Web: http://arxiv.org/abs/2209.11025

Sept. 23, 2022, 1:24 a.m. | Koudai Hatakeyama, Daisuke Kotani, Yasuo Okabe

cs.CR updates on arXiv.org arxiv.org

To securely control access to systems, the concept of Zero Trust has been
proposed. Access Control based on Zero Trust concept removes implicit trust and
instead focuses on evaluating trustworthiness at every access request by using
contexts. Contexts are information about the entity making an access request
like the user and the device status. Consider the scenario of Zero Trust in an
identity federation where the entity (Relying Party; RP) enforces access
control based on Zero Trust concept. RPs should …

control identity sharing trust under zero trust

More from arxiv.org / cs.CR updates on arXiv.org

Field Security Specialist (GitHub Advanced Security Pre-Sales Engineer)

@ GitHub | Remote - US East

Cyber Threat Intelligence (CTI) Analyst

@ XOR Security | Alexandria, VA

Senior Manual QA (Cyber Protect)

@ Acronis | Budapest, Hungary

Security Operations Engineer

@ Cloudflare, Inc. | Lisbon, Portugal

Senior Security Consultant

@ Charterhouse | Peterborough, England, United Kingdom

Enterprise Sales Executive (Missouri)

@ Datadog | Missouri, USA, Remote

iCAM - Cyber/Network Security Background**

@ SonicWall | Bengaluru, Karnataka, India

Territory Account Manager - Cyber Security Background*

@ SonicWall | Melbourne, Victoria, Australia

Cybersecurity and Supply Chain Risk Manager

@ Avint | Washington, District of Columbia, United States - Remote

Implementation Consultant

@ Snyk | Australia, Japan, or Singapore

Information Systems Security Engineer (ISSE)

@ Novetta | Columbia, Maryland

Vulnerability Management Engineer (Splunk)

@ Aperia | Dallas, Texas, United States - Remote