期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service 被引量:3
1
作者 Qiong zuo Meiyi XIE +1 位作者 Guanqiu QI Hong ZHU 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第3期465-484,共20页
Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their app... Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their applications in the SaaS infrastructure. In a STA system, tenants can create sub- tenants, and grant their resources (including private services and data) to their subtenants. The isolation and sharing re- lations between parent-child tenants, sibling tenants or two non-related tenants are more complicated than those between tenants in MTA. It is important to keep service components or data private, and at the same time, allow them to be shared, and support application customizations for tenants. To ad- dress this problem, this paper provides a formal definition of a new tenant-based access control model based on administra- tive role-based access control (ARBAC) for MTA and STA in service-oriented SaaS (called TMS-ARBAC). Autonomous areas (AA) and AA-tree are proposed to describe the auton- omy of tenants, including their isolation and sharing relation- ships. Authorization operations on AA and different resource sharing strategies are defined to create and deploy the access control scheme in STA models. TMS-ARBAC model is ap- plied to design a geographic e-Science platform. 展开更多
关键词 Software-as-a-Service (SaaS) multi-tenancy architecture (MTA) sub-tenancy architecture (STA) rolebased access control (RBAC) model tenant-based access control model
原文传递
Enhancing Security by Using GIFT and ECC Encryption Method in Multi-Tenant Datacenters
2
作者 Jin Wang Ying Liu +2 位作者 Shuying Rao R.Simon Sherratt Jinbin Hu 《Computers, Materials & Continua》 SCIE EI 2023年第5期3849-3865,共17页
Data security and user privacy have become crucial elements in multi-tenant data centers.Various traffic types in the multi-tenant data center in the cloud environment have their characteristics and requirements.In th... Data security and user privacy have become crucial elements in multi-tenant data centers.Various traffic types in the multi-tenant data center in the cloud environment have their characteristics and requirements.In the data center network(DCN),short and long flows are sensitive to low latency and high throughput,respectively.The traditional security processing approaches,however,neglect these characteristics and requirements.This paper proposes a fine-grained security enhancement mechanism(SEM)to solve the problem of heterogeneous traffic and reduce the traffic completion time(FCT)of short flows while ensuring the security of multi-tenant traffic transmission.Specifically,for short flows in DCN,the lightweight GIFT encryption method is utilized.For Intra-DCN long flows and Inter-DCN traffic,the asymmetric elliptic curve encryption algorithm(ECC)is utilized.The NS-3 simulation results demonstrate that SEM dramatically reduces the FCT of short flows by 70%compared to several conventional encryption techniques,effectively enhancing the security and anti-attack of traffic transmission between DCNs in cloud computing environments.Additionally,SEM performs better than other encryption methods under high load and in largescale cloud environments. 展开更多
关键词 multi-tenant DATACENTER user privacy transmission security GIFT ECC
下载PDF
Multi-Tenant应用的页面元素可配置性研究 被引量:1
3
作者 姜世超 张升文 《计算机与现代化》 2010年第8期105-108,112,共5页
通过介绍Multi-Tenant并分析SaaS(Software as a Service)框架下Multi-Tenant(多租户)应用的页面元素个性化需求的问题,归纳提出并评估页面元素可配置的实施方案,最后讨论方案的应用及前景。
关键词 SAAS multi-tenant 页面元素可配置
下载PDF
基于Multi-Tenant应用的数据个性化需求问题研究
4
作者 姜世超 《中国管理信息化》 2011年第23期64-64,共1页
本文通过介绍Multi-Tenant并分析SaaS(Software as a Service)框架下Multi-Tenant(多租户)应用的数据个性化需求的问题,提出并评估数据个性化的实施方案,最后讨论了方案的应用及适用条件。
关键词 SAAS multi-tenant 数据个性化
下载PDF
A Temporal Multi-Tenant RBAC Model for Collaborative Cloud Services
5
作者 Zhengtao Liu Yi Ying +1 位作者 Yaqin Peng Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2020年第5期861-871,共11页
Multi-tenant collaboration brings the challenge to access control in cloud computing environment.Based on the multi-tenant role-based access control(MT-RBAC)model,a Temporal MT-RBAC(TMT-RBAC)model for collaborative cl... Multi-tenant collaboration brings the challenge to access control in cloud computing environment.Based on the multi-tenant role-based access control(MT-RBAC)model,a Temporal MT-RBAC(TMT-RBAC)model for collaborative cloud services is proposed.It adds the time constraint between trusted tenants,including usable role time constraint based on both calendar and interval time.Analysis shows that the new model strengthens the presentation ability of MT-RBAC model,achieves the finer-grained access control,reduces the management costs and enhances the security of multi-tenant collaboration in cloud computing environment. 展开更多
关键词 Cloud computing multi-tenant COLLABORATION access control TEMPORAL
下载PDF
A Multi-Tenant Usage Access Model for Cloud Computing
6
作者 Zhengtao Liu Yun Yang +1 位作者 Wen Gu Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2020年第8期1233-1245,共13页
Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated tha... Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service.To realize access control in a multi-tenant cloud computing environment,this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants.The model consists of three sub-models,which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.With an established trust relation in MT-UCON(Multi-tenant Usage Access Control),the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor.In addition,the security of the model is analyzed by an information flow method.The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants. 展开更多
关键词 multi-tenant usage access control model cloud computing
下载PDF
The Study of Multi-Tenant's Configurability
7
作者 Dong Wang 《Modern Electronic Technology》 2017年第1期22-25,共4页
SaaS (Software as a Service)the application mode occurs exactly along with the broadening and convenience of network platform, its core is the application of Multi-Tenant. The Multi-Tenant under SaaS not only makes Ap... SaaS (Software as a Service)the application mode occurs exactly along with the broadening and convenience of network platform, its core is the application of Multi-Tenant. The Multi-Tenant under SaaS not only makes Application Software more efficient and convenient, but also reduce the cost of software development, hardware purchase, training and upgrade maintenance, which can relieve the financial pressure of enterprises invisibly, so that enterprises can focus on the business development. Aiming at the personalized demand of Multi-Tenant's tenement, this thesis studies about personalized configuration of data, function, and operation interface, moreover, it shows the method of personalized configuration. It also indicates how to make the Multi-Tenant come true through personalized configuration, and realizes unified management of these applications. 展开更多
关键词 SAAS multi-tenant
下载PDF
Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment
8
作者 Pooja Dhiman Santosh Kumar Henge +3 位作者 Sartaj Singh Avinash Kaur Parminder Singh Mustapha Hadabou 《Computers, Materials & Continua》 SCIE EI 2023年第2期3297-3313,共17页
This research paper puts emphasis on using cloud computing with Blockchain(BC)to improve the security and privacy in a cloud.The security of data is not guaranteed as there is always a risk of leakage of users’data.B... This research paper puts emphasis on using cloud computing with Blockchain(BC)to improve the security and privacy in a cloud.The security of data is not guaranteed as there is always a risk of leakage of users’data.Blockchain can be used in a multi-tenant cloud environment(MTCE)to improve the security of data,as it is a decentralized approach.Data is saved in unaltered form.Also,Blockchain is not owned by a single organization.The encryption process can be done using a Homomorphic encryption(HE)algorithm along with hashing technique,hereby allowing computations on encrypted data without the need for decryption.This research paper is composed of four objectives:Analysis of cloud security using Blockchain technology;Exceptional scenario of Blockchain architecture in an enterprise-level MTCE;Implementation of cipher-text policy attribute-based encryption(CPABE)algorithm;Implementation of Merkle tree using Ethereum(MTuE)in a Multi-tenant system.Out of these four objectives,the main focus is on the implementation of CP-ABE algorithm.CP-ABE parameters are proposed for different levels of tenants.The levels include inner tenant,outer tenant,Inner-Outer-Tenant,Inner-Outer-External-Tenant,Outer-Inner-Tenant,External-Outer-Inner-Tenant and the parameters such as token,private key,public key,access tree,message,attribute set,node-level,cipher-text,salting which will help in providing better security using CP-ABE algorithm in a multitenant environment(MTE)where tenants can be provided with different levels of security and achieved 92 percentage of authenticity and access-control of the data. 展开更多
关键词 Blockchain(BC) merkle tree using ethereum(MTuE) multi-tenant environment(MTE) homomorphic encryption(HE) ciphertext policy attribute-based encryption(CP-ABE)
下载PDF
基于Paas模式下多租户感知BPEL引擎的研究
9
作者 李俊辉 傅晓峰 《电脑知识与技术》 2013年第12X期8241-8243,共3页
多租户感知工作流程引擎(Multi-Tenant Aware Workflow Engine)是针对目前工作流程引擎系统缺少租户对业务流程的灵活、动态的配置,导致企业信息系统间业务流程的缺乏可重复性使用的现状,提出了基于PaaS模式下多租户感知流程引擎的概念... 多租户感知工作流程引擎(Multi-Tenant Aware Workflow Engine)是针对目前工作流程引擎系统缺少租户对业务流程的灵活、动态的配置,导致企业信息系统间业务流程的缺乏可重复性使用的现状,提出了基于PaaS模式下多租户感知流程引擎的概念和模型,同时对多租户感知流程引擎的实现提出了总体要求,功能性要求以及非功能性要求,并通过对Or chestra流程引擎的扩展和延伸实现了多租户感知流程引擎的原型。 展开更多
关键词 云计算 多租户感知 工作流程引擎 PAAS BPEL Workflow Engine BPaaS Multiple Instance multi-tenancy
下载PDF
Machine Learning for Network Slicing Resource Management:A Comprehensive Survey
10
作者 HAN Bin Hans DSCHOTTEN 《ZTE Communications》 2019年第4期27-32,共6页
The emerging technology of multi-tenancy network slicing is considered as an es sential feature of 5G cellular networks.It provides network slices as a new type of public cloud services and therewith increases the ser... The emerging technology of multi-tenancy network slicing is considered as an es sential feature of 5G cellular networks.It provides network slices as a new type of public cloud services and therewith increases the service flexibility and enhances the network re source efficiency.Meanwhile,it raises new challenges of network resource management.A number of various methods have been proposed over the recent past years,in which machine learning and artificial intelligence techniques are widely deployed.In this article,we provide a survey to existing approaches of network slicing resource management,with a highlight on the roles played by machine learning in them. 展开更多
关键词 5G MACHINE LEARNING multi-tenancy NETWORK SLICING RESOURCE management
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部