Niedermeier et al., 2025 - Google Patents
Towards Role Mappings in Hybrid Cloud Environments: A Systematic Literature ReviewNiedermeier et al., 2025
View PDF- Document ID
- 1050148961940359489
- Author
- Niedermeier M
- Wittges H
- Publication year
- Publication venue
- International Conference on Enterprise Design, Operations, and Computing
External Links
Snippet
In current IT landscapes, there is a trend towards deploying multiple services each incorporating its own identity management system. When implementing role-based access control (RBAC), each system might utilize different roles adjusted to its own domain. We …
- 238000013507 mapping 0 title abstract description 133
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rouhani et al. | Distributed attribute-based access control system using permissioned blockchain | |
US20220021711A1 (en) | Security Platform and Method for Efficient Access and Discovery | |
Ngo et al. | Multi-tenant attribute-based access control for cloud infrastructure services | |
Li et al. | RT: A role-based trust-management framework | |
Singhal et al. | Collaboration in multicloud computing environments: Framework and security issues | |
Hafner et al. | Sectet: an extensible framework for the realization of secure inter‐organizational workflows | |
Hamlen et al. | Data security services, solutions and standards for outsourcing | |
Takabi et al. | Policy management as a service: An approach to manage policy heterogeneity in cloud computing environment | |
Solanki et al. | Multi-tenant access and information flow control for SaaS | |
Preuveneers et al. | Policy reconciliation for access control in dynamic cross-enterprise collaborations | |
Lim et al. | Trust models for blockchain-based self-sovereign identity management: A survey and research directions | |
Pöhn et al. | Reference service model for federated identity management | |
Pöhn et al. | Reference Service Model Framework for Identity Management | |
Baldin et al. | ImPACT: A networked service architecture for safe sharing of restricted data | |
Yau et al. | An adaptable distributed trust management framework for large-scale secure service-based systems | |
Townend et al. | Crown-c: A high-assurance service-oriented grid middleware system | |
Niedermeier et al. | Towards Role Mappings in Hybrid Cloud Environments: A Systematic Literature Review | |
Kamath et al. | User-credential based role mapping in multi-domain environment. | |
Yussupov et al. | Secure collaborative development of cloud application deployment models | |
Cherif | Access control models for collaborative applications | |
Hussain et al. | A security-oriented workflow framework for collaborative environments | |
Nishimura et al. | Virtual organization platform interoperability provides the long tail an escience environment | |
Tremper et al. | MAGICPL: a generic process description language for distributed pseudonymization scenarios | |
Uikey et al. | RBACA: role-based access control architecture for multi-domain cloud environment | |
Osborn et al. | A Survey of Delegation from an RBAC Perspective. |