Login / Signup
Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability.
Qutaibah Althebyan
Rami Mohawesh
Qussai Yaseen
Yaser Jararweh
Published in:
ICITST (2015)
Keyphrases
</>
data availability
data access
insider threat
data replication
distributed systems
communication cost
cloud computing
replication scheme
communication overhead
data management
quality of service
information security
data center
sensor networks
transaction model