Data, Engineering and Applications 2019
DOI: 10.1007/978-981-13-6351-1_4
|View full text |Cite
|
Sign up to set email alerts
|

Log-Based Approach for Security Implementation in Cloud CRM’s

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…The authors of [41][42][43] emphasize wood logging for research purposes. In particular, the authors of [42] proposed a separate location log on the client side and then aligned it with the CSP log using unique IDs and timestamps that provide relevant event details.…”
Section: Log-based Approach Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…The authors of [41][42][43] emphasize wood logging for research purposes. In particular, the authors of [42] proposed a separate location log on the client side and then aligned it with the CSP log using unique IDs and timestamps that provide relevant event details.…”
Section: Log-based Approach Modelmentioning
confidence: 99%
“…However, going back to Sang's suggestion [42] that CSPcontrolled information has entered the client's side, it is argued that this limitation ensures comparable data on both sides of the transaction, i.e., the client side and the CSP side. The authors of [43] identify specific security and privacy threats over the SaaS-based CRM solutions and the measures to overcome them to ensure business processes' smooth functioning.…”
Section: Log-based Approach Modelmentioning
confidence: 99%
See 3 more Smart Citations