Identity and Access Management for the Computing Continuum
By: Chalima Dimitra Nassar Kyriakidou , Athanasia Maria Papathanasiou , Vasilios A. Siris and more
Potential Business Impact:
Secures computer networks using trusted digital IDs.
The computing continuum introduces new challenges for access control due to its dynamic, distributed, and heterogeneous nature. In this paper, we propose a Zero-Trust (ZT) access control solution that leverages decentralized identification and authentication mechanisms based on Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs). Additionally, we employ Relationship-Based Access Control (ReBAC) to define policies that capture the evolving trust relationships inherent in the continuum. Through a proof-of-concept implementation, we demonstrate the feasibility and efficiency of our solution, highlighting its potential to enhance security and trust in decentralized environments.
Similar Papers
Fortifying the Agentic Web: A Unified Zero-Trust Architecture Against Logic-layer Threats
Cryptography and Security
Makes online agents safer from hackers.
Fortifying the Agentic Web: A Unified Zero-Trust Architecture Against Logic-layer Threats
Cryptography and Security
Makes online agents safer from hackers.
Fortifying the Agentic Web: A Unified Zero-Trust Architecture Against Logic-layer Threats
Cryptography and Security
Makes online agents safer from hackers.