2013 IEEE 16th International Conference on Computational Science and Engineering 2013
DOI: 10.1109/cse.2013.131
|View full text |Cite
|
Sign up to set email alerts
|

Multi-tenant Database Access Control

Abstract: Storing data in the cloud is a new multi-tenant database solution that has recently emerged to deliver database for multiple users, who can store and access their data over the internet. This multi-tenant database designed to be used by multiple tenants and each tenant may have multiple users. Therefore, this database type demands a special multi-tenant access control model, which provides an access control not only for multiple tenants, but also for multiple users per tenant. In this paper, we are proposing a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Furthermore, the multi-tenant schema includes access control data architecture that allows each tenant to have a number of users with different types of access privileges [22].…”
Section: Elastic Extension Tablesmentioning
confidence: 99%
“…Furthermore, the multi-tenant schema includes access control data architecture that allows each tenant to have a number of users with different types of access privileges [22].…”
Section: Elastic Extension Tablesmentioning
confidence: 99%
“…Yaish et al [14,13] have proposed a multi-tenant database access control mechanism, called Elastic Extension Table Access Control (EETAC) that allows each tenant's with different type of access grants to access data in multi-tenant database. The mechanism of data retrieving in multi-tenant database is different from single-tenant database.…”
Section: Related Workmentioning
confidence: 99%
“…After the user logs in to the system and the authentication succeeds, the user obtains the role and the corresponding authority, and determines whether to allow the access request resource according to the role privilege [3] . Fig5 is a state diagram of the user login system, reflecting the process of user login system status.The security scheme of the educational administration system is role-based access control under the premise of identity authentication, so only the users who succeed in authentication can have the role privilege and access the corresponding system resources.…”
Section: Object Privilege Analysismentioning
confidence: 99%