A survey of common security vulnerabilities and corresponding countermeasures for SaaS

被引:0
|
作者
Kim, Donghoon [1 ]
Vouk, Mladen A. [1 ]
机构
[1] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
CLOUD; ISSUES; ACCESS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Software as a Service (SaaS) is the most prevalent service delivery mode for cloud systems. This paper surveys common security vulnerabilities and corresponding countermeasures for SaaS. It is primarily focused on the work published in the last five years. We observe current SaaS security trends and a lack of sufficiently broad and robust countermeasures in some of the SaaS security area such as Identity and Access management due to the growth of SaaS applications.
引用
收藏
页码:59 / 63
页数:5
相关论文
共 50 条
  • [21] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Yaacoub, Jean-Paul A.
    Noura, Hassan N.
    Salman, Ola
    Chehab, Ali
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (01) : 115 - 158
  • [22] Analysis of Security Features in DLMS/COSEM: Vulnerabilities and Countermeasures
    Luering, Norman
    Szameitat, Daniel
    Hoffmann, Stefan
    Bumiller, Gerd
    2018 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2018,
  • [23] Privacy and security vulnerabilities in edge intelligence: An analysis and countermeasures
    Shafee, Ahmed
    Hasan, S. R.
    Awaad, Tasneem A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [24] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Jean-Paul A. Yaacoub
    Hassan N. Noura
    Ola Salman
    Ali Chehab
    International Journal of Information Security, 2022, 21 : 115 - 158
  • [25] Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks
    Yang, Wei
    Wan, Yadong
    He, Jie
    Cao, Yuanlong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [26] Software Security: Vulnerabilities and Countermeasures for Two Attacker Models
    Piessens, Frank
    Verbauwhede, Ingrid
    PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 990 - 999
  • [27] Security Concerns in Smart Grids: Threats, Vulnerabilities and Countermeasures
    Khelifa, Benahmed
    Abla, Smahi
    PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC'15), 2015, : 772 - 777
  • [28] Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security
    Kumar, Naveen
    Chaudhary, Ankit
    COMPUTER NETWORKS, 2024, 252
  • [29] Security Vulnerabilities of Emerging Nonvolatile Main Memories and Countermeasures
    Kannan, Sachhidh
    Karimi, Naghmeh
    Sinanoglu, Ozgur
    Karri, Ramesh
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (01) : 2 - 15
  • [30] Experiments and countermeasures of security vulnerabilities on next generation network
    Kim, Jeong-Wook
    Cho, Hyug-Hyun
    Mun, Gil-Jong
    Seo, Jae-Hyun
    Noh, Bong-Nam
    Kim, Yong-Min
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 562 - +