{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:49:14Z","timestamp":1775886554735,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,24]]},"DOI":"10.1145\/3779657.3779684","type":"proceedings-article","created":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:12:49Z","timestamp":1775884369000},"page":"180-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secured Cloud Integration Network Design and Fault Tolerant for file and Application Sharing in a Medium Size Business Environment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4135-8397","authenticated-orcid":false,"given":"Bryan B.","family":"Penuliar","sequence":"first","affiliation":[{"name":"Mapua University, School of Information Technology, Manila, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1345-2335","authenticated-orcid":false,"given":"William P.","family":"Rey","sequence":"additional","affiliation":[{"name":"Mapua University, School of Information Technology, Manila, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"March","author":"Office S. E. P.","year":"2012","unstructured":"S. E. P. Office, The MSME Sector At A Glance, March 2012."},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","first-page":"20","DOI":"10.5815\/ijcnis.2014.03.03","article-title":"Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review","volume":"6","author":"Goyal S.","year":"2014","unstructured":"S. Goyal, \u201cPublic vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review,\u201d International Journal of Computer Network and Information Security, vol. 6, pp. 20\u201329, 2014.","journal-title":"International Journal of Computer Network and Information Security"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s00607-012-0248-2","article-title":"How to adapt applications for the Cloud environment: Challenges and solutions in migrating applications to the Cloud","volume":"95","author":"Andrikopoulos V.","year":"2012","unstructured":"V. Andrikopoulos, T. Binz, F. Leymann, and S. Strauch, \u201cHow to adapt applications for the Cloud environment: Challenges and solutions in migrating applications to the Cloud,\u201d Computing, vol. 95, pp. 493\u2013535, Dec. 2012.","journal-title":"Computing"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1016\/j.procs.2015.04.079","article-title":"An Enterprise Oriented View on the Cloud Integration Approaches \u2013 Hybrid Cloud and Big Data","volume":"50","author":"Palanimalai S.","year":"2015","unstructured":"S. Palanimalai and I. Ilango, \u201cAn Enterprise Oriented View on the Cloud Integration Approaches \u2013 Hybrid Cloud and Big Data,\u201d Procedia Computer Science, vol. 50, pp. 220\u2013225, 2015.","journal-title":"Procedia Computer Science"},{"key":"e_1_3_3_1_5_2","first-page":"12","volume-title":"Proc. IEEE Int. Conf. on Cloud Computing","author":"Schwarzkopf R.","year":"2012","unstructured":"R. Schwarzkopf, M. Schmidt, and C. Strack, \u201cIncreasing virtual machine security in cloud environments,\u201d in Proc. IEEE Int. Conf. on Cloud Computing, pp. 1\u201312, 2012."},{"key":"e_1_3_3_1_6_2","first-page":"231","article-title":"Cloud security challenges and the role of brokers","volume":"1","author":"Mimura Gonzalez N.","year":"2011","unstructured":"N. Mimura Gonzalez, C. Miers, F. Red\u00edgolo, T. Carvalho, M. Simplicio, M. Naslund, and M. Pourzandi, \u201cCloud security challenges and the role of brokers,\u201d Journal of Cloud Computing: Advances, Systems and Applications, vol. 1, pp. 231\u2013238, 2011.","journal-title":"Journal of Cloud Computing: Advances, Systems and Applications"},{"key":"e_1_3_3_1_7_2","first-page":"439","volume-title":"Big Data Security and Privacy","author":"Bertino E.","year":"2018","unstructured":"E. Bertino and E. Ferrari, Big Data Security and Privacy, Springer, 2018, pp. 425\u2013439."},{"key":"e_1_3_3_1_8_2","article-title":"Security risk in synchronization of On-Premises Active Directory with Office 365 Cloud Platform","author":"Stamenkovi\u0107 D.","year":"2014","unstructured":"D. Stamenkovi\u0107, M. \u0160u\u0161ter\u0161i\u010d, A. Stojanovi\u0107, and S. Gavrilovi\u0107, \u201cSecurity risk in synchronization of On-Premises Active Directory with Office 365 Cloud Platform,\u201d Journal of Computing and Security, June 2014.","journal-title":"Journal of Computing and Security"},{"key":"e_1_3_3_1_9_2","volume-title":"Advances in User Authentication","author":"Abhijit Nag A. R. D.","year":"2017","unstructured":"A. R. D. Abhijit Nag, Advances in User Authentication, Springer, 2017."},{"key":"e_1_3_3_1_10_2","volume-title":"KPMG Netherlands","author":"Brouwer M.","year":"2021","unstructured":"M. Brouwer, \u201cCloud Access Security Brokers (CASBs): Characterization of the CASB market and its alignment with corporate expectations,\u201d KPMG Netherlands, 2021."},{"key":"e_1_3_3_1_11_2","article-title":"An integrated CASB implementation model to enhance enterprise cloud security","author":"Wason R.","year":"2020","unstructured":"R. Wason, \u201cAn integrated CASB implementation model to enhance enterprise cloud security,\u201d International Journal of Cloud Applications, 2020.","journal-title":"International Journal of Cloud Applications"},{"key":"e_1_3_3_1_12_2","first-page":"922","volume-title":"Computer and Information Security Handbook","author":"Gurkok C.","year":"2017","unstructured":"C. Gurkok, \u201cSecuring Cloud Computing Systems,\u201d in Computer and Information Security Handbook (3rd ed.), pp. 897\u2013922, 2017.","edition":"3"},{"key":"e_1_3_3_1_13_2","first-page":"426","volume-title":"Proc. Int. Conf. on Computing, Networking and Communications (ICNC)","author":"Liu C.","year":"2017","unstructured":"C. Liu, G. Wang, P. Han, H. Pan, and B. Fang, \u201cA Cloud Access Security Broker based approach for encrypted data search and sharing,\u201d in Proc. Int. Conf. on Computing, Networking and Communications (ICNC), pp. 422\u2013426, 2017."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.525"},{"issue":"3","key":"e_1_3_3_1_15_2","first-page":"09721509188182","article-title":"Cloud Computing Adoption Intention by MSMEs in the Philippines","volume":"22","author":"Matias J.","year":"2019","unstructured":"J. Matias and A. Hernandez, \u201cCloud Computing Adoption Intention by MSMEs in the Philippines,\u201d Global Business Review, vol. 22, no. 3, pp. 09721509188182, 2019.","journal-title":"Global Business Review"},{"key":"e_1_3_3_1_16_2","volume-title":"Proc. Pacific Asia Conf. on Information Systems (PACIS)","author":"Saedi A.","year":"2013","unstructured":"A. Saedi and I. N. Abedin, \u201cAn integrated theoretical framework for cloud computing adoption by small and medium-sized enterprises,\u201d in Proc. Pacific Asia Conf. on Information Systems (PACIS), 2013."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","DOI":"10.62986\/dp2018.11","volume-title":"Preparing the Philippines for the Fourth Industrial Revolution: A Scoping Study","author":"Dadios E. P.","year":"2018","unstructured":"E. P. Dadios, A. B. Culaba, J. R. Paqueo, V. Orbeta, A. C. Serafica, R. B. Bandala, and A. A. Bairan, \u201cPreparing the Philippines for the Fourth Industrial Revolution: A Scoping Study,\u201d Philippine Institute for Development Studies, 2018."},{"key":"e_1_3_3_1_18_2","first-page":"255","volume-title":"Proc. Int. Conf. on Computing Security","author":"Kuyoro S. O.","year":"2018","unstructured":"S. O. Kuyoro and I. F. A. Omotunde, \u201cCloud Computing Security Issues and Challenges,\u201d Proc. Int. Conf. on Computing Security, pp. 247\u2013255, Nov. 2018."},{"key":"e_1_3_3_1_19_2","first-page":"27","article-title":"Serverless Computing: A Survey of Opportunities, Challenges, and Applications","volume":"1","author":"Shafiei H.","year":"2021","unstructured":"H. Shafiei, A. Khonsari, and P. Mousavi, \u201cServerless Computing: A Survey of Opportunities, Challenges, and Applications,\u201d Journal of Cloud Computing, vol. 1, p. 27, 2021.","journal-title":"Journal of Cloud Computing"},{"key":"e_1_3_3_1_20_2","first-page":"8","article-title":"Serverless Architectures: Review, Future Trends, and Solutions to Open Problems","volume":"6","author":"Kumar M.","year":"2019","unstructured":"M. Kumar, \u201cServerless Architectures: Review, Future Trends, and Solutions to Open Problems,\u201d Journal of Cloud Technology, vol. 6, pp. 8\u201314, 2019.","journal-title":"Journal of Cloud Technology"},{"key":"e_1_3_3_1_21_2","first-page":"6","volume-title":"Proc. IEEE Int. Conf. on Cloud Computing","author":"Boza E.","year":"2017","unstructured":"E. Boza, C. Abad, M. Villavicencio, S. Quimba, and J. Plaza, \u201cReserved, on demand or serverless: Model-based simulations for cloud budget planning,\u201d in Proc. IEEE Int. Conf. on Cloud Computing, pp. 1\u20136, Oct. 2017."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3023302"},{"key":"e_1_3_3_1_23_2","article-title":"Survey on serverless computing","author":"Hassan H. B.","year":"2021","unstructured":"H. B. Hassan, S. A. Barakat, and Q. I. Sarhan, \u201cSurvey on serverless computing,\u201d Journal of Cloud Computing: Advances, Systems and Applications, 2021.","journal-title":"Journal of Cloud Computing: Advances, Systems and Applications"},{"key":"e_1_3_3_1_24_2","volume-title":"JMARK","author":"Mark J.","year":"2021","unstructured":"J. Mark, \u201c6 Reasons Why Seamless Cloud Integration Is Important For Your Business,\u201d JMARK, 2021. [Online]. Available: https:\/\/www.jmark.com\/6-reasons-why-seamless-cloud-integration-is-important-for-your-business\/"},{"key":"e_1_3_3_1_25_2","volume-title":"Rishabh Software","author":"Shah R.","year":"2021","unstructured":"R. Shah, \u201cCloud Integration: Why Is It Imperative For Your Business Today?,\u201d Rishabh Software, 2021. [Online]. Available: https:\/\/www.rishabhsoft.com\/blog\/cloud-integration"},{"key":"e_1_3_3_1_26_2","volume-title":"Avenga","author":"Stashko A.","year":"2021","unstructured":"A. Stashko, \u201cTop Cloud Service Providers,\u201d Avenga, May 2021. [Online]. Available: https:\/\/www.avenga.com\/magazine\/top-cloud-service-providers\/"},{"key":"e_1_3_3_1_27_2","volume-title":"The Manila Times","author":"Valmonte N. R.","year":"2021","unstructured":"N. R. Valmonte, \u201cDebunking the biggest cloud migration myth,\u201d The Manila Times, Mar. 2021."},{"key":"e_1_3_3_1_28_2","volume-title":"Manila Bulletin","author":"Lugto R. C.","year":"2021","unstructured":"R. C. Lugto Jr., \u201cCloud computing in PH ripe for take-off,\u201d Manila Bulletin, Jul. 2021."},{"key":"e_1_3_3_1_29_2","volume-title":"Business World","author":"Beltran B. B. M.","year":"2021","unstructured":"B. B. M. Beltran, \u201cRising to the cloud,\u201d Business World, Aug. 2021."},{"key":"e_1_3_3_1_30_2","volume-title":"Manila Bulletin","author":"Amadora L.","year":"2021","unstructured":"L. Amadora, \u201cePLDT recognized as one of the Top Direct Cloud Service Providers in the Philippines,\u201d Manila Bulletin, Feb. 2021."},{"key":"e_1_3_3_1_31_2","volume-title":"OpenGov Asia","author":"Hani A.","year":"2021","unstructured":"A. Hani, \u201cThe Philippines Adopting Cloud Technology for Business Flexibility,\u201d OpenGov Asia, Aug. 2021."},{"key":"e_1_3_3_1_32_2","first-page":"2","article-title":"Doing Ethnographies","author":"Crang M.","year":"2007","unstructured":"M. Crang and I. Cook, Doing Ethnographies, SAGE Publications, 2007, pp. 2\u20134.","journal-title":"SAGE Publications"}],"event":{"name":"WSSE 2025: 2025 The 7th World Symposium on Software Engineering","location":"Okayama Japan","acronym":"WSSE 2025"},"container-title":["Proceedings of the 2025 7th World Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3779657.3779684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:13:56Z","timestamp":1775884436000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3779657.3779684"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,24]]},"references-count":32,"alternative-id":["10.1145\/3779657.3779684","10.1145\/3779657"],"URL":"https:\/\/doi.org\/10.1145\/3779657.3779684","relation":{},"subject":[],"published":{"date-parts":[[2025,10,24]]},"assertion":[{"value":"2026-04-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}