2010
DOI: 10.1007/978-3-642-16515-3_52
|View full text |Cite
|
Sign up to set email alerts
|

Software Architecture Driven Configurability of Multi-tenant SaaS Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…This study concluded that the most common approaches for data encryption are based on RSA, indicating that most researchers of the cloud computing environment are interested in RSA encryption techniques. The revealing result of this study showed that the proposed approaches have a lack of validation in cloud computing, which needs to be addressed to improve confidence and trust [44].…”
Section: Literature Reviewmentioning
confidence: 96%
See 1 more Smart Citation
“…This study concluded that the most common approaches for data encryption are based on RSA, indicating that most researchers of the cloud computing environment are interested in RSA encryption techniques. The revealing result of this study showed that the proposed approaches have a lack of validation in cloud computing, which needs to be addressed to improve confidence and trust [44].…”
Section: Literature Reviewmentioning
confidence: 96%
“…In the study of [44], the authors aimed to understand data confidentiality by reviewing the encryption techniques . This study concluded that the most common approaches for data encryption are based on RSA, indicating that most researchers of the cloud computing environment are interested in RSA encryption techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Nevertheless, SaaS application with multi-tenant emphasizes on the idea of the (pay as you use). Customers can purchase needed modules and different customers use different function modules set [19].…”
Section: B Saas Definitionmentioning
confidence: 99%
“…However, although [39] showed an example of the case study it didn"t provide a solution for interdependent functions while [40] provides only a generic description of relations between functions. In similar work, [19] focused on the configuration of functions and user interface in SaaS application. However, the details in how to configure the specific elements in UI were omitted.…”
Section: Configuration and Customizationmentioning
confidence: 99%
“…In our view, any tenant-specific customizations, application layer or data layer, are cross-cutting concerns of a multi-tenant application, and thus should be modularized so that tenants are able to develop, deploy, and integrate to such customizations to the virtualized application with minimal additional programming and configuration efforts. In application layer, most concerns can be modularized by either intercepting filters [4], aspects [5,6], or contexts [8]. On the other hand, although it is generally agreed that the multi-tenant data layer is one of the most important concerns [7], there is little investigation on modularizing data layer concerns in a multi-tenant application.…”
Section: Introductionmentioning
confidence: 99%