Zahynei, A.. and Shcheblanin, Y. and Kurchenko, O. and Melnyk, Iryna and Smirnov, S. (2024) Analysis of identification and access management models in the context of fog computing Cybersecurity Providing in Information and Telecommunication Systems II, 3826. pp. 288-293. ISSN 1613-0073
![]() |
Text
A_Zahynei_Y_Shcheblanin_O_Kurchenko_I_Melnyk_S_Smirnov_CPITS_2024_3826.pdf Download (2MB) |
Official URL: https://ceur-ws.org/Vol-3826/
Abstract
The paper analyzes the methods of obtaining access to resources in the case of fog computing. An analysis of the advantages and disadvantages of the Single Sign-On model, Federated Identity Management model, Role-Based Access Control model, Attribute-Based Access Control model, and Zero Trust Model was carried out. A comparison of models of obtaining access in the context of fog computing is carried out.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | fog computing; IAM; FIM; SSO; RBAC; ZTM; ABAC |
Subjects: | Статті у базах даних > Scopus |
Divisions: | Факультет інформаційних технологій та математики > Кафедра комп'ютерних наук |
Depositing User: | Павло Миколайович Складанний |
Date Deposited: | 06 Dec 2024 08:32 |
Last Modified: | 06 Dec 2024 08:32 |
URI: | https://elibrary.kubg.edu.ua/id/eprint/50167 |
Actions (login required)
![]() |
View Item |