2016
DOI: 10.1016/j.bushor.2016.08.002
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating single sign-on security failure in cloud services

Abstract: The

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
13
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 14 publications
1
13
0
Order By: Relevance
“…As the service is provided with the help of the internet there is no need of installing and running the applications on individual systems. The main security threats [3] [7] in this layer are risks in data accessing and web applications services and the solutions to overcome these issues is service level agreement [4], web application scanners between the attributes and classify the same into sub attributes groups are also a notable work by Dromey et al [6].…”
Section: Software As a Servicementioning
confidence: 99%
See 4 more Smart Citations
“…As the service is provided with the help of the internet there is no need of installing and running the applications on individual systems. The main security threats [3] [7] in this layer are risks in data accessing and web applications services and the solutions to overcome these issues is service level agreement [4], web application scanners between the attributes and classify the same into sub attributes groups are also a notable work by Dromey et al [6].…”
Section: Software As a Servicementioning
confidence: 99%
“…It can build a virtual data center in the cloud which means a collection of cloud resources specifically designed for business needs. Some of the services provided by Iaas are Amazon Web Service (AWS) [7] [12], Microsoft Azure, Cisco Metapod etc. The major security threats that occur in Iaas is in virtualization [3].…”
Section: Infrastructure As a Servicementioning
confidence: 99%
See 3 more Smart Citations