2020
DOI: 10.1051/e3sconf/202022401041
|View full text |Cite
|
Sign up to set email alerts
|

Information system development for restricting access to software tool built on microservice architecture

Abstract: The article discusses issues related to improving the security of an information system by introducing an authentication system into distributed information systems, developing and implementing a secure software architecture built on a microservice architecture. That kind of architecture ensures the prevention of unauthorized access to confidential information processed in the application. Achieving this goal it is necessary to use authorization methods, the basics of building secure applications and the basic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…In compliance with the General Data Protection Regulation, the hybrid solution combined the services for sensitive data (TSD) as a service platform and the Hypertext Transfer Protocol security techniques while taking into account security features such as identity brokering, OAuth2, multifactor authentication, and access control to safeguard the microservices architecture APIs. Safaryan et al [ 49 ] created a secure software architecture of microservices that ensures authorized access to confidential data by stating the case for selecting a potential authentication method and creating a security layer that achieves the security objective. The designed architecture enables users to assign or restrict permissions to specific information items using a discretionary or credential approach, protecting them reliably against unwanted access.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In compliance with the General Data Protection Regulation, the hybrid solution combined the services for sensitive data (TSD) as a service platform and the Hypertext Transfer Protocol security techniques while taking into account security features such as identity brokering, OAuth2, multifactor authentication, and access control to safeguard the microservices architecture APIs. Safaryan et al [ 49 ] created a secure software architecture of microservices that ensures authorized access to confidential data by stating the case for selecting a potential authentication method and creating a security layer that achieves the security objective. The designed architecture enables users to assign or restrict permissions to specific information items using a discretionary or credential approach, protecting them reliably against unwanted access.…”
Section: Resultsmentioning
confidence: 99%
“…This solution securely constructed a platform where identity brokering, OAuth2, multifactor authentication, and the access control mechanism ensure proper data safety and user management through API protection. Finally, we can utilize the second solution [ 49 ] from our findings for providing confidentially, which also covers the least-privileged principle.…”
Section: Resultsmentioning
confidence: 99%