메뉴 건너뛰기




Volumn 1, Issue , 2015, Pages 1073-1080

A taxonomy of cloud attack consequences and mitigation strategies: The role of access control and privileged access management

Author keywords

Cloud access control; Cloud attack consequences; Cloud mitigation strategies; Privileged access management

Indexed keywords

DIGITAL STORAGE; TAXONOMIES;

EID: 84967214668     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/Trustcom.2015.485     Document Type: Conference Paper
Times cited : (27)

References (26)
  • 7
    • 84886723209 scopus 로고    scopus 로고
    • A survey on security issues and solutions at different layers of Cloud computing
    • Feb
    • C. Modi, D. Patel, B. Borisaniya, et al., "A survey on security issues and solutions at different layers of Cloud computing," The J. of Supercomput., vol. 63, pp. 561-592, Feb 2013.
    • (2013) The J. of Supercomput , vol.63 , pp. 561-592
    • Modi, C.1    Patel, D.2    Borisaniya, B.3
  • 9
    • 77957070672 scopus 로고    scopus 로고
    • User participation in information systems security risk management
    • Sep
    • J. L. Spears and H. Barki, "User participation in information systems security risk management," MIS quarterly, vol. 34, pp. 503-522, Sep 2010.
    • (2010) MIS Quarterly , vol.34 , pp. 503-522
    • Spears, J.L.1    Barki, H.2
  • 10
    • 84966806043 scopus 로고    scopus 로고
    • Common sense guide to mitigating insider threats 4th edition
    • G. Silowash, D. Cappelli, A. Moore, et al., "Common Sense Guide to Mitigating Insider Threats 4th Edition," DTIC Document 2012.
    • (2012) DTIC Document
    • Silowash, G.1    Cappelli, D.2    Moore, A.3
  • 11
    • 84986131258 scopus 로고    scopus 로고
    • Understanding customer relationship management (CRM)
    • I. J. Chen and K. Popovich, "Understanding customer relationship management (CRM)," Buss. Process Manage. J., vol. 9, pp. 672-688, 2003.
    • (2003) Buss. Process Manage. J , vol.9 , pp. 672-688
    • Chen, I.J.1    Popovich, K.2
  • 13
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Gener. Comput. Syst., vol. 28, pp. 583-592, 2012.
    • (2012) Future Gener. Comput. Syst , vol.28 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 14
    • 84966827093 scopus 로고    scopus 로고
    • (26/04/2015)
    • C. Budd. (26/04/2015). Security Threats. Available: https://technet.microsoft.com/enus/ library/cc723507.aspx#XSLTsection124121120120
    • Security Threats
    • Budd, C.1
  • 15
    • 84915813172 scopus 로고    scopus 로고
    • Solutions, Verizon Enterprise
    • V. E. Solutions, "2013 Data Breach Investigations Report," Solutions, Verizon Enterprise, http://www.verizonenterprise.com/resources/reports/rp-databreach-investigations-report-2013-en-xg.pdf2014.
    • 2013 Data Breach Investigations Report
    • Solutions, V.E.1
  • 17
    • 84858158707 scopus 로고    scopus 로고
    • A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    • Jun
    • M. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing," Future Gener. Comput. Syst., vol. 28, pp. 833-851, Jun 2012.
    • (2012) Future Gener. Comput. Syst , vol.28 , pp. 833-851
    • Khorshed, M.T.1    Ali, A.B.M.S.2    Wasimi, S.A.3
  • 20
    • 85021950441 scopus 로고    scopus 로고
    • Secure audit logs to support computer forensics
    • B. Schneier and J. Kelsey, "Secure audit logs to support computer forensics," ACM Trans. Inf. Syst. Secur., vol. 2, pp. 159-176, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur , vol.2 , pp. 159-176
    • Schneier, B.1    Kelsey, J.2
  • 21
    • 79952545666 scopus 로고    scopus 로고
    • Data theft: A prototypical insider threat
    • S. Stolfo, S. Bellovin, Eds., et al., ed: Springer US
    • M. McCormick, "Data Theft: A Prototypical Insider Threat," in Insider Attack and Cyber Security. vol. 39, S. Stolfo, S. Bellovin, Eds., et al., ed: Springer US, 2008, pp. 53-68.
    • (2008) Insider Attack and Cyber Security , vol.39 , pp. 53-68
    • McCormick, M.1
  • 23
    • 84958754081 scopus 로고    scopus 로고
    • Cloud Forensics
    • G. Peterson and S. Shenoi, Eds., ed: Springer Berlin Heidelberg
    • K. Ruan, J. Carthy, T. Kechadi, et al., "Cloud Forensics," in Advances in Digital Forensics VII. vol. 361, G. Peterson and S. Shenoi, Eds., ed: Springer Berlin Heidelberg, 2011, pp. 35-46.
    • (2011) Advances in Digital Forensics VII , vol.361 , pp. 35-46
    • Ruan, K.1    Carthy, J.2    Kechadi, T.3
  • 24
    • 84967082918 scopus 로고    scopus 로고
    • Symantec, "Avoiding the Hidden Costs of the Cloud," https://www.symantec.com/content/en/us/about/media/pdfs/bstate-of-cloud-global-results-2013.en-us.pdf2013.
    • Avoiding the Hidden Costs of the Cloud
  • 25
    • 77957955892 scopus 로고    scopus 로고
    • Attack surfaces: A taxonomy for attacks on cloud services
    • N. Gruschka and M. Jensen, "Attack Surfaces: A Taxonomy for Attacks on Cloud Services," in IEEE CLOUD, 2010, pp. 276-279.
    • (2010) IEEE CLOUD , pp. 276-279
    • Gruschka, N.1    Jensen, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.