Score: 0

Identity and Access Management for the Computing Continuum

Published: June 11, 2025 | arXiv ID: 2506.09559v1

By: Chalima Dimitra Nassar Kyriakidou , Athanasia Maria Papathanasiou , Vasilios A. Siris and more

Potential Business Impact:

Secures computer networks using trusted digital IDs.

Business Areas:
Identity Management Information Technology, Privacy and Security

The computing continuum introduces new challenges for access control due to its dynamic, distributed, and heterogeneous nature. In this paper, we propose a Zero-Trust (ZT) access control solution that leverages decentralized identification and authentication mechanisms based on Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs). Additionally, we employ Relationship-Based Access Control (ReBAC) to define policies that capture the evolving trust relationships inherent in the continuum. Through a proof-of-concept implementation, we demonstrate the feasibility and efficiency of our solution, highlighting its potential to enhance security and trust in decentralized environments.

Country of Origin
🇪🇸 Spain

Page Count
7 pages

Category
Computer Science:
Cryptography and Security