Maneuvering Around Clouds: Bypassing Cloud-based Security Providers.
Thomas VissersTom van GoethemWouter JoosenNick NikiforakisPublished in: CCS (2015)
Keyphrases
- cloud computing
- cloud services
- security issues
- service providers
- information assurance
- information security
- access control
- intrusion detection
- big data
- network security
- target tracking
- security protocols
- security threats
- security policies
- security requirements
- security mechanisms
- security systems
- security problems
- statistical databases
- security management
- internet service providers
- data fusion
- security level
- security measures
- wireless sensor networks