Learn More
Software-as-a-service (SaaS) has been a growing trend in cloud computing for several years. Moreover, SaaS providers are evolving to application-level multi-tenancy, in which all tenants share the application instances, platform and data store with the aim of maximizing resource sharing. For multi-tenant SaaS applications, access control often is the only(More)
Access control is an important part of security that restricts the actions that users can perform on resources. Policy models specify how these restrictions are formulated in policies. Over the last decades, we have seen several such models, including role-based access control and more recently, attribute-based access control. However, these models do not(More)
Multi-tenancy leads to improved efficiency, improved scalability, and lower costs. With the recent evolution of Cloud Computing and Software-as-a-Service (SaaS) in particular, a flexible and scalable multi-tenant architecture is becoming highly important. In multi-tenant applications, each tenant has its own users and administrators and tenants even tend to(More)
Software-as-a-Service (SaaS) is a maturing model for offering on-line applications which is drawing a growing interest from industry. However, SaaS is still facing many challenges which hinder its widespread adoption. One of these challenges is manageable and effective access control in the presence of the multiple organizations involved. The first step to(More)
Software-as-a-Service (SaaS) is a maturing model for offering on-line applications which is drawing a growing interest from industry. However, SaaS is still facing many challenges which hinder its widespread adoption. One of these challenges is manageable and effective access control in the presence of the multiple organizations involved. The first step to(More)
Applications are continuously increasing in both complexity and number of users they serve. Moreover, the set of applications used by organizations is continuously expanding. This poses challenges, not in the least with regard to access control. More specifically, man-ageability of access control policies becomes more difficult. This leads to administrative(More)
  • 1