Analysis of access control model for data security and privacy on multi-tenant SaaS
Cloud computing has become most trending and emerging technology in recent years and has changed the way of computation and services delivered to customer. Despite all the advantages that cloud provides, users still feel insecure to adopt cloud computing and having major concern over the data securi...
| Main Authors: | Duraisamy, Gunavathi, Abd Ghani, Abdul Azim, Zulzalil, Hazura, Abdullah, Azizol |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publishers
2018
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/64695/ http://psasir.upm.edu.my/id/eprint/64695/1/Analysis%20of%20access%20control%20model%20for%20data%20security%20and%20privacy%20on%20multi-tenant%20SaaS.pdf |
Similar Items
Model-based testing of access control requirement in multi-tenant application: an extensive life cycle
by: Duraisamy, Gunavathi, et al.
Published: (2022)
by: Duraisamy, Gunavathi, et al.
Published: (2022)
Critical issues across saas development: learning from experience
by: Ali, Abdulrazzaq Qasem, et al.
Published: (2017)
by: Ali, Abdulrazzaq Qasem, et al.
Published: (2017)
SaaS quality of service attributes
by: Khanjani, Atieh, et al.
Published: (2014)
by: Khanjani, Atieh, et al.
Published: (2014)
Development of a valid and reliable software customization model for SaaS quality through iterative method: perspectives from academia
by: Ali, Abdulrazzaq Qasem, et al.
Published: (2020)
by: Ali, Abdulrazzaq Qasem, et al.
Published: (2020)
Agent-based pricing determination for cloud services in multi-tenant environment
by: Hussin, Masnida, et al.
Published: (2014)
by: Hussin, Masnida, et al.
Published: (2014)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Method and tool to generate requirement traceability Matrix for scrum development methodology
by: Duraisamy, Gunavathi
Published: (2014)
by: Duraisamy, Gunavathi
Published: (2014)
Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems
by: Qahtan, Sarah, et al.
Published: (2022)
by: Qahtan, Sarah, et al.
Published: (2022)
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
The Tenets or Tenants Of Sweeney
by: Kinsella, John
Published: (2016)
by: Kinsella, John
Published: (2016)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Risk assessment for big data in cloud:security, privacy and trust
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
Secure role based access control systems using aspect-orientation designing
by: Hazaa, Muneer A., et al.
Published: (2009)
by: Hazaa, Muneer A., et al.
Published: (2009)
A decision cloud ranking approach based on privacy and security in blockchain E-Health Industry 4.0 systems
by: Qahtan, Sarah, et al.
Published: (2023)
by: Qahtan, Sarah, et al.
Published: (2023)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019)
by: Tao, Hai, et al.
Published: (2019)
Investigating cloud ERP providers selection for SMEs in a multi-tenant environment
by: Ogunrinde, Rotimi Rowland, et al.
Published: (2014)
by: Ogunrinde, Rotimi Rowland, et al.
Published: (2014)
Multi-criteria evaluation in website quality determination
by: Zulzalil, Hazura, et al.
Published: (2012)
by: Zulzalil, Hazura, et al.
Published: (2012)
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018)
by: Salji, Mohd Rafiz, et al.
Published: (2018)
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
Requirement traceability matrix through documentation for SCRUM methodology
by: Duraisamy, Gunavathi, et al.
Published: (2013)
by: Duraisamy, Gunavathi, et al.
Published: (2013)
Security threats to privacy data of Malaysian youth’s: online transaction and communication
by: Shariffah Mamat,, et al.
Published: (2023)
by: Shariffah Mamat,, et al.
Published: (2023)
Pengurusan risiko keselamatan data dalam model perisian sebagai perkhidmatan (Software as a Service)(SaaS)
by: Nooraidaniza Jafri,, et al.
Published: (2018)
by: Nooraidaniza Jafri,, et al.
Published: (2018)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)
by: Crysdian, Cahyo, et al.
Published: (2000)
Tenant and landlord duties in a hotel set-up
by: Hussain, Faridah, et al.
Published: (2013)
by: Hussain, Faridah, et al.
Published: (2013)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Customization approach and software quality mapping model to improve SaaS customization
by: Ali, Abdulrazzaq Qasem
Published: (2020)
by: Ali, Abdulrazzaq Qasem
Published: (2020)
Framework for Aggregating Interactive Multi-Criteria for Web-Based Applications Using Fuzzy Measure and 2-Additive Choquet Integral
by: Zulzalil, Hazura
Published: (2010)
by: Zulzalil, Hazura
Published: (2010)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019)
by: Salji, Mohd Rafiz
Published: (2019)
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: comprehensive taxonomy, open issues and challenges and recommended solution
by: Qahtan, Sarah, et al.
Published: (2023)
by: Qahtan, Sarah, et al.
Published: (2023)
Privacy and the Access of Information in a Smart House Environment
by: Moncrieff, Simon, et al.
Published: (2007)
by: Moncrieff, Simon, et al.
Published: (2007)
SBAC-SDN: a scalable blockchain-based access control in northbound interface for multi-controller SDN with load balancing mechanism
by: Zainal, Zulkarnain, et al.
Published: (2024)
by: Zainal, Zulkarnain, et al.
Published: (2024)
User acceptance of SaaS ERP considering perceived risk, system performance and cost
by: Lim, Tong Ming *, et al.
Published: (2016)
by: Lim, Tong Ming *, et al.
Published: (2016)
Quality Of Service Aware User Association For Efficient Network Slicing In Multi-Tenant 5g Networks
by: Swathi, Subbiah Jayanthi
Published: (2022)
by: Swathi, Subbiah Jayanthi
Published: (2022)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
Legal Implications On Privacy And Security Issues On The Internet
by: Veloo, Veni
Published: (2002)
by: Veloo, Veni
Published: (2002)
Similar Items
-
Model-based testing of access control requirement in multi-tenant application: an extensive life cycle
by: Duraisamy, Gunavathi, et al.
Published: (2022) -
Critical issues across saas development: learning from experience
by: Ali, Abdulrazzaq Qasem, et al.
Published: (2017) -
SaaS quality of service attributes
by: Khanjani, Atieh, et al.
Published: (2014) -
Development of a valid and reliable software customization model for SaaS quality through iterative method: perspectives from academia
by: Ali, Abdulrazzaq Qasem, et al.
Published: (2020) -
Agent-based pricing determination for cloud services in multi-tenant environment
by: Hussin, Masnida, et al.
Published: (2014)