Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2015 IEEE Twelfth International Symposium on Autonomous Decentralized Systems 2015
DOI: 10.1109/isads.2015.47
|View full text |Cite
|
Sign up to set email alerts
|

Autonomous Decentralized Tenant Access Control Model for Sub-tenancy Architecture in Software-as-a-Service (SaaS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Qiong Zuo et al (2015) developed a novel tenant-based access control model depending on ARBAC i.e, Administrative Role-Based Access Control designed for Sub tenant architecture in SaaS. Autonomous Areas (AA) tree and AA were developed to define the tenants in autonomy as well as their allocation and segregation relations.…”
Section: Related Workmentioning
confidence: 99%
“…Qiong Zuo et al (2015) developed a novel tenant-based access control model depending on ARBAC i.e, Administrative Role-Based Access Control designed for Sub tenant architecture in SaaS. Autonomous Areas (AA) tree and AA were developed to define the tenants in autonomy as well as their allocation and segregation relations.…”
Section: Related Workmentioning
confidence: 99%
“…Some specialized execution subtleties together with the exhibition result from the model are given. In [6] the creator proposes Data Security for Cloud Environment with Semi-Trusted Third Party (DaSCE) that clarifies the information security framework that gives (a) key administration (b) get to control, and (c) document guaranteed cancellation. The DaSCE uses Shamir's (k, n) limit plan to deal with the keys, where k out of n shares are required to produce the key.…”
Section: Related Workmentioning
confidence: 99%
“…Then, if the credible verification passes, will implement a negotiated registration using the controller software information of . encrypts the sensitive information HMAC value of PCR 4 and Nonce through session private key AK and signs the encrypted information by 's private key. Finally, returns the signed information to .…”
Section: Controller Software Certification Processmentioning
confidence: 99%
“…Autonomous decentralized systems (ADS) have been extended and applied to a variety of domains [1][2][3][4][5][6]. The main extension in ADS is to implement the dynamic management and to optimize the allocation of virtualized computing, storage, device controllers, and cyber resources.…”
Section: Introductionmentioning
confidence: 99%