2017
DOI: 10.3390/fi9040058
|View full text |Cite
|
Sign up to set email alerts
|

Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows

Abstract: Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a 'single responsibility principle' design makes them well suited for constructing scalable and flexible data integration and real-time data flow applications. In this paper, we investigate microservice based data processing workflows from a security point of view, i.e., (1) how to constrain data processing wo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Access control and network security policies for cloud deployment are well studied by providing either access control solutions [6], [7], [8], [9] or by supporting the automated policy generation from given specifications [10], [6], [11]. Recent works also provide mechanisms for formal verification of microservice deployments [12], or continuous assessment methodologies [13].…”
Section: Related Workmentioning
confidence: 99%
“…Access control and network security policies for cloud deployment are well studied by providing either access control solutions [6], [7], [8], [9] or by supporting the automated policy generation from given specifications [10], [6], [11]. Recent works also provide mechanisms for formal verification of microservice deployments [12], or continuous assessment methodologies [13].…”
Section: Related Workmentioning
confidence: 99%
“…Liu et al [24] raised similar security concerns particularly for collaborative manufacturing systems, and argued that configuring and enforcing an access control model in a collaborative manufacturing system is a challenging task. This concern was addressed in [34,35] with a framework that enables policy-based access control to maintain trust relationships that cross the boundaries of collaborating organizations, while lifting the burden to manually align diverse sets of authorization policies of different organizations.…”
Section: Trust Models Access Control and Policy-based Authorizationmentioning
confidence: 99%
“…Recent research and industry activities focus on the M2M dynamic authorisations with policy-based capabilities in pursuit of a systematic empirical research to address an extensible scheme approach to support the secure message-exchange, the dynamic authorisations for μServices and the access control requirements. Preuveneers et al [221] demonstrate the enforcement of the authorisation policies based on the Universal Scalability Law to their throughput measurements. The efficiency curve demonstrates the latency overhead of delegating the policy to another one along with the performance trade-offs of policy delegation.…”
Section: M2m Authorisationsmentioning
confidence: 99%