The University of Southampton
University of Southampton Institutional Repository

Enterprise security: why do we make it so difficult?

Enterprise security: why do we make it so difficult?
Enterprise security: why do we make it so difficult?
Achieving information security and privacy is not a trivial exercise. This becomes much more challenging in the cloud, due to the multi-tenancy nature of cloud ecosystems. We are concerned that the traditional legacy compatible approach to software development is holding enterprises back from achieving effective security and privacy, particularly in the cloud. In this paper we discuss the implications of the traditional approach to software development and question why we stick to this approach, despite the fact that this approach makes the job of security and privacy far more difficult.
cloud security and privacy, legacy software
Duncan, Bob
1c606306-b088-4e46-87c5-f7f6a5e2a482
Whittington, Mark
282d04d1-f00b-4161-a45e-fb5328880ca1
Chang, Victor
a7c75287-b649-4a63-a26c-6af6f26525a4
Duncan, Bob
1c606306-b088-4e46-87c5-f7f6a5e2a482
Whittington, Mark
282d04d1-f00b-4161-a45e-fb5328880ca1
Chang, Victor
a7c75287-b649-4a63-a26c-6af6f26525a4

Duncan, Bob, Whittington, Mark and Chang, Victor (2016) Enterprise security: why do we make it so difficult? Enterprise Security 2016 (Suzhou), EAMSA 2016, Suzhou, China. 28 Oct 2016.

Record type: Conference or Workshop Item (Paper)

Abstract

Achieving information security and privacy is not a trivial exercise. This becomes much more challenging in the cloud, due to the multi-tenancy nature of cloud ecosystems. We are concerned that the traditional legacy compatible approach to software development is holding enterprises back from achieving effective security and privacy, particularly in the cloud. In this paper we discuss the implications of the traditional approach to software development and question why we stick to this approach, despite the fact that this approach makes the job of security and privacy far more difficult.

Text
SoftSec.pdf - Other
Download (98kB)

More information

Published date: 28 October 2016
Venue - Dates: Enterprise Security 2016 (Suzhou), EAMSA 2016, Suzhou, China, 2016-10-28 - 2016-10-28
Keywords: cloud security and privacy, legacy software
Organisations: Electronic & Software Systems

Identifiers

Local EPrints ID: 401927
URI: http://eprints.soton.ac.uk/id/eprint/401927
PURE UUID: 4430398c-2136-41ed-b0ca-cbd2155979ad

Catalogue record

Date deposited: 22 Oct 2016 10:52
Last modified: 15 Mar 2024 02:58

Export record

Contributors

Author: Bob Duncan
Author: Mark Whittington
Author: Victor Chang

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×