Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (1-2): 78-80    DOI:
Current Issue | Archive | Adv Search |
Research of Access Control Model for SaaS System
Ma Huanpeng,Ye Ronghua
School of Mathematics, Physics and Information Engineering, ZheJiang Normal University
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  SaaS as a service is a new software mode which deploy the application on the local server and provides application software service for customers through the Internet. Based on the study of the traditional RABC mode and combined with the characteristics of multi-tenant, configurability and personality, the author of this article has designed a hierarchical mode of SaaS system for access control model. It achieves the function multi-tenancy and personalized service of system and then provide the design proposal and the implementation principle.
Key wordsSaaS      configurability      hierarchical mode      safety      Isolation     
Published: 10 November 2017
ZTFLH:  TP302.1  

Cite this article:

Ma Huanpeng, Ye Ronghua. Research of Access Control Model for SaaS System. Computer & Telecommunication, 2016, 1(1-2): 78-80.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I1-2/78

[1] SUN Wen-wen LIU Qing-liang WU Ruo-chen WANG Xin-tong DONGYE Sheng-yi CAO Lu WANG Xin-li. [J]. 电脑与电信, 2021, 1(4): 59-61.
[2] SUN Guo-xian ZHAO Yong-chang. An Optimization Method forArming Power Signal Identification in ESAD[J]. 电脑与电信, 2020, 1(7): 58-61.
[3] LIU Jin YAN Cong YUAN Xi. Research on Security Baseline Configuration Verification Based on Cloud Computing Virtualization Platform[J]. 电脑与电信, 2019, 1(1-2): 28-34.
[4] YIN Zong-ping. Analysis and Design of the Security System of the University Apartment[J]. 电脑与电信, 2018, 1(3): 4-6.
[5] LU Yu-fan, WANG Xun. Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism[J]. 电脑与电信, 2018, 1(1-2): 47-49.
[6] WUWen-gang, ZHANG Xin. The Application of Penetration Test in Level Evaluation[J]. 电脑与电信, 2018, 1(1-2): 67-69.
[7] Shen Si. Research on the Food Safety Event Data Cleaning Based on Ontology Construction Technology[J]. 电脑与电信, 2018, 1(11): 26-30.
[8] Zhang Hui, Li Zhu. A Genetic Algorithm Based on the Isolation Adaptive Operator[J]. 电脑与电信, 2017, 1(1-2): 34-37.
[9] PENG Zhen-wu, ZHANG Jun-ling, HOU Run-jia, ZHU Ling-zhi. The Design and Research on School Bus Safety Monitoring and Management System[J]. 电脑与电信, 2017, 1(12): 14-16.
[10] Feng Xiaomei. Discussion on Mobile Security[J]. 电脑与电信, 2016, 1(9): 84-86.
[11] Chen Mingdong. Design and Research on the Security Protection of Big Database for the Smart Campus[J]. 电脑与电信, 2016, 1(4): 59-61.
[12] Zhou Yongping. Research on the Design and Construction of Electronic Information System Room Engineering[J]. 电脑与电信, 2016, 1(4): 89-91.
[13] Wu Jin. Research on the Tracing System of Auto Parts in Fujian Based on RFID Technology[J]. 电脑与电信, 2016, 1(12): 29-31.
[14] Zhou Bin. Design and Research on Food Safety Monitoring System for Fruit Industry[J]. 电脑与电信, 2016, 1(11): 57-60.
[15] Shi Huifang, Chen Yang. Research and Design of Municipal Production Safety Emergency Rescue Command System Based onWebGIS[J]. 电脑与电信, 2015, 1(7): 15-17.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd