scholarly journals From keyboard to cloud-base network revamped data lifecycle cybersecurity

2021 ◽  
Vol 11 (3) ◽  
pp. 226-233
Author(s):  
Amadi Chukwuemeka Augustine ◽  
Juliet Nnenna Odii ◽  
Stanley A Okolie

This paper review seeks to identify the need for a revamped data life cycle security in the era of pervasive threat from skill cyber criminals at this time of internet of things. The motivation is to fill the knowledge gap by presenting some of the ways of data leakages and the likely protection in the organization. The aim is to present a good practice that encourages data confidentiality, acceptable use policy, knowledge of personnel and physical security policy. The building blocks of information security infrastructure across the entire organization is implemented by Enterprise Security Architecture. Rather than focus on individual functional and non-functional components in an individual application, it focuses on a strategic design for a set of security services that can be leveraged by multiple applications, systems, or business processes.

2010 ◽  
pp. 628-643
Author(s):  
Spiros Alexakis ◽  
Markus Bauer ◽  
András Balogh ◽  
Akos Kiss

The research project FUSION aims at supporting collaboration and interconnection between enterprises with technologies that allow for the semantic fusion of heterogeneous service-oriented business applications. The resulting FUSION approach is an enterprise application integration (EAI) conceptual framework proposing a system architecture that supports the composition of business processes using semantically annotated Web services as building blocks. The approach has been validated in the frame of three collaborative commercial proof-of-concept pilots. The chapter provides an overview on the FUSION approach and summarises our integration experiences with the application of the FUSION approach and tools during the implementation of transnational career and human resource management services.


Author(s):  
Juan Manuel Adán-Coello

Service-oriented computing (SOC) is a new computing paradigm that uses services as building blocks to accelerate the development of distributed applications in heterogeneous computer environments. SOC promises a world of cooperating services where application components are combined with little effort into a network of loosely coupled services for creating flexible and dynamic business processes that can cover many organizations and computing platforms (Chesbrough & Spohrer, 2006; Papazoglou & Georgakopoulos, 2003). From a technical point of view, the efforts to offer services have focused on the development of standards and the creation of the infrastructure necessary to describe, discover, and access services using the Web. This type of service is usually called a Web service. The availability of an abundant number of Web services defines a platform for distributed computing in which information and services are supplied on demand, and new services can be created (composed) using available services. Nevertheless, the composition of Web services involves three fundamental problems (Sycara, Paolucci, Ankolekar, & Srinivasan, 2003): 1. To elaborate a plan that describes how Web services interact, how the functionally they offer can be integrated to provide a solution to the considered problem. 2. To discover Web services that accomplish the tasks required by the plan. 3. To manage the interaction of the chosen services. Problems 2 and 3 are of responsibility of the infrastructure that supports the composition of services, while the first problem is of responsibility of the (software) agents that use the infrastructure. The discovery and interaction of Web services poses two main challenges to the infrastructure: 1. How to represent Web services capabilities and how to recognize the similarities between service capabilities and the required functionalities. 2. How to specify the information a Web service requires and provides, the interaction protocol, and the low-level mechanisms required to service invocation.


Author(s):  
Spiros Alexakis ◽  
Markus Bauer ◽  
András Balogh ◽  
Akos Kiss

The research project FUSION aims at supporting collaboration and interconnection between enterprises with technologies that allow for the semantic fusion of heterogeneous service-oriented business applications. The resulting FUSION approach is an enterprise application integration (EAI) conceptual framework proposing a system architecture that supports the composition of business processes using semantically annotated Web services as building blocks. The approach has been validated in the frame of three collaborative commercial proof-of-concept pilots. The chapter provides an overview on the FUSION approach and summarises our integration experiences with the application of the FUSION approach and tools during the implementation of transnational career and human resource management services.


Author(s):  
Brian T. Contos ◽  
William P. Crowell ◽  
Colby DeRodeff ◽  
Dan Dunkel ◽  
Eric Cole ◽  
...  

2022 ◽  
pp. 83-112
Author(s):  
Myo Zarny ◽  
Meng Xu ◽  
Yi Sun

Network security policy automation enables enterprise security teams to keep pace with increasingly dynamic changes in on-premises and public/hybrid cloud environments. This chapter discusses the most common use cases for policy automation in the enterprise, and new automation methodologies to address them by taking the reader step-by-step through sample use cases. It also looks into how emerging automation solutions are using big data, artificial intelligence, and machine learning technologies to further accelerate network security policy automation and improve application and network security in the process.


2011 ◽  
Vol 187 ◽  
pp. 358-361
Author(s):  
Hua Jiang ◽  
Jing Wen

As the low maintenance cost of data trusteeship, more and more medium-size and small size enterprises choose data trusteeship service. Data is valuable fortune of enterprise, security of enterprise data must be guaranteed in the condition of together using a same host. Data security includes data transmission security, data storage security and confidentiality security. The paper discusses the security problem and coping strategy of database data in a data trusteeship environment. Two-phase sub-keys encryption algorithm is used to encrypt the data and also analysis its usability and security. The realized method is further presented. The algorithm solves the data security problem of database in a data trusteeship environment effectively and further enhances the security of database data.


Sign in / Sign up

Export Citation Format

Share Document