2008 IEEE International Conference on E-Business Engineering 2008
DOI: 10.1109/icebe.2008.60
|View full text |Cite
|
Sign up to set email alerts
|

A Study and Performance Evaluation of the Multi-Tenant Data Tier Design Patterns for Service Oriented Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0
1

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(29 citation statements)
references
References 4 publications
0
28
0
1
Order By: Relevance
“…Enabling Multi-Tenancy at Data Layer: The main challenge in multi-tenancy is to add tenant information into the data in a way that every piece of information can be precisely traced back to an individual tenant. Once this has been achieved, there are certain patterns and practices related to security, resource isolation, extensibility and scalability that need to be followed to enable the key characteristics of multi-tenant enabled applications [2,5]. Security patterns in multi-tenancy fundamentally pertain to filtering, permission and access control and encryption [2,11].…”
Section: Key Characteristics Of Multi-tenant Storagementioning
confidence: 99%
“…Enabling Multi-Tenancy at Data Layer: The main challenge in multi-tenancy is to add tenant information into the data in a way that every piece of information can be precisely traced back to an individual tenant. Once this has been achieved, there are certain patterns and practices related to security, resource isolation, extensibility and scalability that need to be followed to enable the key characteristics of multi-tenant enabled applications [2,5]. Security patterns in multi-tenancy fundamentally pertain to filtering, permission and access control and encryption [2,11].…”
Section: Key Characteristics Of Multi-tenant Storagementioning
confidence: 99%
“…1) The possibility to share hardware resources, enabling cost reductions [9], [10]. 2) A high degree of configurability, enabling each customer to create his own look-and-feel and workflow within the application [11], [12], [13].…”
Section: Multi-tenancy Reengineering Patternmentioning
confidence: 99%
“…Wang et al [16] proposed a framework for implementing multi-tenant applications. They describe patterns for security, performance, and administrations isolation in such architectures and sketch customization concepts.…”
Section: Related Workmentioning
confidence: 99%