Login / Signup
An overview of insider attacks in cloud computing.
Adrian J. Duncan
Sadie Creese
Michael Goldsmith
Published in:
Concurr. Comput. Pract. Exp. (2015)
Keyphrases
</>
cloud computing
insider attacks
computing resources
attack detection
data management
data center
cloud computing environment
big data
cloud computing platform
service providers
business models
insider threat
security issues
cryptographic protocols
data streams