{"id":"https://openalex.org/W3111862628","doi":"https://doi.org/10.1145/3427228.3427665","title":"Workflow Integration Alleviates Identity and Access Management in Serverless Computing","display_name":"Workflow Integration Alleviates Identity and Access Management in Serverless Computing","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3111862628","doi":"https://doi.org/10.1145/3427228.3427665","mag":"3111862628"},"language":"en","primary_location":{"id":"doi:10.1145/3427228.3427665","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427665","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025377317","display_name":"Arnav Sankaran","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Arnav Sankaran","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, United States of America","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101917630","display_name":"Pubali Datta","orcid":"https://orcid.org/0009-0005-2026-5465"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pubali Datta","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, United States of America","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021649580","display_name":"Adam Bates","orcid":"https://orcid.org/0000-0003-1511-4951"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adam Bates","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, United States of America","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025377317"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":1.3404,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.84367975,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"496","last_page":"509"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.751600444316864},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7335640788078308},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.6903701424598694},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6724600791931152},{"id":"https://openalex.org/keywords/ephemeral-key","display_name":"Ephemeral key","score":0.6056967973709106},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.5984302163124084},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5961897969245911},{"id":"https://openalex.org/keywords/container","display_name":"Container (type theory)","score":0.5421273708343506},{"id":"https://openalex.org/keywords/microservices","display_name":"Microservices","score":0.49702194333076477},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.19801479578018188},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1208406388759613},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11421084403991699},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09130176901817322}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.751600444316864},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7335640788078308},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.6903701424598694},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6724600791931152},{"id":"https://openalex.org/C76947770","wikidata":"https://www.wikidata.org/wiki/Q4533181","display_name":"Ephemeral key","level":2,"score":0.6056967973709106},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.5984302163124084},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5961897969245911},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.5421273708343506},{"id":"https://openalex.org/C2778505942","wikidata":"https://www.wikidata.org/wiki/Q18344624","display_name":"Microservices","level":3,"score":0.49702194333076477},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.19801479578018188},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1208406388759613},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11421084403991699},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09130176901817322},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3427228.3427665","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427665","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1963957280","https://openalex.org/W1985170326","https://openalex.org/W1986989788","https://openalex.org/W2081547960","https://openalex.org/W2087834864","https://openalex.org/W2096803772","https://openalex.org/W2111510829","https://openalex.org/W2164033917","https://openalex.org/W2626970695","https://openalex.org/W2734941459","https://openalex.org/W2735574181","https://openalex.org/W2739995208","https://openalex.org/W2770176323","https://openalex.org/W2791780405","https://openalex.org/W2808781943","https://openalex.org/W2887739100","https://openalex.org/W2897213586","https://openalex.org/W2899822557","https://openalex.org/W2900867913","https://openalex.org/W2901915930","https://openalex.org/W2911351991","https://openalex.org/W2914558535","https://openalex.org/W2915850828","https://openalex.org/W2932657656","https://openalex.org/W2946377927","https://openalex.org/W2947413737","https://openalex.org/W2947593054","https://openalex.org/W2952806581","https://openalex.org/W2962955124","https://openalex.org/W2963761135","https://openalex.org/W2963974647","https://openalex.org/W2984894901","https://openalex.org/W2984937325","https://openalex.org/W2984976594","https://openalex.org/W2985907279","https://openalex.org/W2988669517","https://openalex.org/W2991081818","https://openalex.org/W3012914409","https://openalex.org/W4225752873","https://openalex.org/W4232467551","https://openalex.org/W4250450361","https://openalex.org/W4300192902"],"related_works":["https://openalex.org/W3181741639","https://openalex.org/W4210334847","https://openalex.org/W4367181468","https://openalex.org/W2767473057","https://openalex.org/W2994988622","https://openalex.org/W4225586032","https://openalex.org/W2351197002","https://openalex.org/W4254841053","https://openalex.org/W2997601332","https://openalex.org/W3003367851"],"abstract_inverted_index":{"As":[0],"serverless":[1,34,52],"computing":[2],"continues":[3],"to":[4,20,66],"revolutionize":[5],"the":[6,30,47,55],"design":[7],"and":[8,40],"deployment":[9],"of":[10,33],"web":[11],"services,":[12],"it":[13],"has":[14],"become":[15],"an":[16],"increasingly":[17],"attractive":[18],"target":[19],"attackers.":[21],"These":[22],"adversaries":[23],"are":[24,64],"developing":[25],"novel":[26],"tactics":[27],"for":[28],"circumventing":[29],"ephemeral":[31],"nature":[32],"functions,":[35],"exploiting":[36],"container":[37],"reuse":[38],"optimizations":[39],"achieving":[41],"lateral":[42],"movement":[43],"by":[44,50,61],"\u201cliving":[45],"off":[46],"land\u201d":[48],"provided":[49],"legitimate":[51],"workflows.":[53],"Unfortunately,":[54],"traditional":[56],"security":[57],"controls":[58],"currently":[59],"offered":[60],"cloud":[62],"providers":[63],"inadequate":[65],"counter":[67],"these":[68],"new":[69],"threats.":[70]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
