netegrity. Siteminder concepts guide. Technical report, Netegrity, 2000
    • Netegrity. Siteminder concepts guide. Technical report,Netegrity, 2000.
  • 15
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloudcomputing
    • L. Kaufman, "Data Security in the World of CloudComputing", IEEE Security &Privacy, vol.7(4), 2009.
    • (2009) IEEE Security &Privacy , vol.7 , Issue.4
    • Kaufman, L.1
  • 16
    • 84857523561 scopus 로고    scopus 로고
    • A distributed access control architecture forcloud computing
    • A. Almutairi, M. Sarfraz, S. Basalamah, W. Aref, A.Ghafoor, "A Distributed Access Control Architecture forCloud Computing", IEEE Software, vol.29(2), pp.36,44,2012.
    • (2012) IEEE Software , vol.29 , Issue.2 , pp. 36-44
    • Almutairi, A.1    Sarfraz, M.2    Basalamah, S.3    Aref, W.4    Ghafoor, A.5
  • 17
    • 78649806730 scopus 로고    scopus 로고
    • SecureCloud: Towards a comprehensivesecurity framework for cloud computing environment
    • H. Takabi, "SecureCloud: Towards a comprehensivesecurity framework for cloud computing environment",Proc. IEEE COMPSACW10, 2010, pp. 393-398.
    • (2010) Proc. IEEE COMPSACW10 , pp. 393-398
    • Takabi, H.1
  • 20
    • 77950601673 scopus 로고    scopus 로고
    • Cloud security withvirtualized defense and reputation-based trustmanagement
    • IEEE CS Press
    • K. Hwang, S. Kulkarni, and Y. Hu, "Cloud Security withVirtualized Defense and Reputation-Based TrustManagement", Proc. IEEE DASC09, IEEE CS Press, 2009,pp. 717-722.
    • (2009) Proc. IEEE DASC09 , pp. 717-722
    • Hwang, K.1    Kulkarni, S.2    Hu, Y.3
  • 24
    • 84891128365 scopus 로고    scopus 로고
    • Amazon Relational Database. Internet[Jan 25, 2012].
    • Amazon Relational Database. Internet: http://aws.amazon.com/rds/, [Jan 25, 2012].
  • 25
    • 84891127592 scopus 로고    scopus 로고
    • SQL Azure. Internet: [January 25, 2012].
    • SQL Azure. Internet: http://www.microsoft.com/applicationplatform/en/us/ Key-Technologies/SQLAzure.aspx, [January 25, 2012].
  • 26
    • 84944727480 scopus 로고    scopus 로고
    • Honeypots: Catching the insider threat
    • L. Spitzner, "Honeypots: Catching the Insider Threat",Proc. ACSAC, 2003, pp.170-181.
    • (2003) Proc. ACSAC , pp. 170-181
    • Spitzner, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.