期刊文献+

Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service 被引量:3

Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service
原文传递
导出
摘要 Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their applications in the SaaS infrastructure. In a STA system, tenants can create sub- tenants, and grant their resources (including private services and data) to their subtenants. The isolation and sharing re- lations between parent-child tenants, sibling tenants or two non-related tenants are more complicated than those between tenants in MTA. It is important to keep service components or data private, and at the same time, allow them to be shared, and support application customizations for tenants. To ad- dress this problem, this paper provides a formal definition of a new tenant-based access control model based on administra- tive role-based access control (ARBAC) for MTA and STA in service-oriented SaaS (called TMS-ARBAC). Autonomous areas (AA) and AA-tree are proposed to describe the auton- omy of tenants, including their isolation and sharing relation- ships. Authorization operations on AA and different resource sharing strategies are defined to create and deploy the access control scheme in STA models. TMS-ARBAC model is ap- plied to design a geographic e-Science platform. Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their applications in the SaaS infrastructure. In a STA system, tenants can create sub- tenants, and grant their resources (including private services and data) to their subtenants. The isolation and sharing re- lations between parent-child tenants, sibling tenants or two non-related tenants are more complicated than those between tenants in MTA. It is important to keep service components or data private, and at the same time, allow them to be shared, and support application customizations for tenants. To ad- dress this problem, this paper provides a formal definition of a new tenant-based access control model based on administra- tive role-based access control (ARBAC) for MTA and STA in service-oriented SaaS (called TMS-ARBAC). Autonomous areas (AA) and AA-tree are proposed to describe the auton- omy of tenants, including their isolation and sharing relation- ships. Authorization operations on AA and different resource sharing strategies are defined to create and deploy the access control scheme in STA models. TMS-ARBAC model is ap- plied to design a geographic e-Science platform.
出处 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第3期465-484,共20页 中国计算机科学前沿(英文版)
关键词 Software-as-a-Service (SaaS) multi-tenancy architecture (MTA) sub-tenancy architecture (STA) rolebased access control (RBAC) model tenant-based access control model Software-as-a-Service (SaaS), multi-tenancy architecture (MTA), sub-tenancy architecture (STA), rolebased access control (RBAC) model, tenant-based access control model
  • 相关文献

参考文献3

二级参考文献61

  • 1龙勤,刘鹏,潘爱民.基于角色的扩展可管理访问控制模型研究与实现[J].计算机研究与发展,2005,42(5):868-876. 被引量:26
  • 2B Lampson. Protection [J]. In: Proc the 5th Annual Princeton Conf on Information Sciences and Systems. Princeton, New Jersey: Princeton University Press, 1974. 437-443.
  • 3R S Sandhu. Lattice-based access control models [J]. IEEE Computer, 1993, 26(11): 9-19.
  • 4D Ferraiolo, R Kuhn. Role based access controls [C]. The 15th NIST-NCSC National Computer Security Conference, Baltimore, MaryLand, 1992.
  • 5R S Sandhu, E J Coyne, H L Feinstein, et al. Role-based access control models [J]. IEEE Computer, 1996, 29(2) : 38 -47.
  • 6R S Sandhu, V Bhamidipati, Q Munawer. The ARBAC97 model for role-based administration of roles [J]. ACM Trans on Information and System Security, 1999, 2(1) : 105-135.
  • 7R S Sandhu, V Bhamidipati. Role-based administration of user-role assignment: The URA97 model and its Oracle implementation [J]. Journal of Computer Security, 1999, 7 (4) : 317-323.
  • 8R S Sandhu, V Bhamidipati. An Oracle implementation of the PRA97 model for permission-role assignment [C]. In: Proc of the 3rd ACM Workshop on Role-Based Access Control (RBAC' 98). New York: ACM Press, 1998. 13-21.
  • 9S Oh, R Sandhu. A model for role administration using organization structure [C]. In: Sandhu R, Bertino E, eds. Proc of the 6th ACM Symp on Access Control Models and Technologies (SACMAT 2002) . New York: ACM Press, 2002. 155-162.
  • 10Oswego Suny, et al. WISR 1993 design-for-reuse working group report [OL]. http://gee.cs. oswego. edu/dl/WISR93WG/ WISR93WG/WISR93WG. html, 1993-11-03/2006-03-20.

共引文献13

同被引文献5

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部