{"id":"https://openalex.org/W4312619298","doi":"https://doi.org/10.1109/iscc55528.2022.9912764","title":"A Fully Decentralized Architecture for Access Control Verification in Serverless Environments","display_name":"A Fully Decentralized Architecture for Access Control Verification in Serverless Environments","publication_year":2022,"publication_date":"2022-06-30","ids":{"openalex":"https://openalex.org/W4312619298","doi":"https://doi.org/10.1109/iscc55528.2022.9912764"},"language":"en","primary_location":{"id":"doi:10.1109/iscc55528.2022.9912764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc55528.2022.9912764","pdf_url":null,"source":{"id":"https://openalex.org/S4363605780","display_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012920112","display_name":"Andrea Sabbioni","orcid":"https://orcid.org/0000-0001-9817-1702"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Andrea Sabbioni","raw_affiliation_strings":["University of Bologna,Department of Computer Science and Engineering,Bologna,Italy","Department of Computer Science and Engineering, University of Bologna, Bologna, Italy"],"affiliations":[{"raw_affiliation_string":"University of Bologna,Department of Computer Science and Engineering,Bologna,Italy","institution_ids":["https://openalex.org/I9360294"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Bologna, Bologna, Italy","institution_ids":["https://openalex.org/I9360294"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046445668","display_name":"Carlo Mazzocca","orcid":"https://orcid.org/0000-0001-8949-2221"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Carlo Mazzocca","raw_affiliation_strings":["University of Bologna,Department of Computer Science and Engineering,Bologna,Italy","Department of Computer Science and Engineering, University of Bologna, Bologna, Italy"],"affiliations":[{"raw_affiliation_string":"University of Bologna,Department of Computer Science and Engineering,Bologna,Italy","institution_ids":["https://openalex.org/I9360294"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Bologna, Bologna, Italy","institution_ids":["https://openalex.org/I9360294"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073709427","display_name":"Michele Colajanni","orcid":"https://orcid.org/0000-0002-9499-1559"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Michele Colajanni","raw_affiliation_strings":["University of Bologna,Department of Computer Science and Engineering,Bologna,Italy","Department of Computer Science and Engineering, University of Bologna, Bologna, Italy"],"affiliations":[{"raw_affiliation_string":"University of Bologna,Department of Computer Science and Engineering,Bologna,Italy","institution_ids":["https://openalex.org/I9360294"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Bologna, Bologna, Italy","institution_ids":["https://openalex.org/I9360294"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005379518","display_name":"Rebecca Montanari","orcid":"https://orcid.org/0000-0002-3687-0361"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Rebecca Montanari","raw_affiliation_strings":["University of Bologna,Department of Computer Science and Engineering,Bologna,Italy","Department of Computer Science and Engineering, University of Bologna, Bologna, Italy"],"affiliations":[{"raw_affiliation_string":"University of Bologna,Department of Computer Science and Engineering,Bologna,Italy","institution_ids":["https://openalex.org/I9360294"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Bologna, Bologna, Italy","institution_ids":["https://openalex.org/I9360294"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020963845","display_name":"Antonio Corradi","orcid":"https://orcid.org/0000-0002-5107-1023"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Antonio Corradi","raw_affiliation_strings":["University of Bologna,Department of Computer Science and Engineering,Bologna,Italy","Department of Computer Science and Engineering, University of Bologna, Bologna, Italy"],"affiliations":[{"raw_affiliation_string":"University of Bologna,Department of Computer Science and Engineering,Bologna,Italy","institution_ids":["https://openalex.org/I9360294"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Bologna, Bologna, Italy","institution_ids":["https://openalex.org/I9360294"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012920112"],"corresponding_institution_ids":["https://openalex.org/I9360294"],"apc_list":null,"apc_paid":null,"fwci":0.8722,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79666667,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.824959397315979},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7917927503585815},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7122106552124023},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5629483461380005},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.547588586807251},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5416257381439209},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5326751470565796},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5115538239479065},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5040920972824097},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4553326964378357},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.4364245533943176},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.41374847292900085},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3822013735771179},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20938962697982788},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16694578528404236}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.824959397315979},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7917927503585815},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7122106552124023},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5629483461380005},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.547588586807251},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5416257381439209},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5326751470565796},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5115538239479065},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5040920972824097},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4553326964378357},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.4364245533943176},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.41374847292900085},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3822013735771179},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20938962697982788},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16694578528404236},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iscc55528.2022.9912764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc55528.2022.9912764","pdf_url":null,"source":{"id":"https://openalex.org/S4363605780","display_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},{"id":"pmh:oai:cris.unibo.it:11585/899312","is_oa":false,"landing_page_url":"https://hdl.handle.net/11585/899312","pdf_url":null,"source":{"id":"https://openalex.org/S4306402579","display_name":"Archivio istituzionale della ricerca (Alma Mater Studiorum Universit\u00e0 di Bologna)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210117483","host_organization_name":"Istituto di Ematologia di Bologna","host_organization_lineage":["https://openalex.org/I4210117483"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2529472369","https://openalex.org/W4302802462","https://openalex.org/W2520321864","https://openalex.org/W2578979269","https://openalex.org/W2152170894","https://openalex.org/W2953294465","https://openalex.org/W2809959305","https://openalex.org/W2895983177","https://openalex.org/W2386780234","https://openalex.org/W2777692589"],"abstract_inverted_index":{"Serverless":[0],"computing":[1],"is":[2],"a":[3,108,115,128],"novel":[4],"paradigm":[5,26],"that":[6,144],"has":[7],"been":[8],"widely":[9],"adopted,":[10],"in":[11,123],"recent":[12],"years,":[13],"across":[14],"many":[15],"sectors":[16],"due":[17],"to":[18,38,53,56,90,110],"its":[19,136],"fine-grained":[20],"scalability":[21],"and":[22,40,88,100,134],"fast":[23],"time-to-market.":[24],"This":[25],"aims":[27],"at":[28],"offloading":[29],"users":[30],"from":[31,94],"heavy":[32],"burden":[33],"tasks":[34],"including":[35],"those":[36],"related":[37],"authentication":[39],"authorization.":[41],"However,":[42],"existing":[43],"security":[44,91],"mechanisms":[45],"provided":[46],"by":[47],"cloud":[48],"providers":[49],"do":[50],"not":[51],"seem":[52],"be":[54],"adequate":[55],"completely":[57],"secure":[58],"serverless":[59,124],"platforms.":[60],"In":[61,103],"particular,":[62],"typical":[63],"access":[64,75,120],"control":[65,76,121],"solutions":[66],"rely":[67],"either":[68],"on":[69],"centralized":[70],"authorization":[71,101],"services":[72],"or":[73],"implement":[74],"verification":[77,122],"within":[78],"the":[79,95,131],"business":[80],"logic.":[81],"These":[82],"approaches":[83],"respectively":[84],"degrade":[85],"system":[86],"performance":[87,137],"lead":[89],"issues":[92],"derived":[93],"tight":[96],"coupling":[97],"among":[98],"code":[99],"verification.":[102],"this":[104],"paper,":[105],"we":[106],"present":[107],"solution":[109],"address":[111],"these":[112],"problems":[113],"with":[114],"fully":[116],"decentralized":[117],"architecture":[118,133],"integrating":[119],"environments.":[125],"We":[126],"implemented":[127],"prototype":[129],"of":[130],"proposed":[132],"evaluated":[135],"under":[138],"different":[139],"load":[140],"conditions.":[141],"Experiments":[142],"show":[143],"our":[145],"proposal":[146],"outperforms":[147],"other":[148],"approaches.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2023-01-05T00:00:00"}
