Identity and Access Management for the Computing Continuum
Identity and Access Management for the Computing Continuum
The computing continuum introduces new challenges for access control due to its dynamic, distributed, and heterogeneous nature. In this paper, we propose a Zero-Trust (ZT) access control solution that leverages decentralized identification and authentication mechanisms based on Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs). Additionally, we employ Relationship-Based Access Control (ReBAC) to define policies that capture the evolving trust relationships inherent in the continuum. Through a proof-of-concept implementation, we demonstrate the feasibility and efficiency of our solution, highlighting its potential to enhance security and trust in decentralized environments.
Chalima Dimitra Nassar Kyriakidou、Athanasia Maria Papathanasiou、Vasilios A. Siris、Nikos Fotiou、George C. Polyzos、Eduardo Cánovas Martínez、Antonio Skarmeta
计算技术、计算机技术
Chalima Dimitra Nassar Kyriakidou,Athanasia Maria Papathanasiou,Vasilios A. Siris,Nikos Fotiou,George C. Polyzos,Eduardo Cánovas Martínez,Antonio Skarmeta.Identity and Access Management for the Computing Continuum[EB/OL].(2025-06-11)[2025-07-16].https://arxiv.org/abs/2506.09559.点此复制
评论