Login / Signup
Secure cloud maintenance: protecting workloads against insider attacks.
Sören Bleikertz
Anil Kurmus
Zoltán A. Nagy
Matthias Schunter
Published in:
AsiaCCS (2012)
Keyphrases
</>
insider attacks
cryptographic protocols
attack detection
cloud computing
early detection
insider threat
customer data
computer systems
database systems
multistage
access control
data protection
data center
data mining
product recommendation
communication protocols
customer behavior