[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Mahajan et al., 2015 - Google Patents

The malicious insiders threat in the cloud

Mahajan et al., 2015

View PDF
Document ID
8289462065876494222
Author
Mahajan A
Sharma S
Publication year
Publication venue
International Journal of Engineering Research and General Science

External Links

Snippet

Cloud Computing, which once provided locally, has seen a technical and cultural shift of computing service provision to being provided remotely, and en masse, by third-party service providers. The data has now been placed under the protection of the service …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Garba et al. Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments
Mahajan et al. The malicious insiders threat in the cloud
Yusop et al. Analysis of insiders attack mitigation strategies
Newcombe Securing Cloud Services: A Pragmatic Approach
Jouini et al. Surveying and analyzing security problems in cloud computing environments
Leguías Ayala et al. Emerging threats, risk and attacks in distributed systems: Cloud computing
Amrin The impact of cyber security on SMEs
Al Aqrabi et al. A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service
Goel et al. Analyzing and Mitigating Security Risks in Cloud Computing
Pandith Data security and privacy concerns in cloud computing
Alashoor Cloud computing: a review of security issues and solutions
Pedchenko et al. Analysis of modern cloud services to ensure cybersecurity
Lim et al. Securing cloud and mobility: A practitioner's guide
Ahmed et al. Modeling Security Risk Factors in a Cloud Computing Environment.
Woody Enterprise security: A data-centric approach to securing the enterprise
Mattoo Security issues and challenges in cloud computing: A conceptual analysis and review
Nazir et al. Security threats with associated mitigation techniques in cloud computing
Bassett Cloud computing and innovation: Its viability, benefits, challenges and records management capabilities
Almgren Implementing COSO ERM framework to mitigate cloud computing business challenges
Udaykumar Design And Deploy Secure Azure Environment
Qasim et al. Cloud computing risks & business adoption
Raju et al. Survey about cloud computing threats
Ali et al. Emerging Trends in Cloud Computing Paradigm: An Extensive Literature Review on Cloud Security, Service Models, and Practical Suggestions
Baig An Investigation Into Recent Security And Privacy Issues In Cloud Multi-Tenancies
Edbro et al. Identifying high risk targets in a corporate multi-user network