Brown, 2014 - Google Patents
Qualitative study of the end user's perception of software as a service (SaaS) in the cloudBrown, 2014
- Document ID
- 6557363713397657309
- Author
- Brown L
- Publication year
External Links
Snippet
Abstract Software as a Service (SaaS) is a software application delivery model hosted and deployed by a software vendor and used by customers over the internet (Liu, 2010). SaaS is an emerging technology that many end users today are resistant to use. The issue is due to …
- 238000011160 research 0 abstract description 81
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11627054B1 (en) | Methods and systems to manage data objects in a cloud computing environment | |
| US10467426B1 (en) | Methods and systems to manage data objects in a cloud computing environment | |
| Lepoint et al. | Blockcis—a blockchain-based cyber insurance system | |
| Dulaney et al. | CompTIA Security+ Study Guide: Exam SY0-501 | |
| Farrell | Securing the cloud—governance, risk, and compliance issues reign supreme | |
| Hausman et al. | Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001 | |
| Sahin | Cloud ERP security: guidelines for evaluation | |
| Macharia | Cloud computing risk: a decision-making framework | |
| Rah | Device Management in the Security of “Bring Your Own Device”(BYOD) for the Post-pandemic, Remote Workplace | |
| Nomani | Mastering Cloud Security Posture Management (CSPM): Secure Multi-cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques | |
| Kumar et al. | User centric approach to identity management in cloud computing environment: An empirically tested framework | |
| Brown | Qualitative study of the end user's perception of software as a service (SaaS) in the cloud | |
| Iyer et al. | Hybrid Cloud Security Patterns | |
| Mishra | Cloud Security Handbook for Architects: Practical Strategies and Solutions for Architecting Enterprise Cloud Security Using SECaaS and DevSecOps | |
| Lucas | Exploring the strategies cybersecurity managers recommend for implementing or transitioning to the cloud | |
| Alamoudi et al. | CLOUD COMPUTING-THE FUTURE OF BUSINESS. | |
| AlNaaji | Automating unauthorized access attempts detection and handling using robotic process automation | |
| Vijverberg | Management of Cloud Risk Governance: Analyzing Top Risk Topics and a Maturity Model | |
| Lasopoulou | Cloud security and privacy | |
| Al Rashdi | Information security accountability in the cloud computing context | |
| Yokowo | Building a Cybersecurity Maturity Guide For Small and Medium-sized Enterprises (SME) With Open Source Solutions | |
| Unigwe | Exploring Risk Management Strategies for Transitioning to Cloud within Financial Services Industry: A Grounded Theory Study | |
| Möller | Network and Information Security (NIS2) | |
| Stivala et al. | Behind the Curtain: How Shared Hosting Providers Respond to Vulnerability Notifications | |
| Udayakumar et al. | MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 |