Proceedings of the WICSA 2014 Companion Volume 2014
DOI: 10.1145/2578128.2578229
|View full text |Cite
|
Sign up to set email alerts
|

A security reference architecture for cloud systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…For example, Hamid et al (Hamid et al, 2013) have used S&D patterns because their research is focused on embedded systems. Another example is the work of Fernandez and Monge (Fernandez and Monge, 2014) in which they use cloudspecific patterns when discussing a security reference architecture for cloud systems. Attempting to research the usage of security patterns by limiting the scope to a specific environment or a specific set of patterns might have some drawbacks.…”
Section: Research Efforts Towards Security Pattern Usage (Rq10 Rq11mentioning
confidence: 99%
“…For example, Hamid et al (Hamid et al, 2013) have used S&D patterns because their research is focused on embedded systems. Another example is the work of Fernandez and Monge (Fernandez and Monge, 2014) in which they use cloudspecific patterns when discussing a security reference architecture for cloud systems. Attempting to research the usage of security patterns by limiting the scope to a specific environment or a specific set of patterns might have some drawbacks.…”
Section: Research Efforts Towards Security Pattern Usage (Rq10 Rq11mentioning
confidence: 99%
“…There is a significant number of security pattern research in software engineering [8,9,[70][71][72][73][74][75]. However, that research focused on general topic and not particularly on the Cloud.…”
Section: Related Workmentioning
confidence: 99%
“…In order to realise this requirement, the Cloud SaaS community is in overwhelming need for structured information about best security practices and security knowledge, to help them design and develop secure Cloud SaaS. So far, there is some research [4][5][6][7][8][9][10][11][12][13][14] on security patterns, and they tend to address a specific security area (e.g., OWASP [11,14] web development security guideline where the focus is only on how to develop a secure code and how to prevent cyber attacks) and do not cover many important aspects, such as privacy and governance. Moreover, there is a lack of structured and united information about security best practices and security knowledge that SaaS developer can use as a guideline for developing Cloud SaaS application from the ground up.…”
Section: Introductionmentioning
confidence: 99%