Web: http://arxiv.org/abs/2209.11108

Sept. 23, 2022, 1:24 a.m. | Masato Hirai, Daisuke Kotani, Yasuo Okabe

cs.CR updates on arXiv.org arxiv.org

An access control model called Zero Trust Architecture (ZTA) has attracted
attention. ZTA uses information of users and devices, called context, for
authentication and authorization. Zero Trust Federation (ZTF) has been proposed
as a framework for extending an idea of identity federation to support ZTA. ZTF
defines CAP as the entity that collects context and provides it to each
organization (Relying Party; RP) that needs context for authorization based on
ZTA. To improve the quality of authorization, CAPs need to …

data trust zero trust

More from arxiv.org / cs.CR updates on arXiv.org

Artificial Intelligence and Cybersecurity Researcher

@ NavInfo Europe BV | Eindhoven, Netherlands

Senior Security Engineer (E5) - Infrastructure Security

@ Netflix | Remote, United States

Sr. Security Engineer (Infrastructure)

@ SpaceX | Hawthorne, CA or Redmond, WA or Washington, DC

Senior Global Security Compliance Analyst

@ Snowflake Inc. | Warsaw, Poland

Staff Security Engineer, Threat Hunt & Research (L4)

@ Twilio | Remote - Ireland

Junior Cybersecurity Engineer

@ KUDO | Buenos Aires

iOS Engineer (hybrid / flexibility / cybersecurity)

@ Qustodio | Barcelona, Spain

Security Engineer

@ Binance.US | U.S. Remote

Senior Information Systems Security Officer (ISSO)

@ Sigma Defense | Fayetteville, North Carolina, United States

ATGPAC Battle Lab - Ballistic Missile Defense Commander/Operations Manager

@ Sigma Defense | San Diego, California, United States

Cyber Security - Head of Infrastructure m/f

@ DataDome | Paris

Backend Engineer, Govern: Threat Insights

@ GitLab | Remote