IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Security Innovation: Personalisation of Security Services in a Mobile Cloud Infrastructure

Information Security Innovation: Personalisation of Security Services in a Mobile Cloud Infrastructure
View Sample PDF
Author(s): Jan H. P. Eloff (SAP Innovation Center Pretoria, South Africa & Department Computer Science, University of Pretoria, South Africa), Mariki M. Eloff (University of South Africa, South Africa), Madeleine A. Bihina Bella (SAP Innovation Center Pretoria, South Africa), Donovan Isherwood (University of Johannesburg, South Africa), Moses T. Dlamini (University of Pretoria, South Africa)and Ernest Ketcha Ngassam (University of South Africa, South Africa)
Copyright: 2019
Pages: 14
Source title: Cloud Security: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-8176-5.ch012

Purchase

View Information Security Innovation: Personalisation of Security Services in a Mobile Cloud Infrastructure on the publisher's website for pricing and purchasing information.

Abstract

The increasing demand for online and real-time interaction with IT infrastructures by end users is facilitated by the proliferation of user-centric devices such as laptops, iPods, iPads, and smartphones. This trend is furthermore propounded by the plethora of apps downloadable to end user devices mostly within mobile-cum-cloud environments. It is clear that there are many evidences of innovation with regard to end user devices and apps. Unfortunately, little, if any, information security innovation took place over the past number of years with regard to the consumption of security services by end users. This creates the need for innovative security solutions that are human-centric and flexible. This chapter presents a framework for consuming loosely coupled (but interoperable) cloud-based security services by a variety of end users in an efficient and flexible manner using their mobile devices.

Related Content

Dina Darwish. © 2024. 43 pages.
Kassim Kalinaki, Musau Abdullatif, Sempala Abdul-Karim Nasser, Ronald Nsubuga, Julius Kugonza. © 2024. 23 pages.
Yogita Yashveer Raghav, Ramesh Kait. © 2024. 17 pages.
Renuka Devi Saravanan, Shyamala Loganathan, Saraswathi Shunmuganathan. © 2024. 21 pages.
Veera Talukdar, Ardhariksa Zukhruf Kurniullah, Palak Keshwani, Huma Khan, Sabyasachi Pramanik, Ankur Gupta, Digvijay Pandey. © 2024. 30 pages.
Dharmesh Dhabliya, Sukhvinder Singh Dari, Nitin N. Sakhare, Anish Kumar Dhablia, Digvijay Pandey, Balakumar Muniandi, A. Shaji George, A. Shahul Hameed, Pankaj Dadheech. © 2024. 9 pages.
Avtar Singh, Shobhana Kashyap. © 2024. 11 pages.
Body Bottom