نتایج جستجو برای: security as a service

تعداد نتایج: 14071652  

2016
Ayman Helmy Mohamed Aliaa A.A. Youssif Atef Z. Ghalwash

Cloud computing becomes the next-generation architecture of IT Enterprises. Cloud computing is a technology. It enables clients to use high-end services in a form of software as a service. These reside on different servers all over the world. There are many security threats in cloud computing. Data security is one of them. Data security raises client concerns. There are many issues of data secu...

Journal: :J. UCS 2016
Asif Imran Shadi Aljawarneh Kazi Sakib

The largely distributed nature and growing demand for open source Cloud makes the infrastructure an ideal target for malicious attacks that grants unauthorized access to its data storage and posses a serious threat to Cloud software security. In case of any nefarious activity, the Cloud provenance information used by Digital Forensic experts to identify the issue is itself prone to tampering by...

Journal: :JSW 2016
Pablo Matos Denivaldo Lopes Zair Abdelouahab

The development and use of software based on cloud computing have been highlighted more and more nowadays. Software as a Service (SaaS) is considered as a trend for small, medium and large enterprises. However, SaaS brings some challenges concerning information security. In this context, we propose an approach based on Model-Driven Engineering (MDE), weaving models and security techniques for d...

2013
Deepak H. Sharma C A Dhote Manish M. Potey Luis Rodero-Merino Juan Caceres Maik Lindner Dimitrios Katsaros Pankaj Mehra Athena Vakali Tim Mather Subra Kumaraswamy Jianfeng Yang Zhibin Chen Tharam Dillon Chen Wu Elizabeth Chang Bernd Grobauer Thomas Schreck Minqi Zhou Rong Zhang Wei Xie Weining Qian Aoying Zhou Shuai Zhang Shufen Zhang Xuebin Chen Xiuzhen Huo Kresimir Popovic Zeljko Hocenski

In Security-as-a-service model the focus is on security provided as cloud services; i. e. security delivered through the cloud instead of on-premise security solutions. The security-as-a-service model can also enhance functionality of existing on-premise implementations by working as a hybrid solution. The paper provides the comprehensive analysis of security-as-a-service delivery model from va...

Journal: :Decision Support Systems 2011
Alexander Benlian Thomas Hess

IT providers have heralded software-as-a-service (SaaS) as an excellent complement to on-premises software addressing the shortcomings of previous on-demand software solutions such as application service provision (ASP). However, although some practitioners and academics emphasize the opportunities that SaaS offers companies, others already predict its decline due to the considerable risk invol...

2016
Simeon Veloudis Giannis Verginadis Ioannis Patiniotakis Iraklis Paraskakis Gregoris Mentzas

Enterprises are embracing cloud computing in order to reduce costs and increase agility in their everyday business operations. Nevertheless, due mainly to confidentiality, privacy and integrity concerns, many are still reluctant to migrate their sensitive data to the cloud. In this paper, firstly, we outline the construction of a suitable Context-aware Security Model, for enhancing security in ...

2012
Julian Faasen Lisa F. Seymour Joachim Schuler

This interpretive research study explores intention to adopt SaaS ERP software within South African SMEs. Semi-structured interviews with participants from different industry sectors were performed and seven multidimensional factors emerged explaining the current reluctance to adoption. While, improved IT reliability and perceived cost reduction were seem as benefits they were dominated by othe...

2006
Chang-Sun Shin Chung-Sub Lee Su-Chong Joo

This paper suggests a healthcare home service system based on the Distributed Object Group Framework (DOGF) for ubiquitous healthcare in home environment. This system consists of 3 layers. The lower layer includes the physical sensors and devices for healthcare, as a physical layer. The middle layer is the DOGF layer. This framework supports the object grouping service and the real-time service...

2015
Jissy Ann George

Cryptography is essential for the security and integrity of the data that is stored in the cloud. Several cryptographic techniques are used to protect the integrity of data for various applications. A particular security method makes use of different cryptographic techniques to encrypt data and make it into an un-readable form, which can then be decrypted only with the help of a key. A number o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید