2016
DOI: 10.1007/978-3-319-38904-2_22
|View full text |Cite
|
Sign up to set email alerts
|

Implications of Integration and Interoperability for Enterprise Cloud-Based Applications

Abstract: Abstract. Enterprise's adoption of cloud-based solutions is often hindered by problems associated with the integration of the cloud environment with onpremise systems. Currently, each cloud provider creates its proprietary application programing interfaces (APIs), which will complicate integration efforts for companies as they struggle to understand and manage these unique application interfaces in an interoperable way. This paper aims to address this challenge by providing recommendations to enterprises. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…Prior to presenting the proposed taxonomy, it is worthy to mention that the identification of elements and components of the categorization used is based on the critical review of key literatures in [40][41][42][43][44][45], the preceding section and subsequent sections. This critical review followed the systematic approach proposed by [52].…”
Section: Classification Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…Prior to presenting the proposed taxonomy, it is worthy to mention that the identification of elements and components of the categorization used is based on the critical review of key literatures in [40][41][42][43][44][45], the preceding section and subsequent sections. This critical review followed the systematic approach proposed by [52].…”
Section: Classification Methodologymentioning
confidence: 99%
“…As cloud computing adoption rate soars across enterprises (small or large), the risks of vendor lock-in is prevalent. Limited studies exist, except for [40][41][42][43][44], to analyze and highlight the complexity of vendor lock-in problem in the cloud environment. Therefore, when selecting SaaS offerings from cloud vendors, organizations need to consider and balance service criticality against the significance of avoiding potential risks of vendor lock-in.…”
Section: Saas Lock-in Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, minimizing the trust placed on the CSPs is one of the most desired requirements (Kandukuri et al 2009;Aceto et al 2013;ES 2014;Opara-Martins et al 2015). Minimizing required trust can be achieved with advanced cryptographic techniques such as homomorphic encryption, secret sharing and threshold cryptosystems (in order to distribute the trust), bilinear pairing, secure multiparty computation and fully homomorphic encryption (Schneier 2009;Pinkas et al 2009;Huang et al 2011a;Guellier 2014;Coron et al 2014;Smart and Vercauteren 2014;Demmler et al 2015;Wang et al 2015a;Halevi and Shoup 2015a).…”
Section: Trustmentioning
confidence: 97%
“…Virtual machines (VM) are the key aspects of cloud computing where different users (called tenants) access the same physical hardware. However, a corrupted hypervisor can damage all systems that it hosts (Kandukuri et al 2009;Ideler 2012;DNSP 2014;ES 2014;Opara-Martins et al 2015;Klemperer 2015;AlBelooshi et al 2015;Roy et al 2015). One of the best proposed solutions is to utilize Trusted Platform Modules (TPM) which can provide hardware-based verification of hypervisor and VM integrity in order to guarantee network separation and security.…”
Section: Virtualization Hypervisors and Multi-tenancymentioning
confidence: 98%