On automated RBAC assessment by constructing a centralized perspective for microservice mesh

D Das, A Walker, V Bushong, J Svacina, T Cerny… - PeerJ Computer …, 2021 - peerj.com
It is important in software development to enforce proper restrictions on protected services
and resources. Typically software services can be accessed through REST API endpoints …

Adaptive security architecture for protecting RESTful web services in enterprise computing environment

MI Beer, MF Hassan - Service Oriented Computing and Applications, 2018 - Springer
In this modern era of enterprise computing, the enterprise application integration (EAI) is a
well-known industry-recognized architectural principle that is built based on loosely coupled …

Restacl: An access control language for restful services

M Hüffmeyer, U Schreier - Proceedings of the 2016 ACM International …, 2016 - dl.acm.org
This work describes an efficient Access Control Language for RESTful Services. The
language follows the ideas of Attribute Based Access Control and utilizes the concepts of …

[PDF][PDF] Token-based vs session-based authentication: A survey

Y Balaj - no. September, 2017 - researchgate.net
In almost every service which has sensitive data of clients and which are very sensitive to
them, security and privacy of their data is the key of happiness to them. This means that no …

Overview of Machine Learning Processes Used in Improving Security in API-Based Web Applications

EM Pașca, R Erdei, D Delinschi, O Matei - Computer Science On-line …, 2023 - Springer
Due to being scalable, easily cacheable, and well-suited for high-traffic web applications,
RESTful APIs are highly used today, hence in this paper, we present a selective review of …

Analysis of an access control system for RESTful services

M Hüffmeyer, U Schreier - … , ICWE 2016, Lugano, Switzerland, June 6-9 …, 2016 - Springer
RestACL is an access control system for RESTful Services and describes a policy
specification language as well as an architecture that shows how access control can be …

A trusted authentication model for remote users under cloud architecture

Y Song, Z Liao, Y Liang - International Journal of Internet …, 2018 - inderscienceonline.com
Trusted computing is principle measure to ensure the security of computing platform, which
improves the creditability by functions including data protection, identity authentication …

Distributed authorization in complex multi entity-driven API ecosystems

D Thatmann - 2014 8th International Conference on Signal …, 2014 - ieeexplore.ieee.org
In certain business sectors adapting to modern and cost reducing technologies and service
models can be still a challenge. This especially applies for health care related SME, such as …

OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

P Jiang, K Tei - 2021 IEEE Symposium Series on …, 2021 - ieeexplore.ieee.org
Users interacting with a system through UI are typically obliged to perform their actions in a
pre-determined order, to successfully achieve certain functional goals. However, such …

Designing efficient XACML policies for RESTful services

M Hüffmeyer, U Schreier - Web Services, Formal Methods, and Behavioral …, 2016 - Springer
The popularity of REST grows more and more and so does the need for fine-grained access
control for RESTful services. Attribute Based Access Control (ABAC) is a very generic …