2010 6th World Congress on Services 2010
DOI: 10.1109/services.2010.48
|View full text |Cite
|
Sign up to set email alerts
|

A Transparent Approach of Enabling SaaS Multi-tenancy in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 3 publications
0
17
0
Order By: Relevance
“…These have been found to constitute a challenge to the security and privacy of data in cloud environments [10]. A couple of researchers have worked in the area of ensuring security in the multitenant domain: [11] (Isolation and customization); [12] (Suggests removal of virtualization layer); [13] (Incorporation of Active Protection System); [14] (Constructing a Virtual Machine Monitor in form of a new Micro-Kernel), and many others. However, research is still ongoing as more and more vulnerabilities, threats, risks and security challenges emerge with time.…”
Section: Proposed Multi-tenancy Framework and Cloud Securitymentioning
confidence: 99%
“…These have been found to constitute a challenge to the security and privacy of data in cloud environments [10]. A couple of researchers have worked in the area of ensuring security in the multitenant domain: [11] (Isolation and customization); [12] (Suggests removal of virtualization layer); [13] (Incorporation of Active Protection System); [14] (Constructing a Virtual Machine Monitor in form of a new Micro-Kernel), and many others. However, research is still ongoing as more and more vulnerabilities, threats, risks and security challenges emerge with time.…”
Section: Proposed Multi-tenancy Framework and Cloud Securitymentioning
confidence: 99%
“…Cai [21] described a transparent approach of making existing Web applications to support MTA and run in a public cloud.…”
Section: Mta In Saasmentioning
confidence: 99%
“…The allocation of the different feature instances, taking into account relations as defined by the feature model, is the main focus of this article. We assume the application has already been split up into components, and that data isolation issues are resolved using existing techniques [32,33]. We also assume the performance of the various components has been evaluated using performance models such as those in [34], possibly grouping components that often communicate together to guarantee they are colocated, which ensures good performance is achieved.…”
Section: Mandatorymentioning
confidence: 99%