A survey of common security vulnerabilities and corresponding countermeasures for SaaS

被引:0
|
作者
Kim, Donghoon [1 ]
Vouk, Mladen A. [1 ]
机构
[1] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
CLOUD; ISSUES; ACCESS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Software as a Service (SaaS) is the most prevalent service delivery mode for cloud systems. This paper surveys common security vulnerabilities and corresponding countermeasures for SaaS. It is primarily focused on the work published in the last five years. We observe current SaaS security trends and a lack of sufficiently broad and robust countermeasures in some of the SaaS security area such as Identity and Access management due to the growth of SaaS applications.
引用
收藏
页码:59 / 63
页数:5
相关论文
共 50 条
  • [41] Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures
    Siwakoti, Yuba Raj
    Bhurtel, Manish
    Rawat, Danda B. B.
    Oest, Adam
    Johnson, R. C.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (13) : 11224 - 11239
  • [42] Analysis of Security Vulnerabilities and Countermeasures of Ethernet Passive Optical Network (EPON)
    Jin, Di
    Kartalopoulos, Stamatios V.
    Verma, Pramode K.
    CHINA COMMUNICATIONS, 2007, 4 (03) : 17 - 29
  • [43] Security Analysis of Deluge Code Dissemination Algorithm and Corresponding Countermeasures
    Zhang, Guoping
    Xie, Mande
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2011, 5 (02): : 219 - 225
  • [44] Analysis of Security Vulnerabilities and Countermeasures of Ethernet Passive Optical Network(EPON)
    Stamatios V.Kartalopoulos
    Pramode K.Verma
    中国通信, 2007, 4 (03) : 17 - 29
  • [45] A Survey of Security Vulnerabilities in Android Automotive Apps
    Moiz, Abdul
    Alalfi, Manar H.
    3RD INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS (ENCYCRIS 2022), 2022, : 17 - 24
  • [46] SURVEY OF SECURITY VULNERABILITIES IN SESSION INITIATION PROTOCOL
    Geneiatakis, Dimitris
    Dagiuklas, Tasos
    Kambourakis, Georgios
    Lambrinoudakis, Costas
    Gritzalis, Stefanos
    Ehlert, Sven
    Sisalem, Dorgham
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03): : 68 - 81
  • [47] Vulnerabilities and Security Patches Detection in OSS: A Survey
    Lin, Ruyan
    Fu, Yulong
    Yi, Wei
    Yang, Jincheng
    Cao, Jin
    Dong, Zhiqiang
    Xie, Fei
    Li, Hui
    ACM COMPUTING SURVEYS, 2025, 57 (01)
  • [48] A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications
    Sher, Muhammad
    Magedanz, Thomas
    COMPUTER NETWORKS, 2007, 51 (16) : 4697 - 4709
  • [49] A Survey on Voice Assistant Security: Attacks and Countermeasures
    Yan, Chen
    Ji, Xiaoyu
    Wang, Kai
    Jiang, Qinhong
    Jin, Zizhi
    Xu, Wenyuan
    ACM COMPUTING SURVEYS, 2023, 55 (04)
  • [50] Assessment of Information Security Vulnerabilities in Common Seismological Equipment
    Samios, Michael
    Evangelidis, Christos P.
    Serrelis, Emmanouil
    SEISMOLOGICAL RESEARCH LETTERS, 2021, 92 (02) : 933 - 940