Skip to main content

Market Overview of Security as a Service Systems

  • Chapter
ISSE 2011 Securing Electronic Business Processes

Abstract

Companies are facing increasing threats regarding the security and safety of their IT systems. Whereas the Cloud computing paradigm itself induces certain security-related risks, it is also discussed as a possible solution to obtain IT security services in a flexible way. The outsourcing of IT security according to Cloud computing principles is referred to as Security as a Service. Such systems are the next step of the evolution of traditional managed security services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Armbrust, M., Fox, A., Griffith, R., Joseph A. D., Katz, R. H., Konwinski A., Lee, G., Patterson D. A., Rabkin, A., Stoica I., and Zaharia, M.: Above the Clouds: A Berkeley View of Cloud Computing. EECS Department, University of California, 2009.

    Google Scholar 

  • Bertino, E., Martino, L., Paci, F., and Squicciarrini, A.: Security for Web Services and Service- Oriented Architectures. Springer, Heidelberg, 2010.

    Book  Google Scholar 

  • Brock, M. and Goscinski, A.: Toward a Framework for Cloud Security. In: Algorithms and Architectures for Parallel Processing. C.-H. Hsu, L. Yang, J. Park and S.-S. Yeo: Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 2010, p. 254–263.

    Google Scholar 

  • Furth, B.: Cloud Computing Fundamentals. In: Handbook of Cloud Computing. B. Furht and A. Escalante: Springer US, Boston, MA, 2010, p. 3–20.

    Google Scholar 

  • Gartner: Gartner Says Security Delivered as a Cloud-Based Service Will More Than Triple in Many Segments by 2013, www.gartner.com/it/page.jsp?id=722307, 2008, Accessed 24 July 2010.

  • Gattiker, U. E.: The Information Security Dictionary: Defining The Terms That Define Security For E-business, Internet, Information And Wireless Technology. Kluwer Academic Publishers, Norwell, MA, USA, 2004.

    MATH  Google Scholar 

  • Hafner, M., Mukhtiar, M., and Breu, R.: SeAAS - A Reference Architecture for Security Services in SOA. In: UCS 15, 2009, p. 2916–2936.

    Google Scholar 

  • Höfer, C. and Karagiannis, G.: Cloud computing services: taxonomy and comparison. In: Journal of Internet Services and Applications, 2011, p. 1–14.

    Google Scholar 

  • Hommel, W.: Architektur- und Werkzeugkonzepte für föderiertes Identitäts-Management. Dr. Hut, München, 2007.

    Google Scholar 

  • Huber, M.: IT-security in global corporate networks. Center for Digital Technology and Management, München, 2002.

    Google Scholar 

  • Kark, K.: Market Overview: Managed Security Services. http://www.verizonbusiness.com/resources/analystreports/ar_forrester_managed_security_services2010_en_xg.pdf, 2010, Accessed 16 March 2011.

  • Keuper, F., Wagner, B., and Wysuwa, H.: Managed Services: IT-Sourcing der nächsten Generation. Gabler, 2009.

    Google Scholar 

  • Mather, T., Kumaraswamy, S., and Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media, Inc., 2009.

    Google Scholar 

  • Mell, P. and Grance, T.: The NIST Definition of Cloud Computing. In: National Institute of Standards and Technology 53, 6, 50, 2009.

    Google Scholar 

  • Peterson, G.: Service-Oriented Security Indications for Use. In: Computing in Science and Engineering 7, 2009, p. 91–93.

    Google Scholar 

  • Pietre-Cambacedes, L. and Chaudet, C., Disentangling the relations between safety and security. In: Proceedings of the 9th WSEAS international conference on Applied informatics and communications. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, 2009, p. 156–161.

    Google Scholar 

  • Rittinghouse, J. and Ransome, J.: Cloud Computing: Implementation, Management, and Security. CRC, Boca Raton, 2010.

    Google Scholar 

  • Smith, D. M.: Hype Cycle for Cloud Computing, 2010. http://www.gartner.com/DisplayDocument?doc_cd=201557, 2010, Accessed 13 July 2011.

  • Stanoevska-Slabeva, K., Wozniak, T., and Hoyer, V.: Practical Guidelines for Evolving IT Infrastructure towards Grids and Clouds. In: Grid and Cloud Computing: A Business Perspective on Technology and Applications, K. Stanoevska-Slabeva, T. Wozniak and S. Ristol: Springer, Berlin, 2010, p. 225–243.

    Chapter  Google Scholar 

  • Vaquero, L. M., Rodero-Merino, L., Caceres, J., and Lindner, M.: A break in the Clouds. In: SIGCOMM Comput. Commun. Rev 39, 1, 50, 2008.

    Article  Google Scholar 

  • William Y Chang, H. A.-A. J. F. S.: Transforming Enterprise Cloud Services. Springer-Verlag New York Inc., 2010.

    Google Scholar 

  • Zhang, Q., Cheng, L., and Boutaba, R.: Cloud computing: state-of-the-art and research challenges. In: Journal of Internet Services and Applications 1, 1, 2010, p. 7–18.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH

About this chapter

Cite this chapter

Senk, C., Holzapfel, A. (2012). Market Overview of Security as a Service Systems. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2011 Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-8348-8652-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-8652-1_4

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-8348-1911-6

  • Online ISBN: 978-3-8348-8652-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics