2015 Science and Information Conference (SAI) 2015
DOI: 10.1109/sai.2015.7237140
|View full text |Cite
|
Sign up to set email alerts
|

Software as a service: Understanding security issues

Abstract: Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…A cost-utility analysis compares the weighted advantages of a DMS with the costs of acquisition and maintenance [15,16]. The utility value is the sum of the calculated point values of individual criteria, taking into account a weighting factor.…”
Section: Cost-utility Analysismentioning
confidence: 99%
“…A cost-utility analysis compares the weighted advantages of a DMS with the costs of acquisition and maintenance [15,16]. The utility value is the sum of the calculated point values of individual criteria, taking into account a weighting factor.…”
Section: Cost-utility Analysismentioning
confidence: 99%
“…In this, the author analyzed the type of vulnerable activities and explained the scenarios of the incident of attack and also proved the attack taxonomy's applicability and appropriateness. Chouhan et al (2015) [18]described the software vendors is not ready to pay more expense on deployment and maintenance, due to the modern technologies in the high-speed internet and software development. The software admires all the providers and users as a service (SaaS) for utilizing the features.…”
Section: A Survey Of Cloud and Data Securitymentioning
confidence: 99%
“…Therefore, protection will be plentiful tougher if Internet of Things arrangement is considered to be intruder resistant. [21] [22] 2) Denial of service: This type of dangerous attack is an effort to create a machine or resource inaccessible to its valuable users. The mainstream of strategies in Internet of Things is susceptible to supply occurrences because of low memory skills and limited reckoning possessions.…”
Section: Security Threats In Internet Of Thingsmentioning
confidence: 99%