Ensuring Only Ada Can Access her GHC Proposal10/04/2017 Objective: Guidance Securing objects within an application is one important aspect to cloud security - only the right people should be able to access any given piece of information. In this talk, I will discuss some of the common access control methods, why we chose to use Attribute Based Access Control (or ABAC) and the high level architecture of an ABAC system. Speaker(s)
|