[go: up one dir, main page]

Niedermeier et al., 2025 - Google Patents

Towards Role Mappings in Hybrid Cloud Environments: A Systematic Literature Review

Niedermeier et al., 2025

View PDF
Document ID
1050148961940359489
Author
Niedermeier M
Wittges H
Publication year
Publication venue
International Conference on Enterprise Design, Operations, and Computing

External Links

Snippet

In current IT landscapes, there is a trend towards deploying multiple services each incorporating its own identity management system. When implementing role-based access control (RBAC), each system might utilize different roles adjusted to its own domain. We …
Continue reading at conferences.big.tuwien.ac.at (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security

Similar Documents

Publication Publication Date Title
Rouhani et al. Distributed attribute-based access control system using permissioned blockchain
US20220021711A1 (en) Security Platform and Method for Efficient Access and Discovery
Ngo et al. Multi-tenant attribute-based access control for cloud infrastructure services
Li et al. RT: A role-based trust-management framework
Singhal et al. Collaboration in multicloud computing environments: Framework and security issues
Hafner et al. Sectet: an extensible framework for the realization of secure inter‐organizational workflows
Hamlen et al. Data security services, solutions and standards for outsourcing
Takabi et al. Policy management as a service: An approach to manage policy heterogeneity in cloud computing environment
Solanki et al. Multi-tenant access and information flow control for SaaS
Preuveneers et al. Policy reconciliation for access control in dynamic cross-enterprise collaborations
Lim et al. Trust models for blockchain-based self-sovereign identity management: A survey and research directions
Pöhn et al. Reference service model for federated identity management
Pöhn et al. Reference Service Model Framework for Identity Management
Baldin et al. ImPACT: A networked service architecture for safe sharing of restricted data
Yau et al. An adaptable distributed trust management framework for large-scale secure service-based systems
Townend et al. Crown-c: A high-assurance service-oriented grid middleware system
Niedermeier et al. Towards Role Mappings in Hybrid Cloud Environments: A Systematic Literature Review
Kamath et al. User-credential based role mapping in multi-domain environment.
Yussupov et al. Secure collaborative development of cloud application deployment models
Cherif Access control models for collaborative applications
Hussain et al. A security-oriented workflow framework for collaborative environments
Nishimura et al. Virtual organization platform interoperability provides the long tail an escience environment
Tremper et al. MAGICPL: a generic process description language for distributed pseudonymization scenarios
Uikey et al. RBACA: role-based access control architecture for multi-domain cloud environment
Osborn et al. A Survey of Delegation from an RBAC Perspective.