[go: up one dir, main page]

Brown, 2014 - Google Patents

Qualitative study of the end user's perception of software as a service (SaaS) in the cloud

Brown, 2014

Document ID
6557363713397657309
Author
Brown L
Publication year

External Links

Snippet

Abstract Software as a Service (SaaS) is a software application delivery model hosted and deployed by a software vendor and used by customers over the internet (Liu, 2010). SaaS is an emerging technology that many end users today are resistant to use. The issue is due to …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes

Similar Documents

Publication Publication Date Title
US11627054B1 (en) Methods and systems to manage data objects in a cloud computing environment
US10467426B1 (en) Methods and systems to manage data objects in a cloud computing environment
Lepoint et al. Blockcis—a blockchain-based cyber insurance system
Dulaney et al. CompTIA Security+ Study Guide: Exam SY0-501
Farrell Securing the cloud—governance, risk, and compliance issues reign supreme
Hausman et al. Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001
Sahin Cloud ERP security: guidelines for evaluation
Macharia Cloud computing risk: a decision-making framework
Rah Device Management in the Security of “Bring Your Own Device”(BYOD) for the Post-pandemic, Remote Workplace
Nomani Mastering Cloud Security Posture Management (CSPM): Secure Multi-cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques
Kumar et al. User centric approach to identity management in cloud computing environment: An empirically tested framework
Brown Qualitative study of the end user's perception of software as a service (SaaS) in the cloud
Iyer et al. Hybrid Cloud Security Patterns
Mishra Cloud Security Handbook for Architects: Practical Strategies and Solutions for Architecting Enterprise Cloud Security Using SECaaS and DevSecOps
Lucas Exploring the strategies cybersecurity managers recommend for implementing or transitioning to the cloud
Alamoudi et al. CLOUD COMPUTING-THE FUTURE OF BUSINESS.
AlNaaji Automating unauthorized access attempts detection and handling using robotic process automation
Vijverberg Management of Cloud Risk Governance: Analyzing Top Risk Topics and a Maturity Model
Lasopoulou Cloud security and privacy
Al Rashdi Information security accountability in the cloud computing context
Yokowo Building a Cybersecurity Maturity Guide For Small and Medium-sized Enterprises (SME) With Open Source Solutions
Unigwe Exploring Risk Management Strategies for Transitioning to Cloud within Financial Services Industry: A Grounded Theory Study
Möller Network and Information Security (NIS2)
Stivala et al. Behind the Curtain: How Shared Hosting Providers Respond to Vulnerability Notifications
Udayakumar et al. MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100