Enterprise security: why do we make it so difficult?
Enterprise security: why do we make it so difficult?
Achieving information security and privacy is not a trivial exercise. This becomes much more challenging in the cloud, due to the multi-tenancy nature of cloud ecosystems. We are concerned that the traditional legacy compatible approach to software development is holding enterprises back from achieving effective security and privacy, particularly in the cloud. In this paper we discuss the implications of the traditional approach to software development and question why we stick to this approach, despite the fact that this approach makes the job of security and privacy far more difficult.
cloud security and privacy, legacy software
Duncan, Bob
1c606306-b088-4e46-87c5-f7f6a5e2a482
Whittington, Mark
282d04d1-f00b-4161-a45e-fb5328880ca1
Chang, Victor
a7c75287-b649-4a63-a26c-6af6f26525a4
28 October 2016
Duncan, Bob
1c606306-b088-4e46-87c5-f7f6a5e2a482
Whittington, Mark
282d04d1-f00b-4161-a45e-fb5328880ca1
Chang, Victor
a7c75287-b649-4a63-a26c-6af6f26525a4
Duncan, Bob, Whittington, Mark and Chang, Victor
(2016)
Enterprise security: why do we make it so difficult?
Enterprise Security 2016 (Suzhou), EAMSA 2016, Suzhou, China.
28 Oct 2016.
Record type:
Conference or Workshop Item
(Paper)
Abstract
Achieving information security and privacy is not a trivial exercise. This becomes much more challenging in the cloud, due to the multi-tenancy nature of cloud ecosystems. We are concerned that the traditional legacy compatible approach to software development is holding enterprises back from achieving effective security and privacy, particularly in the cloud. In this paper we discuss the implications of the traditional approach to software development and question why we stick to this approach, despite the fact that this approach makes the job of security and privacy far more difficult.
More information
Published date: 28 October 2016
Venue - Dates:
Enterprise Security 2016 (Suzhou), EAMSA 2016, Suzhou, China, 2016-10-28 - 2016-10-28
Keywords:
cloud security and privacy, legacy software
Organisations:
Electronic & Software Systems
Identifiers
Local EPrints ID: 401927
URI: http://eprints.soton.ac.uk/id/eprint/401927
PURE UUID: 4430398c-2136-41ed-b0ca-cbd2155979ad
Catalogue record
Date deposited: 22 Oct 2016 10:52
Last modified: 15 Mar 2024 02:58
Export record
Contributors
Author:
Bob Duncan
Author:
Mark Whittington
Author:
Victor Chang
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics