2017
DOI: 10.1007/978-3-319-68786-5_24
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Security as a Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…It advises on various sizes and domains of organizations to consider SECaaS as one of their potential security approaches. This paper extends our previous work (Wang and Yongchareon, 2017), which briefly introduced a framework to classify the 10 categories of SECaaS into three groups (protective, detective and reactive), with an inclusion of many more literature in our study and comprehensive analysis and discussions around ISO/IEC 27002:2013, advantages and drawbacks related to using SECaaS solutions, challenges and opportunities SECaaS technology realization and recommendations to the Cloud-based business and practitioners.…”
Section: Introductionmentioning
confidence: 59%
See 3 more Smart Citations
“…It advises on various sizes and domains of organizations to consider SECaaS as one of their potential security approaches. This paper extends our previous work (Wang and Yongchareon, 2017), which briefly introduced a framework to classify the 10 categories of SECaaS into three groups (protective, detective and reactive), with an inclusion of many more literature in our study and comprehensive analysis and discussions around ISO/IEC 27002:2013, advantages and drawbacks related to using SECaaS solutions, challenges and opportunities SECaaS technology realization and recommendations to the Cloud-based business and practitioners.…”
Section: Introductionmentioning
confidence: 59%
“…This section introduces the 10 SECaaS categories that have already been identified in our previous work (Wang and Yongchareon, 2017), which then they are later used for the mapping with ISO/IEC 27002:2013.…”
Section: Classificationmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, the abuse of the rights of a user is another security concern. SIEM and intrusion management are considered the main categories for the security analytics service because security analytics is a combination of both categories [30]. The security analytics service is applied as an IaaS to simplify analytical techniques to a user or group.…”
Section: Conceptual Modelmentioning
confidence: 99%