Mahajan et al., 2015 - Google Patents
The malicious insiders threat in the cloudMahajan et al., 2015
View PDF- Document ID
- 8289462065876494222
- Author
- Mahajan A
- Sharma S
- Publication year
- Publication venue
- International Journal of Engineering Research and General Science
External Links
Snippet
Cloud Computing, which once provided locally, has seen a technical and cultural shift of computing service provision to being provided remotely, and en masse, by third-party service providers. The data has now been placed under the protection of the service …
- 238000001514 detection method 0 abstract description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Garba et al. | Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments | |
Mahajan et al. | The malicious insiders threat in the cloud | |
Yusop et al. | Analysis of insiders attack mitigation strategies | |
Newcombe | Securing Cloud Services: A Pragmatic Approach | |
Jouini et al. | Surveying and analyzing security problems in cloud computing environments | |
Leguías Ayala et al. | Emerging threats, risk and attacks in distributed systems: Cloud computing | |
Amrin | The impact of cyber security on SMEs | |
Al Aqrabi et al. | A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service | |
Goel et al. | Analyzing and Mitigating Security Risks in Cloud Computing | |
Pandith | Data security and privacy concerns in cloud computing | |
Alashoor | Cloud computing: a review of security issues and solutions | |
Pedchenko et al. | Analysis of modern cloud services to ensure cybersecurity | |
Lim et al. | Securing cloud and mobility: A practitioner's guide | |
Ahmed et al. | Modeling Security Risk Factors in a Cloud Computing Environment. | |
Woody | Enterprise security: A data-centric approach to securing the enterprise | |
Mattoo | Security issues and challenges in cloud computing: A conceptual analysis and review | |
Nazir et al. | Security threats with associated mitigation techniques in cloud computing | |
Bassett | Cloud computing and innovation: Its viability, benefits, challenges and records management capabilities | |
Almgren | Implementing COSO ERM framework to mitigate cloud computing business challenges | |
Udaykumar | Design And Deploy Secure Azure Environment | |
Qasim et al. | Cloud computing risks & business adoption | |
Raju et al. | Survey about cloud computing threats | |
Ali et al. | Emerging Trends in Cloud Computing Paradigm: An Extensive Literature Review on Cloud Security, Service Models, and Practical Suggestions | |
Baig | An Investigation Into Recent Security And Privacy Issues In Cloud Multi-Tenancies | |
Edbro et al. | Identifying high risk targets in a corporate multi-user network |