Abstract
Companies are facing increasing threats regarding the security and safety of their IT systems. Whereas the Cloud computing paradigm itself induces certain security-related risks, it is also discussed as a possible solution to obtain IT security services in a flexible way. The outsourcing of IT security according to Cloud computing principles is referred to as Security as a Service. Such systems are the next step of the evolution of traditional managed security services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Armbrust, M., Fox, A., Griffith, R., Joseph A. D., Katz, R. H., Konwinski A., Lee, G., Patterson D. A., Rabkin, A., Stoica I., and Zaharia, M.: Above the Clouds: A Berkeley View of Cloud Computing. EECS Department, University of California, 2009.
Bertino, E., Martino, L., Paci, F., and Squicciarrini, A.: Security for Web Services and Service- Oriented Architectures. Springer, Heidelberg, 2010.
Brock, M. and Goscinski, A.: Toward a Framework for Cloud Security. In: Algorithms and Architectures for Parallel Processing. C.-H. Hsu, L. Yang, J. Park and S.-S. Yeo: Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 2010, p. 254–263.
Furth, B.: Cloud Computing Fundamentals. In: Handbook of Cloud Computing. B. Furht and A. Escalante: Springer US, Boston, MA, 2010, p. 3–20.
Gartner: Gartner Says Security Delivered as a Cloud-Based Service Will More Than Triple in Many Segments by 2013, www.gartner.com/it/page.jsp?id=722307, 2008, Accessed 24 July 2010.
Gattiker, U. E.: The Information Security Dictionary: Defining The Terms That Define Security For E-business, Internet, Information And Wireless Technology. Kluwer Academic Publishers, Norwell, MA, USA, 2004.
Hafner, M., Mukhtiar, M., and Breu, R.: SeAAS - A Reference Architecture for Security Services in SOA. In: UCS 15, 2009, p. 2916–2936.
Höfer, C. and Karagiannis, G.: Cloud computing services: taxonomy and comparison. In: Journal of Internet Services and Applications, 2011, p. 1–14.
Hommel, W.: Architektur- und Werkzeugkonzepte für föderiertes Identitäts-Management. Dr. Hut, München, 2007.
Huber, M.: IT-security in global corporate networks. Center for Digital Technology and Management, München, 2002.
Kark, K.: Market Overview: Managed Security Services. http://www.verizonbusiness.com/resources/analystreports/ar_forrester_managed_security_services2010_en_xg.pdf, 2010, Accessed 16 March 2011.
Keuper, F., Wagner, B., and Wysuwa, H.: Managed Services: IT-Sourcing der nächsten Generation. Gabler, 2009.
Mather, T., Kumaraswamy, S., and Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media, Inc., 2009.
Mell, P. and Grance, T.: The NIST Definition of Cloud Computing. In: National Institute of Standards and Technology 53, 6, 50, 2009.
Peterson, G.: Service-Oriented Security Indications for Use. In: Computing in Science and Engineering 7, 2009, p. 91–93.
Pietre-Cambacedes, L. and Chaudet, C., Disentangling the relations between safety and security. In: Proceedings of the 9th WSEAS international conference on Applied informatics and communications. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, 2009, p. 156–161.
Rittinghouse, J. and Ransome, J.: Cloud Computing: Implementation, Management, and Security. CRC, Boca Raton, 2010.
Smith, D. M.: Hype Cycle for Cloud Computing, 2010. http://www.gartner.com/DisplayDocument?doc_cd=201557, 2010, Accessed 13 July 2011.
Stanoevska-Slabeva, K., Wozniak, T., and Hoyer, V.: Practical Guidelines for Evolving IT Infrastructure towards Grids and Clouds. In: Grid and Cloud Computing: A Business Perspective on Technology and Applications, K. Stanoevska-Slabeva, T. Wozniak and S. Ristol: Springer, Berlin, 2010, p. 225–243.
Vaquero, L. M., Rodero-Merino, L., Caceres, J., and Lindner, M.: A break in the Clouds. In: SIGCOMM Comput. Commun. Rev 39, 1, 50, 2008.
William Y Chang, H. A.-A. J. F. S.: Transforming Enterprise Cloud Services. Springer-Verlag New York Inc., 2010.
Zhang, Q., Cheng, L., and Boutaba, R.: Cloud computing: state-of-the-art and research challenges. In: Journal of Internet Services and Applications 1, 1, 2010, p. 7–18.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2012 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH
About this chapter
Cite this chapter
Senk, C., Holzapfel, A. (2012). Market Overview of Security as a Service Systems. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2011 Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-8348-8652-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-8348-8652-1_4
Publisher Name: Vieweg+Teubner Verlag
Print ISBN: 978-3-8348-1911-6
Online ISBN: 978-3-8348-8652-1
eBook Packages: Computer ScienceComputer Science (R0)