Since more and more applications and services have been transferred from servers in the B/S architecture to cloud, user access control has become a significant part in a multitenancy cloud platform. Role based access control model makes users participate in an enterprise system as particular identities. However, in a multitenancy cloud environment, it has a high probability that the information of tenants has been leaked by using existing role based access control (RBAC) model. Moreover, management problems may emerge in the multitenancy platform with the increment of the number of tenants. In this paper, a novel concept of 4D-role is presented. With a detailed definition on the concept of 4D-role, a 4D-role based multitenancy model is prop...
Abstract- Software as a Service (SAAS) applications delivered via the cloud is the most popular serv...
There has been a recent trend in storing data in the cloud because of the significant benefits, such...
Cloud Computing has changed how computing is done as applications and services are being consumed fr...
Cloud Computing is developed as a new wave of ICT technologies, offering a common approach to on-dem...
Information service platforms or management information systems of various institutions or sectors o...
Abstract--The cloud platforms are consisted of a larger number of servers along with networking and ...
Role-based access control (RBAC) models have generated a great interest in the security community as...
New technologies as cloud computing and internet of things (IoT) has expanded the range of multimoda...
Abstract: A cloud storage system is collection of storage servers. A Secure cloud is a reliable sour...
Storing data in the cloud is a new multi-tenant database solution that has recently emerged to deliv...
The collaboration among different organizations is considered one of the main benefits of moving app...
Abstract: Cloud computing is a shared medium used for effectively utilizing the resources to deliver...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Abstract — As we know that cloud technology provides the way for storing the data.Nowdays cloud syst...
Cloud systems provide significant benefits by allowing users to store massive amount of data on dema...
Abstract- Software as a Service (SAAS) applications delivered via the cloud is the most popular serv...
There has been a recent trend in storing data in the cloud because of the significant benefits, such...
Cloud Computing has changed how computing is done as applications and services are being consumed fr...
Cloud Computing is developed as a new wave of ICT technologies, offering a common approach to on-dem...
Information service platforms or management information systems of various institutions or sectors o...
Abstract--The cloud platforms are consisted of a larger number of servers along with networking and ...
Role-based access control (RBAC) models have generated a great interest in the security community as...
New technologies as cloud computing and internet of things (IoT) has expanded the range of multimoda...
Abstract: A cloud storage system is collection of storage servers. A Secure cloud is a reliable sour...
Storing data in the cloud is a new multi-tenant database solution that has recently emerged to deliv...
The collaboration among different organizations is considered one of the main benefits of moving app...
Abstract: Cloud computing is a shared medium used for effectively utilizing the resources to deliver...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Abstract — As we know that cloud technology provides the way for storing the data.Nowdays cloud syst...
Cloud systems provide significant benefits by allowing users to store massive amount of data on dema...
Abstract- Software as a Service (SAAS) applications delivered via the cloud is the most popular serv...
There has been a recent trend in storing data in the cloud because of the significant benefits, such...
Cloud Computing has changed how computing is done as applications and services are being consumed fr...