Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Malicious Insiders

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
Malicious insiders can be current or former employees, contractors or business partners that gains access to an organizations network, system or data and release this information without permission by the organization.
Published in Chapter:
Cloud Security: Implementing Biometrics to Help Secure the Cloud
Natasha Csicsmann (Pennsylvania State University – Altoona, USA), Victoria McIntyre (Pennsylvania State University – Altoona, USA), Patrick Shea (Pennsylvania State University – Altoona, USA), and Syed S. Rizvi (Pennsylvania State University – Altoona, USA)
DOI: 10.4018/978-1-4666-6559-0.ch011
Abstract
Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing. In this chapter, the authors provide an overview of existing biometrics-based security technologies and discuss some of the open research issues that need to be addressed for making biometric technology an effective tool for cloud computing security. Finally, this chapter provides a performance analysis on the use of large-scale biometrics-based authentication systems for different cloud computing platforms.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR