scispace - formally typeset
Search or ask a question
Topic

Software as a service

About: Software as a service is a research topic. Over the lifetime, 8514 publications have been published within this topic receiving 136177 citations. The topic is also known as: Service as a Software Substitute & SaaSS.


Papers
More filters
Book
21 Apr 2011
TL;DR: This book details the strengths and weaknesses of securing your company's information with different cloud approaches, and offers a clear and concise framework to secure your business' assets while making the most of this new technology.
Abstract: As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, consideringalternate approaches such as private vs. public clouds, SaaS vs. IaaS,and loss of control and lack of trustDiscusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recoveryDetails the benefits of moving to the cloud-solving for limited availability of space, power and storage

149 citations

Patent
16 Sep 2010
TL;DR: In this paper, a software update system includes a client application that generates a request for software updates applicable to the computer hosts and initiates automatic deployment of the software update to the host and a server application that provides software update data to the client application in response to the request.
Abstract: A software update system automatically deploys software updates, approved by a provider of a process control system, to computer hosts that execute the process control system. The software update system includes a client application that generates a request for software updates applicable to the computer hosts and initiates automatic deployment of the software update to the host, and a server application that provides software update data to the client application in response to the request.

149 citations

Patent
05 May 2009
TL;DR: In this paper, the authors present a system and methods for facilitating software as a service (SAAS) by receiving information of SAAS offerings and metrics for tracking a users use of the SAAS offering.
Abstract: Systems and methods are provided for facilitating software as a service (SAAS) by receiving information of SAAS offerings and metrics for tracking a users use of the SAAS offerings. The systems may be used to create SAAS orders and provide compliance and auditing of the SAAS, as well as generating invoices and receiving payment for the SAAS.

149 citations

Patent
02 Aug 2011
TL;DR: In this paper, the authors describe a system that uses software adapters to provide integrated information technology service management (ITSM) for cloud resources, where the input parameter in a first data format type is converted by the software adapter to a second data format types, the second data formats supported by a second software application.
Abstract: Systems and methods described herein use software adapters to provide integrated information technology service management (ITSM) for cloud resources. Software adapters in the cloud resources convert data format types of an input parameter received at a first software application in a backend computing device. An ITSM function of a second software application provides management for the cloud resources. The input parameter in a first data format type is converted by the software adapter to a second data format type, the second data format type supported by a second software application. The ITSM function of the second software application is executed using the input parameter in the second data format type, thereby providing an output of the ITSM function, the output including information and executable instructions for management of the cloud resources.

147 citations

01 Jan 2013
TL;DR: A proposed methodology, “Securing cloud from DDOS attacks using intrusion detection system in virtual machine”, which detects different kinds of vulnerabilities and can be overcome by using proposed system.
Abstract: Cloud Computing is the newly emerged technology of Distributed Computing System. Cloud Computing user concentrate on API security & provide services to its consumers in multitenant environment into three layers namely, Software as a service, Platform as a service and Infrastructure as a service, with the help of web services. It provides service facilities to its consumers on demand . These service provided can easily invites attacker to attack by Saas ,Paas, Iaas. Since the resources are gathered at one place in data centers in cloud computing, the DDOS attacks such as HTTP & XML in this environment is dangerous & provides harmful effects and also all consumer will be affected at the same time. These attacks can be resolved & detected by a proposed methodology, “Securing cloud from DDOS attacks using intrusion detection system in virtual machine”.In this methodology, this problem can be overcome by using proposed system. The different kinds of vulnerabilities are detected in proposed system. The SOAP request makes the communication between the client and the service provider. Through the Service Oriented Traceback Architecture the SOAP request is send to the cloud. In this architecture service oriented trace back mark is present which contain proxy within it. The proxy that marks the incoming packets with source message identification to identify the real client. Then the SOAP message is travelled via XDetector. The XDetectors used to monitors and filters the DDoS attacks such as HTTP and XML DDoS attack. Finally the filtered real clinet message is transferred to the cloud service provider and the corresponding services is given to the client in secured manner .

147 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
85% related
Software
130.5K papers, 2M citations
85% related
The Internet
213.2K papers, 3.8M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Information system
107.5K papers, 1.8M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202375
2022226
2021192
2020306
2019327
2018424