Enterprise API Security and GDPR Compliance: Design and Implementation Perspective

被引:12
|
作者
Hussain, Fatima [1 ]
Hussain, Rasheed [2 ]
Noye, Brett [3 ]
Sharieh, Salah [3 ]
机构
[1] Royal Bank Canada, RBC, API Secur & Governance Squad, Toronto, ON, Canada
[2] Innopolis Univ, Innopolis, Russia
[3] Royal Bank Canada, Toronto, ON, Canada
关键词
General Data Protection Regulation; Logic gates; Authorization; Enterprise resource planning; Authentication;
D O I
10.1109/MITP.2020.2973852
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancements in enterprise-level business development, the demand for new applications and services is overwhelming. For the development and delivery of such applications and services, enterprise businesses rely on Application Programming Interfaces (APIs). APIs provide interface to enable the communication among different applications. In essence, API is a double-edged sword; on one hand, API helps in expanding the business through sharing value and utility, but on the other hand, it raises security and privacy issues. Since the applications usually use APIs to retrieve important and critical data, it is extremely important to make sure that effective access control and security mechanisms are in place so that the data do not fall into wrong hands. In this context, in this article, we discuss the current state of the enterprise API security and the role of Machine Learning (ML) in an API security. We also discuss the General Data Protection Regulation (GDPR) Compliance and its effect on the API security.
引用
收藏
页码:81 / 89
页数:9
相关论文
共 50 条
  • [1] Enterprise Architecture Patterns for GDPR Compliance
    Teixeira, Clara
    Vasconcelos, Andre
    Sousa, Pedro
    Marques, Ma Joao
    ICEIS: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2021, : 715 - 725
  • [2] GDPR compliance via software evolution: Weaving security controls in software design
    Ayala-Rivera, Vanessa
    Portillo-Dominguez, A. Omar
    Pasquale, Liliana
    JOURNAL OF SYSTEMS AND SOFTWARE, 2024, 216
  • [3] Ensuring security of a telemedicine project in compliance with GDPR
    Slaviek, Karel
    Dostal, Otto
    Lieskovan, Tomas
    Hajny, Jan
    2019 11TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2019,
  • [4] Using an Enterprise Architecture Model for GDPR Compliance Principles
    Blanco-Laine, Gaelle
    Sottet, Jean-Sebastien
    Dupuy-Chessa, Sophie
    PRACTICE OF ENTERPRISE MODELING, POEM 2019, 2019, 369 : 199 - 214
  • [5] Teachers' Perspective on the Implementation of GDPR in Schools - A Design-Oriented Case Study
    Marchetti, Emanuela
    Valente, Andrea
    Witfelt, Claus
    Amo-Filva, Daniel
    Garcia-Holgado, Alicia
    Garcia-Holgado, Lucia
    Vidotto, Elisabetta
    Garzotto, Maria Elena
    Garcia-Penalvo, Francisco Jose
    Escudero, David Fonseca
    Orehovacki, Tihomir
    Krasna, Marjan
    Pesek, Igor
    Ruzic, Ivana
    Fraoua, Karim Elia
    Moreira, Fernando
    LEARNING AND COLLABORATION TECHNOLOGIES, PT II, LCT 2024, 2024, 14723 : 182 - 199
  • [6] GDPR compliance through standard security controls: An automated approach
    Granata, Daniele
    Mastroianni, Michele
    Rak, Massimiliano
    Cantiello, Pasquale
    Salzillo, Giovanni
    JOURNAL OF HIGH SPEED NETWORKS, 2024, 30 (02) : 147 - 174
  • [7] Information security frameworks for assisting GDPR compliance in banking industry
    Serrado, Joao
    Pereira, Ruben Filipe
    Mira da Silva, Miguel
    Scalabrin Bianchi, Isaias
    DIGITAL POLICY REGULATION AND GOVERNANCE, 2020, 22 (03) : 227 - 244
  • [8] Design and Implementation of Enterprise Network Security System Based on Firewall
    Yuan, Hui
    Zheng, Lei
    Qiu, Shuang
    Peng, Xiangli
    Liang, Yuan
    Hu, Yaodong
    Deng, Guoru
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 1070 - 1078
  • [9] Design and implementation of security architecture based on enterprise computer network
    Han, Hui-Lian
    Xu, Li
    Gong, Qing-Yong
    Dai, Xiu-Jiao
    Huabei Gongxueyuan Xuebao/Journal of North China Institute of Technology, 2005, 26 (03): : 187 - 192
  • [10] The Design and Implementation of an Automated Security Compliance Toolkit: A Pedagogical Exercise
    Francia, Guillermo, III
    Estes, Brian
    Francia, Rahjima
    Vu Nguyen
    Scroggins, Alex
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2007, 2 (04) : 59 - 76