Proceedings of the 1st Workshop on the Science of Cyberinfrastructure: Research, Experience, Applications and Models 2015
DOI: 10.1145/2753524.2753534
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Authorization Considerations for a Multi-tenant Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Figure 4 summarizes the communication interactions between the desktop client, identity server and Airavata server in order to achieve access control at the Airavata API. For a general discussion of these considerations, see [11].…”
Section: Enforcing Access Control Using Rolesmentioning
confidence: 99%
“…Figure 4 summarizes the communication interactions between the desktop client, identity server and Airavata server in order to achieve access control at the Airavata API. For a general discussion of these considerations, see [11].…”
Section: Enforcing Access Control Using Rolesmentioning
confidence: 99%
“…Examples include APIs for maps, credit card payments, and cloud storage, to say nothing of integration with social media platforms. As part of this integration, developers generally have to authenticate to the service, typically by using static random API keys [35], which they must manage securely. Developers may also need to manage cryptographic public and private keys for access control (e.g., SSH) or TLS.…”
Section: Introductionmentioning
confidence: 99%