2011 IEEE 3rd International Conference on Communication Software and Networks 2011
DOI: 10.1109/iccsn.2011.6014350
|View full text |Cite
|
Sign up to set email alerts
|

Business intelligence software as a service (SAAS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…The advantages of this new computational paradigm with respect to alternative technologies are clear, especially regarding BI . First, cloud application providers strive to give the same or better service and performance as if the software programs were locally installed on end‐user computers, so the users do not need to spend money buying complete hardware equipment for the software to be used.…”
Section: Introductionmentioning
confidence: 99%
“…The advantages of this new computational paradigm with respect to alternative technologies are clear, especially regarding BI . First, cloud application providers strive to give the same or better service and performance as if the software programs were locally installed on end‐user computers, so the users do not need to spend money buying complete hardware equipment for the software to be used.…”
Section: Introductionmentioning
confidence: 99%
“…The attacker may cross this control if he/she has genuine tenant credentials. However, the attacker will be countered by the second control in VMs 7,8,9. In this way, the attacker will have to breach all control layers successfully before reach the VMs hosting the BI databases. In order to breach the databases for stealing data of other tenants, the attacker will have to use exploit tools (like, Metasploit, NetMapper or Pinger).…”
Section: The Multi-layer Security Modelmentioning
confidence: 99%
“…BI with OLAP on Cloud can be configured by converting traditional data warehouse tables into XML data files, interlinking the data files using hierarchical DTD structures, defining all data files with the help of suitable structured metadata, and hosting the data files on distributed servers configured to generate a massive parallel processing environment when multi-tenant query loads are applied [6] [7]. The computational power of Cloud can be assigned selectively to the OLAP queries through Cloud elasticity (like, Amazon Elastic Compute 2) and the service-oriented platforms (like, Amazon Web Services and Google App Engine) can be used for organizing the XML data files, their DTD structures, and the metadata repositories [8]. The reporting and visualization services may be delivered through dashboard services in BI applications delivered through service-oriented SaaS [8].…”
Section: Introductionmentioning
confidence: 99%
“…Whilst cloud computing is an example of how technologies and operating models can come together to offer new capabilities for businesses [7,2], there are still cases of organisations being threatened by new risks which are attributed explicitly to the adoption of cloud services [8,9,14].…”
Section: Introductionmentioning
confidence: 99%
“…Prior work [4,5,7,6] has explored the particular case of multi-party authentication in cloud based architectures, for the provision of enterprise Business Intelligence systems [8,6,9]. We have developed and extended this work to support the development of specific use cases where the availability of 5G network infrastructure can enable new business possibilities through enhanced performance.…”
Section: Introductionmentioning
confidence: 99%