Analysis of identification and access management models in the context of fog computing

Zahynei, A.. and Shcheblanin, Y. and Kurchenko, O. and Melnyk, Iryna and Smirnov, S. (2024) Analysis of identification and access management models in the context of fog computing Cybersecurity Providing in Information and Telecommunication Systems II, 3826. pp. 288-293. ISSN 1613-0073

[thumbnail of A_Zahynei_Y_Shcheblanin_O_Kurchenko_I_Melnyk_S_Smirnov_CPITS_2024_3826.pdf] Text
A_Zahynei_Y_Shcheblanin_O_Kurchenko_I_Melnyk_S_Smirnov_CPITS_2024_3826.pdf

Download (2MB)

Abstract

The paper analyzes the methods of obtaining access to resources in the case of fog computing. An analysis of the advantages and disadvantages of the Single Sign-On model, Federated Identity Management model, Role-Based Access Control model, Attribute-Based Access Control model, and Zero Trust Model was carried out. A comparison of models of obtaining access in the context of fog computing is carried out.

Item Type: Article
Uncontrolled Keywords: fog computing; IAM; FIM; SSO; RBAC; ZTM; ABAC
Subjects: Статті у базах даних > Scopus
Divisions: Факультет інформаційних технологій та математики > Кафедра комп'ютерних наук
Depositing User: Павло Миколайович Складанний
Date Deposited: 06 Dec 2024 08:32
Last Modified: 06 Dec 2024 08:32
URI: https://elibrary.kubg.edu.ua/id/eprint/50167

Actions (login required)

View Item View Item