Aktivitäten pro Jahr
Abstract
One of the consequences of the present adoption of cloud-based services among organizations is the increasing rate of outsourcing of business and technical functions to third parties. The recent approaches such as cloud integration platforms (iPaaS) facilitate this trend even further. In this scenario, users’ resources distributed across different cloud systems are accessed, shared and processed completely in the cloud, at third-party premises, effectively transferring the execution of entire business processes to the cloud. In this work, we approach security challenges and issues that arise from data and resource integrations of such scale.
Our contribution aims at advancing privacy and confidentiality in collaboration flows of distributed, cross-domain systems. We focus on the perspective of resource owners, enabling automated, structured discovery and security orchestration of their resources hosted at various cloud premises. We furthermore consider the perspective of integration clients that access and process distributed resources on behalf of resource owners, providing the model for discovery, integration and fine-grained constraints of sharing requests. Our contribution is examined on a basis of the focused prototype that allows proxy-based integration with existing systems and web authorization protocols.
Our contribution aims at advancing privacy and confidentiality in collaboration flows of distributed, cross-domain systems. We focus on the perspective of resource owners, enabling automated, structured discovery and security orchestration of their resources hosted at various cloud premises. We furthermore consider the perspective of integration clients that access and process distributed resources on behalf of resource owners, providing the model for discovery, integration and fine-grained constraints of sharing requests. Our contribution is examined on a basis of the focused prototype that allows proxy-based integration with existing systems and web authorization protocols.
Originalsprache | englisch |
---|---|
Titel | 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS) |
Herausgeber (Verlag) | Institute of Electrical and Electronics Engineers |
Seiten | 1233-1238 |
Seitenumfang | 6 |
DOIs | |
Publikationsstatus | Veröffentlicht - 2016 |
Schlagwörter
- api
- service integration
- api integration
- cloud
- integration platform
- ipaas
- oauth
- uma
- user-managed access
- interoperable security
- security policy
- json-ld
- linked data
- linked data security
- encryption
Fields of Expertise
- Information, Communication & Computing
Fingerprint
Untersuchen Sie die Forschungsthemen von „User-centered Security Management of API-based Data Integration Workflows“. Zusammen bilden sie einen einzigartigen Fingerprint.Aktivitäten
- 1 Vortrag bei Workshop, Seminar oder Kurs
-
User-centered Security Management of API-based Data Integration Workflows
Bojan Suzic (Redner/in)
Apr. 2016Aktivität: Vortrag oder Präsentation › Vortrag bei Workshop, Seminar oder Kurs › Science to science