2021
DOI: 10.1007/978-3-030-91431-8_13
|View full text |Cite
|
Sign up to set email alerts
|

ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications

Abstract: Online software services are often designed as multi-tenant, API-based, microservice architectures. However, sharing service instances and storing sensitive data in a shared data store causes significant security risks. Application-level access control plays a key role in mitigating this risk by preventing unauthorized access to the application and data. Moreover, a microservice architecture introduces new challenges for access control on online services, as both the application logic and data are highly distr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…Compared to the previous work on authorization in microservice-based applications, which maintain a primarily technical focus on performing authorization, we provide a systematic approach to create authorization artifacts [14,15]. This approach can support developers in reducing the reported complexity of ABAC [28] while gaining a uniform understanding of what to authorize.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Compared to the previous work on authorization in microservice-based applications, which maintain a primarily technical focus on performing authorization, we provide a systematic approach to create authorization artifacts [14,15]. This approach can support developers in reducing the reported complexity of ABAC [28] while gaining a uniform understanding of what to authorize.…”
Section: Discussionmentioning
confidence: 99%
“…In the case of the policy presented in lines 7 through 12, an HTTP header containing the subject's identifier is returned. This is called partial evaluation and allows the actual microservice to perform the filtering and return the correct fleet objects (see [15]). Another option is to tell the microservice which objects to return by filtering with Rego within the OPA.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…BC technology is used to support auditing the distributed training procedures in federated learning to improve the reliability of the entire training process, together with Exchange-FedAvg proposed to improve the training efficiency. ABAC and PBAC to authorize access from subjects to objects in micro-service system, and their design supports policies selectivity according to attribute counts and thus ensures dynamic controls [99]. Generally, access control designs based on the prevalent models gain much attention in applying ZTA, and mostly focuses on reliability and the extension of features in making control decision.…”
Section: Bc-enabled Ddlmentioning
confidence: 99%