-
1
-
-
3242808612
-
-
Jan 25
-
Gordon, M. Loeb, W. Lucyshyn, R. Richardson,"Computer Crime and Security Survey," Internet:http://www.cpppe.umd.edu/Bookstore/Documents/ 2005CSISurvey.pdf, [Jan 25, 2012].
-
(2012)
Computer Crime and Security Survey
-
-
Gordon1
Loeb, M.2
Lucyshyn, W.3
Richardson, R.4
-
2
-
-
84891115101
-
-
The Value of Corporate Secrets[Jan 25, 2012.
-
"The Value of Corporate Secrets", Internet:http://www.download. microsoft.com, [Jan 25, 2012].
-
-
-
-
3
-
-
84891123480
-
-
2007 E-Crime Watch Survey[Jan 25, 2012
-
"2007 E-Crime Watch Survey," Internet:http://www.cert.org/ archive/pdf/ecrimesummary07.pdf, [Jan 25, 2012].
-
-
-
-
4
-
-
78650385129
-
Organizing access privileges: Maximizing the availability and mitigating the threat ofinsiders knowledgebase
-
Q. Yaseen, B. Panda, "Organizing Access Privileges:Maximizing the Availability and Mitigating the Threat ofInsiders Knowledgebase," Proc. NSS'2010, 2010, pp.312-317.
-
(2010)
Proc. NSS'2010
, pp. 312-317
-
-
Yaseen, Q.1
Panda, B.2
-
5
-
-
78649286322
-
Predicting and preventinginsider threat in relational database systems
-
Q. Yaseen and B. Panda, "Predicting and PreventingInsider Threat in Relational Database Systems", Proc.WISTP, 2010, pp.368-383.
-
(2010)
Proc. WISTP
, pp. 368-383
-
-
Yaseen, Q.1
Panda, B.2
-
6
-
-
78649280543
-
Malicious modification attacksby insiders in relational databases: Prediction andprevention
-
Q. Yaseen and B. Panda, "Malicious Modification Attacksby Insiders in Relational Databases: Prediction andPrevention", Proc. IEEE SocialCom/PASSAT, 2010,pp.849-856.
-
(2010)
Proc. IEEE SocialCom/PASSAT
, pp. 849-856
-
-
Yaseen, Q.1
Panda, B.2
-
7
-
-
45949091693
-
TheInference problem and updates in relational databases
-
C. Farkas, T.S. Toland, and C.M. Eastman, "TheInference Problem and Updates in Relational Databases",Proc. DBSec, 2001, pp.181-194.
-
(2001)
Proc. DBSec
, pp. 181-194
-
-
Farkas, C.1
Toland, T.S.2
Eastman, C.M.3
-
8
-
-
84874233485
-
Tackling insider threat inrelational database systems
-
Chicago, IL, USA
-
Q. Yaseen and B. Panda, "Tackling Insider Threat inRelational Database Systems", Proc. ACM/IEEEUCC2012, Chicago, IL, USA, 2012.
-
(2012)
Proc. ACM/IEEEUCC2012
-
-
Yaseen, Q.1
Panda, B.2
-
11
-
-
84891109655
-
-
OMG. CORBA services: Common object servicesspecification, security service specification v1. 8, 2002
-
OMG. CORBA services: Common object servicesspecification, security service specification v1.8, 2002.
-
-
-
-
12
-
-
84891069625
-
-
Netegrity. Siteminder concepts guide. Technical report, Netegrity, 2000
-
Netegrity. Siteminder concepts guide. Technical report,Netegrity, 2000.
-
-
-
-
14
-
-
85008014522
-
Cooperative secondaryauthorization recycling
-
Q. Wei, M. Ripeanu, K Beznosov," Cooperative SecondaryAuthorization Recycling", IEEE Transactions on Paralleland Distributed Systems, vol. 20(2), 2009, pp. 275-288.
-
(2009)
IEEE Transactions on Paralleland Distributed Systems
, vol.20
, Issue.2
, pp. 275-288
-
-
Wei, Q.1
Ripeanu, M.2
Beznosov, K.3
-
15
-
-
70349309706
-
Data security in the world of cloudcomputing
-
L. Kaufman, "Data Security in the World of CloudComputing", IEEE Security &Privacy, vol.7(4), 2009.
-
(2009)
IEEE Security &Privacy
, vol.7
, Issue.4
-
-
Kaufman, L.1
-
16
-
-
84857523561
-
A distributed access control architecture forcloud computing
-
A. Almutairi, M. Sarfraz, S. Basalamah, W. Aref, A.Ghafoor, "A Distributed Access Control Architecture forCloud Computing", IEEE Software, vol.29(2), pp.36,44,2012.
-
(2012)
IEEE Software
, vol.29
, Issue.2
, pp. 36-44
-
-
Almutairi, A.1
Sarfraz, M.2
Basalamah, S.3
Aref, W.4
Ghafoor, A.5
-
17
-
-
78649806730
-
SecureCloud: Towards a comprehensivesecurity framework for cloud computing environment
-
H. Takabi, "SecureCloud: Towards a comprehensivesecurity framework for cloud computing environment",Proc. IEEE COMPSACW10, 2010, pp. 393-398.
-
(2010)
Proc. IEEE COMPSACW10
, pp. 393-398
-
-
Takabi, H.1
-
19
-
-
70449569012
-
Ensuring datastorage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring DataStorage Security in Cloud Computing", IACR CryptologyePrint Archive, 2009, pp.81-81.
-
(2009)
IACR CryptologyePrint Archive
, pp. 81-81
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
20
-
-
77950601673
-
Cloud security withvirtualized defense and reputation-based trustmanagement
-
IEEE CS Press
-
K. Hwang, S. Kulkarni, and Y. Hu, "Cloud Security withVirtualized Defense and Reputation-Based TrustManagement", Proc. IEEE DASC09, IEEE CS Press, 2009,pp. 717-722.
-
(2009)
Proc. IEEE DASC09
, pp. 717-722
-
-
Hwang, K.1
Kulkarni, S.2
Hu, Y.3
-
21
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon,R.Masuoka, J. Molina,"Controlling data in the cloud:outsourcing computation without outsourcing control",Proc. ACM CCSW '09, 2009.
-
(2009)
Proc. ACM CCSW '09
-
-
Cho, W.R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
22
-
-
84891127590
-
-
January 25
-
H. Hac?gudie;mudie;?, J. Tatemura, Y. Chi, W. Hsiung, H.Jafarpour, H. Moon and O. Po, "CloudDB: A Data Storefor All Sizes in the Cloud", Internet: http://www.neclabs.com/dm /CloudDBweb.Pdf, [January 25, 2012].
-
(2012)
CloudDB: A Data Storefor All Sizes in the Cloud
-
-
Hacgudie, M.H.1
Tatemura, J.2
Chi, Y.3
Hsiung, W.4
Jafarpour, H.5
Moon, H.6
Po, O.7
-
23
-
-
80053161148
-
RelationalCloud: A database service for the cloud
-
C. Curino, E.P.C. Jones, R.A. Popa, N. Malviya, E. Wu, S.Madden, H. Balakrishnan, and N. Zeldovich, "RelationalCloud: a Database Service for the cloud", Proc. CIDR,2011, pp.235-240.
-
(2011)
Proc. CIDR
, pp. 235-240
-
-
Curino, C.1
Jones, E.P.C.2
Popa, R.A.3
Malviya, N.4
Wu, E.5
Madden, S.6
Balakrishnan, H.7
Zeldovich, N.8
-
24
-
-
84891128365
-
-
Amazon Relational Database. Internet[Jan 25, 2012].
-
Amazon Relational Database. Internet: http://aws.amazon.com/rds/, [Jan 25, 2012].
-
-
-
-
25
-
-
84891127592
-
-
SQL Azure. Internet: [January 25, 2012].
-
SQL Azure. Internet: http://www.microsoft.com/applicationplatform/en/us/ Key-Technologies/SQLAzure.aspx, [January 25, 2012].
-
-
-
-
26
-
-
84944727480
-
Honeypots: Catching the insider threat
-
L. Spitzner, "Honeypots: Catching the Insider Threat",Proc. ACSAC, 2003, pp.170-181.
-
(2003)
Proc. ACSAC
, pp. 170-181
-
-
Spitzner, L.1
|