@inproceedings{9d874182d76945c88ebc1b368916e571,
title = "Research on access control techniques in saas of cloud computing",
abstract = "Where the flexibility of Cloud Computing provides number of usage possibilities to the organizations, the security threats stop them in fully relying on it. Among all security threats, {\textquoteleft}Unauthorized Access Threat{\textquoteright} is one of the most important and difficult to manage. In SaaS, access control issues are of foremost concern. The aim of this paper is to explore the current trends that cloud providers are following in implementing access control measures in SaaS. In this article, a critical review of these measures is done and their advantages and drawbacks are discussed. On the basis of ongoing research, future research directions in the area of SaaS access control are also identified.",
keywords = "Access Control, Cloud Computing, Research Directions, SaaS, Security",
author = "Shabana Rehman and Rahul Gautam",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 2014.; 2nd International Symposium on Security in Computing and Communications, SSCC 2014 ; Conference date: 24-09-2014 Through 27-09-2014",
year = "2014",
doi = "10.1007/978-3-662-44966-0\_9",
language = "English",
series = "Communications in Computer and Information Science",
publisher = "Springer Verlag",
pages = "92--100",
editor = "Mauri, \{Jaime Lloret\} and Mauri, \{Jaime Lloret\} and Thampi, \{Sabu M.\} and Thampi, \{Sabu M.\} and Rawat, \{Danda B.\} and Rawat, \{Danda B.\} and Di Jin and Di Jin",
booktitle = "Security in Computing and Communications - 2nd International Symposium, SSCC 2014, Proceedings",
address = "Germany",
}