A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds.
Imran KhanZahid AnwarBehzad BordbarEike RitterHabib-ur RehmanPublished in: IEEE Trans. Cloud Comput. (2018)
Keyphrases
- insider attacks
- cryptographic protocols
- communication infrastructure
- network infrastructure
- service providers
- communication services
- service management
- protocol stack
- communication protocols
- computing environments
- third party
- security services
- lightweight
- cloud computing
- attack detection
- communication protocol
- service quality
- authentication protocol
- service delivery
- early detection
- communication networks
- data privacy
- electronic commerce
- web services