CINXE.COM
EAI Endorsed Transactions on Cloud Systems
<?xml version="1.0" encoding="utf-8"?> <feed xmlns="http://www.w3.org/2005/Atom"> <id>https://publications.eai.eu/index.php/cs/issue/feed</id> <title>EAI Endorsed Transactions on Cloud Systems</title> <updated>2023-10-17T09:11:32+00:00</updated> <author> <name>EAI Publications Department</name> <email>publications@eai.eu</email> </author> <link rel="alternate" href="https://publications.eai.eu/index.php/cs" /> <link rel="self" type="application/atom+xml" href="https://publications.eai.eu/index.php/cs/feed/atom" /> <generator uri="http://pkp.sfu.ca/ojs/" version="3.3.0.18">Open Journal Systems</generator> <subtitle type="html"><p>The EAI Endorsed Transactions on Cloud System (ToCS) is an international venue for publishing innovative and cutting edge results on the convergence of next-generation technologies and methodologies reshaping our way of living. The emerging converged platform for growth and innovation is built on four technology pillars: mobile computing, cloud services, big data and analytics, and social networking.</p> <p><strong>INDEXING</strong>: DOAJ, CrossRef, Google Scholar, ProQuest, EBSCO, CNKI, Dimensions</p> <p> </p></subtitle> <entry> <id>https://publications.eai.eu/index.php/cs/article/view/3011</id> <title>Application Programming Interface (API) Security in Cloud Applications </title> <updated>2023-02-14T08:59:51+00:00</updated> <author> <name>Farhan Qazi</name> <email>faqazi@captechu.edu</email> </author> <link rel="alternate" href="https://publications.eai.eu/index.php/cs/article/view/3011" /> <summary type="html" xml:base="https://publications.eai.eu/index.php/cs/article/view/3011"><p>Many cloud services utilize an API gateway, which enables them to be offered to users through API platforms such as Platform as a Service (PaaS), Software as a service (SaaS), Infrastructure as a Service (IaaS) and cross-platforms APIs. APIs are designed for functionality and speed by developers who write a small portion of code, which has visibility and is secure. The code that is created from third-party software or libraries has no visibility, which makes it insecure. APIs are the most vulnerable points of attack, and many users are not aware of their insecurity. This paper reviews API security in cloud applications and discusses details of API vulnerabilities, existing security tools for API security to mitigate API attacks. The author鈥檚 study showed that most users are unaware of API insecurity, organizations lack resources and training to educate users about APIs, and organizations depend on the overall security of the network instead of the security of standalone APIs.</p></summary> <published>2023-10-17T00:00:00+00:00</published> <rights>Copyright (c) 2023 Farhan Qazi</rights> </entry> </feed>