共 50 条
- [1] Cloud Computing: Insider Attacks on Virtual Machines During Migration [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 493 - 500
- [2] Preventing Insider Attacks in the Cloud [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 488 - +
- [3] The Insider Threat in Cloud Computing [J]. CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
- [4] Insider Threat Detection and Cloud Computing [J]. ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
- [5] Mitigating Insider Data Theft Attacks in the Cloud [J]. 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), 2016, : 561 - 567
- [8] A Multidimension Taxonomy of Insider Threats in Cloud Computing [J]. COMPUTER JOURNAL, 2016, 59 (11): : 1612 - 1622
- [9] Cloud Computing: A paradigm of more Insider Threats [J]. 2019 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE 2019), 2019, : 107 - 112
- [10] Ciphertext Retrieval against Insider Attacks for Cloud Storage [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 202 - 206