ItemBook Chapter

HCI Authentication to Prevent Internal Threats in Cloud Computing