Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Telecommunications Science》 2010-10
Add to Favorite Get Latest Update

Study on Multi-Tenancy and Security Technology in SaaS Applications

Ju Jiehui1,Wu Jiyi2,3,Zhang Jianlin2,Fu Jianqing3 (1.School of Information and Electronic Engineering,Zhejiang University of Science and Technology,Hangzhou 310023,China; 2.Key Lab of E-Business and Information Security,Hangzhou Normal University,Hangzhou 310036,China; 3.School of Computer Science and Technology,Zhejiang University,Hangzhou 310027,China)  
With the maturity of Internet technology,the ideas of SaaS(software as a service)in the software industry has been confirmed and transformed software form traditional products into a service,SaaS model is becoming the trends of application software market development.After the presentation of the origin and development of SaaS,the implementation methods of multi-tenancy were studied as the core technology before a detailed analysis of SaaS security from technical and non technical aspects.The market recognition means SaaS has become an important force in the software industry.
【CateGory Index】: TP393.09
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 Wu Jiyi1,2,Ping Lingdi1,Pan Xuezeng1,Li Zhuo1(1.School of Computer Science and Technology,Zhejiang University,Hangzhou 310027,China;2.Key Lab of E-Business and Information Security,Hangzhou 310036,China);Cloud Computing:Concept and Platform[J];Telecommunications Science;2009-12
Chinese Journal Full-text Database 2 Hits
1 Wu Jiyi1,2, Fu Jianqing2, Zhang Mingxi3, Ping Lingdi2 (1. Key Lab of E-Business and Information Security, Hangzhou Normal University, Hangzhou 310036, China ; 2. School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China ; 3. School of Computer Science and Technology, Donghua University,Shanghai 201620, China);Cloud Data Management: A Survey[J];Telecommunications Science;2010-05
2 CHEN De-lu1,2,WU Hong3(1.Anhui University,Hefei 230000,China;2.Anhui Fuyang State Administration of Taxation,Fuyang 236000,China;3.Yingshang NO.1 Middle School Anhui,Fuyang 236000,China);Cloud Computing Platform in the Tax Service's Applied Research[J];Computer Knowledge and Technology;2010-21
【Secondary Citations】
Chinese Journal Full-text Database 6 Hits
1 CHEN Wen-fang(Hunan Vocational Institute of Safety & Technology,Changsha 410151,China);Analysis of the Precaution System Based the Against Hacker Attack[J];Computer Knowledge and Technology;2009-08
2 XIONG Jiang;ZHU Jing Department of Computer Science, Chongqing Three Gorges College, Wanzhou 404000 Department of Automation, Chongqing University, Chongqing 400044;Study on the Security of Network Database in Transmitting[J];Computer Science;2005-11
3 ZHANG Mei-zhi1,GAO Run-yue2,YANG Yong-ping3(1.Electronic & information collage of Innermongolia,Huhehaote 010010,China;2.Electronic & information collage of Innermongolia,Huhehaote 010010,China;3.The fourteenth middle school of Innermongolia,Huhehaote 010010,China);The software design pattern for Saas[J];Agriculture Network Information;2007-12
4 Deng Xiaojun Shen Hao(Department of Information Engineering,Metallurgical Campus Hunan University of Technology,Zhuzhou 412000);Analysis of Client's Authentication in HTTPS[J];Computer & Digital Engineering;2008-05
5 CHEN Kang1,2,ZHENG Wei-Min1,2 1(Tsinghua National Laboratory for Information Science and Technology,Tsinghua University,Beijing 100084,China) 2(Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);Cloud Computing:System Instances and Current Research[J];Journal of Software;2009-05
6 Dai Yingxia\ Zuo Yingnan\ Xu Jianzhuo\;(State Key Laboratory of Information Security, Graduate School, USTC, Beijing 100039)\;\;;Security Vulnerabilities and Improvements of the SSL Protocol[J];JOURNAL OF THE GRADUATE SCHOOL ACADEMIA SINICA;2000-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved