Enterprise API Security and GDPR Compliance: Design and Implementation Perspective

被引:12
|
作者
Hussain, Fatima [1 ]
Hussain, Rasheed [2 ]
Noye, Brett [3 ]
Sharieh, Salah [3 ]
机构
[1] Royal Bank Canada, RBC, API Secur & Governance Squad, Toronto, ON, Canada
[2] Innopolis Univ, Innopolis, Russia
[3] Royal Bank Canada, Toronto, ON, Canada
关键词
General Data Protection Regulation; Logic gates; Authorization; Enterprise resource planning; Authentication;
D O I
10.1109/MITP.2020.2973852
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancements in enterprise-level business development, the demand for new applications and services is overwhelming. For the development and delivery of such applications and services, enterprise businesses rely on Application Programming Interfaces (APIs). APIs provide interface to enable the communication among different applications. In essence, API is a double-edged sword; on one hand, API helps in expanding the business through sharing value and utility, but on the other hand, it raises security and privacy issues. Since the applications usually use APIs to retrieve important and critical data, it is extremely important to make sure that effective access control and security mechanisms are in place so that the data do not fall into wrong hands. In this context, in this article, we discuss the current state of the enterprise API security and the role of Machine Learning (ML) in an API security. We also discuss the General Data Protection Regulation (GDPR) Compliance and its effect on the API security.
引用
收藏
页码:81 / 89
页数:9
相关论文
共 50 条
  • [31] Design and Implementation of an Enterprise Internet of Things
    Sun, Jing
    Zhao, Huiqun
    Wang, Ka
    Zhang, Houyong
    Hu, Gongzhu
    ADVANCES IN SOFTWARE ENGINEERING, 2010, 117 : 254 - +
  • [32] Unexpected compliance? The implementation of the Defence and Security Procurement Directive
    Strikwerda, Johanna
    JOURNAL OF EUROPEAN INTEGRATION, 2018, 40 (07) : 889 - 904
  • [33] A MIDSTREAM PIPELINE OPERATOR'S PERSPECTIVE ON THE IMPLEMENTATION OF API 1183
    Konell, Jeremiah
    Dedeke, Brian
    Hurst, Chris
    Wu, Shanshan
    Bratton, Joseph
    PROCEEDINGS OF THE ASME 2020 13TH INTERNATIONAL PIPELINE CONFERENCE (IPC2020), VOL 1, 2020,
  • [34] Enterprise Information Technology Security: Risk Management Perspective
    Rot, Artur
    WCECS 2009: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 1171 - 1176
  • [35] A design and implementation of secure API based on Windows Mobile
    Zhen, Weikun
    Liang, Weizhong
    Liang, Dongying
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5397 - +
  • [36] Design and implementation of SIP security
    Chang, CC
    Lu, YF
    Pang, AC
    Kuo, TW
    INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 669 - 678
  • [37] Design and implementation of a security PVM
    Xue, Lan
    Song, Jie
    Chen, Ximing
    Dianzi Keji Daxue Xuebao/Journal of University of Electronic Science and Technology of China, 2000, 29 (01): : 91 - 94
  • [38] Design and Implementation of KSP on the Next Generation Cryptography API
    Zhang Lina
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 1640 - 1646
  • [39] Design and Implementation a REST API for Association Rule Mining
    Boonchuay, Kesinee
    Intasorn, Youppadee
    Rattanaopas, Kritwara
    2017 14TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), 2017, : 668 - 671
  • [40] Compliance with IS-Security-Policies: A Socio-Material Perspective Towards Security
    Falahati, Arman
    Lapointe, Liette
    AMCIS 2020 PROCEEDINGS, 2020,